Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1544237
MD5:473c91c8363cf492cf6192686e4aeae8
SHA1:4f56b6e25bbf8bb424a3fbb398040d980850a046
SHA256:265c128a8a9421847dea2121ae5ce79efb601616c4fd060ff9863f4c2c498c2f
Tags:exeuser-Bitsight
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Hides threads from debuggers
Machine Learning detection for sample
Modifies windows update settings
PE file contains section with special chars
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to detect virtual machines (SIDT)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Entry point lies outside standard sections
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 7272 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 473C91C8363CF492CF6192686E4AEAE8)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeVirustotal: Detection: 50%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: file.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4FDD9 CryptVerifySignatureA,0_2_00F4FDD9
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: file.exe, 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmp, file.exe, 00000000.00000003.1689782205.0000000004700000.00000004.00001000.00020000.00000000.sdmp

System Summary

barindex
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F673190_2_00F67319
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF64D80_2_00EF64D8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF64900_2_00EF6490
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FFBA620_2_00FFBA62
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F2CC5F0_2_00F2CC5F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F92F810_2_00F92F81
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00F4ADCE appears 35 times
Source: file.exe, 00000000.00000000.1673279356.0000000000D66000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exeBinary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: classification engineClassification label: mal100.evad.winEXE@1/1@0/0
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.logJump to behavior
Source: C:\Users\user\Desktop\file.exeMutant created: NULL
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeVirustotal: Detection: 50%
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: file.exeStatic file information: File size 2838528 > 1048576
Source: file.exeStatic PE information: Raw size of bbzqfojp is bigger than: 0x100000 < 0x2af000
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: file.exe, 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmp, file.exe, 00000000.00000003.1689782205.0000000004700000.00000004.00001000.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.d60000.0.unpack :EW;.rsrc:W;.idata :W;bbzqfojp:EW;ynvwdqnr:EW;.taggant:EW; vs :ER;.rsrc:W;
Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
Source: file.exeStatic PE information: real checksum: 0x2b68af should be: 0x2c0341
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: file.exeStatic PE information: section name: bbzqfojp
Source: file.exeStatic PE information: section name: ynvwdqnr
Source: file.exeStatic PE information: section name: .taggant
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF5321 push esi; mov dword ptr [esp], 255745B4h0_2_00EF534B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF5321 push 20F1AF57h; mov dword ptr [esp], ecx0_2_00EF536F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF5321 push eax; mov dword ptr [esp], ebx0_2_00EF53CD
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D6E7DD push esi; mov dword ptr [esp], ebp0_2_00D6F6D8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D6ED83 push eax; mov dword ptr [esp], edi0_2_00D6EF67
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D6ED83 push 41730DD3h; mov dword ptr [esp], ebx0_2_00D6EF6F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F01D2D push eax; mov dword ptr [esp], ebp0_2_00F03854
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F02E8C push 68006DD1h; mov dword ptr [esp], eax0_2_00F02B0F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F020F8 push 3F1D00BFh; mov dword ptr [esp], ebx0_2_00F0355F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F020F8 push 470F90ADh; mov dword ptr [esp], ebx0_2_00F03C1B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF50E3 push 7A928A01h; mov dword ptr [esp], edi0_2_00EF5271
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF50E3 push 40118F1Ah; mov dword ptr [esp], edx0_2_00EF527B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F020D2 push esi; mov dword ptr [esp], ebx0_2_00F020F0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FC90DB push 5845E4E2h; mov dword ptr [esp], eax0_2_00FC913E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FC90DB push 78C96993h; mov dword ptr [esp], eax0_2_00FC9174
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FC90DB push 39699A32h; mov dword ptr [esp], edi0_2_00FC91B9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF30D9 push ebp; mov dword ptr [esp], edi0_2_00EF30EA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F120CB push 307FA957h; mov dword ptr [esp], edi0_2_00F120E8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F030CE push 3C93D3E1h; mov dword ptr [esp], ebx0_2_00F046F1
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F910BB push 16DFFF79h; mov dword ptr [esp], edx0_2_00F910F8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F020AC push edi; mov dword ptr [esp], 1A767739h0_2_00F02999
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F670A8 push edx; mov dword ptr [esp], 1D6969CBh0_2_00F670EA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F670A8 push esi; mov dword ptr [esp], ecx0_2_00F6710C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF8085 push eax; mov dword ptr [esp], 5C8FD256h0_2_00EF857C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF8085 push ebx; mov dword ptr [esp], ecx0_2_00EF865A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF8085 push edi; mov dword ptr [esp], 02DCD9F9h0_2_00EF87FF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F0209D push edi; mov dword ptr [esp], edx0_2_00F04848
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F0209D push eax; mov dword ptr [esp], esi0_2_00F06F4A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FDE073 push edx; mov dword ptr [esp], ecx0_2_00FDE0BA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D6F041 push 29B4EBF8h; mov dword ptr [esp], edi0_2_00D6F046
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F04069 push ebp; mov dword ptr [esp], esp0_2_00F04086
Source: file.exeStatic PE information: section name: entropy: 7.808125394250483

Boot Survival

barindex
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D6DD86 second address: D6DD99 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FD4D8D9C078h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D6DD99 second address: D6DD9F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EF6151 second address: EF6159 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EE1CFF second address: EE1D03 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EE1D03 second address: EE1D09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EE1D09 second address: EE1D0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EE1D0F second address: EE1D19 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007FD4D8D9C076h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EF58F3 second address: EF5901 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnl 00007FD4D8DCC438h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EF8D1E second address: EF8D54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 mov dword ptr [esp], eax 0x00000008 jmp 00007FD4D8D9C07Ch 0x0000000d push 00000000h 0x0000000f mov dword ptr [ebp+122D30C0h], esi 0x00000015 call 00007FD4D8D9C079h 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007FD4D8D9C07Fh 0x00000021 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EF8D54 second address: EF8D6A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8DCC42Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push esi 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EF8D6A second address: EF8D6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EF8D6F second address: EF8D75 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EF8D75 second address: EF8E16 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8D9C07Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f ja 00007FD4D8D9C092h 0x00000015 mov eax, dword ptr [eax] 0x00000017 pushad 0x00000018 pushad 0x00000019 push ebx 0x0000001a pop ebx 0x0000001b pushad 0x0000001c popad 0x0000001d popad 0x0000001e jmp 00007FD4D8D9C088h 0x00000023 popad 0x00000024 mov dword ptr [esp+04h], eax 0x00000028 jmp 00007FD4D8D9C07Dh 0x0000002d pop eax 0x0000002e mov ecx, edx 0x00000030 push 00000003h 0x00000032 mov dword ptr [ebp+122D2BD4h], eax 0x00000038 add ch, FFFFFF87h 0x0000003b push 00000000h 0x0000003d movzx edx, si 0x00000040 push 00000003h 0x00000042 mov dword ptr [ebp+122D30F8h], eax 0x00000048 push A6BAEAFFh 0x0000004d push eax 0x0000004e push edx 0x0000004f jmp 00007FD4D8D9C084h 0x00000054 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EF8E16 second address: EF8E5A instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FD4D8DCC439h 0x00000008 jmp 00007FD4D8DCC433h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f add dword ptr [esp], 19451501h 0x00000016 mov dword ptr [ebp+122D2BB0h], ebx 0x0000001c push ebx 0x0000001d mov edx, dword ptr [ebp+122D399Fh] 0x00000023 pop edi 0x00000024 lea ebx, dword ptr [ebp+1245EC28h] 0x0000002a push edx 0x0000002b mov edx, ecx 0x0000002d pop edx 0x0000002e mov esi, ebx 0x00000030 push eax 0x00000031 push eax 0x00000032 push edx 0x00000033 pushad 0x00000034 push eax 0x00000035 push edx 0x00000036 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EF8E5A second address: EF8E73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD4D8D9C084h 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EF8E73 second address: EF8E79 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EF8EBB second address: EF8EC0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EF8EC0 second address: EF8ECE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EF8ECE second address: EF8ED4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EF8ED4 second address: EF8F90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop eax 0x00000006 nop 0x00000007 push 00000000h 0x00000009 push eax 0x0000000a call 00007FD4D8DCC428h 0x0000000f pop eax 0x00000010 mov dword ptr [esp+04h], eax 0x00000014 add dword ptr [esp+04h], 00000018h 0x0000001c inc eax 0x0000001d push eax 0x0000001e ret 0x0000001f pop eax 0x00000020 ret 0x00000021 pushad 0x00000022 jmp 00007FD4D8DCC431h 0x00000027 sub ebx, dword ptr [ebp+122D3C57h] 0x0000002d popad 0x0000002e push 00000000h 0x00000030 or di, BCBEh 0x00000035 push 011D1742h 0x0000003a js 00007FD4D8DCC440h 0x00000040 xor dword ptr [esp], 011D17C2h 0x00000047 jmp 00007FD4D8DCC432h 0x0000004c push 00000003h 0x0000004e mov edx, dword ptr [ebp+122D3AFBh] 0x00000054 push 00000000h 0x00000056 mov dword ptr [ebp+122D383Eh], edi 0x0000005c push 00000003h 0x0000005e jmp 00007FD4D8DCC42Ch 0x00000063 push 89BDD7C0h 0x00000068 push eax 0x00000069 push edx 0x0000006a push edi 0x0000006b jmp 00007FD4D8DCC430h 0x00000070 pop edi 0x00000071 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EF8F90 second address: EF8FE2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8D9C085h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 add dword ptr [esp], 36422840h 0x00000010 mov ecx, dword ptr [ebp+122D3C57h] 0x00000016 lea ebx, dword ptr [ebp+1245EC31h] 0x0000001c call 00007FD4D8D9C07Bh 0x00000021 adc ecx, 649CDBE7h 0x00000027 pop edx 0x00000028 xchg eax, ebx 0x00000029 push eax 0x0000002a push edx 0x0000002b jmp 00007FD4D8D9C081h 0x00000030 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EF8FE2 second address: EF8FE9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EF8FE9 second address: EF900F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 jmp 00007FD4D8D9C089h 0x0000000e push eax 0x0000000f push edx 0x00000010 push edx 0x00000011 pop edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EF9101 second address: EF911B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8DCC431h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EF911B second address: EF913B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push ebx 0x00000006 jmp 00007FD4D8D9C07Eh 0x0000000b pop ebx 0x0000000c popad 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EF913B second address: EF9141 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F0A57F second address: F0A5AB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FD4D8D9C07Fh 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FD4D8D9C084h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F19CA6 second address: F19CAB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F19CAB second address: F19CB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F17C50 second address: F17C70 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 jc 00007FD4D8DCC426h 0x0000000b pop ebx 0x0000000c jbe 00007FD4D8DCC42Ah 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 push eax 0x00000015 pop eax 0x00000016 pop edx 0x00000017 pop eax 0x00000018 pushad 0x00000019 push ecx 0x0000001a pushad 0x0000001b popad 0x0000001c pop ecx 0x0000001d pushad 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F17DFE second address: F17E02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F17E02 second address: F17E07 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F18075 second address: F18086 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 pop eax 0x00000007 jg 00007FD4D8D9C076h 0x0000000d push edi 0x0000000e pop edi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F1859A second address: F1859F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F18741 second address: F18750 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jng 00007FD4D8D9C076h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F0CB02 second address: F0CB07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F0CB07 second address: F0CB0C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EEBFFE second address: EEC007 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EEC007 second address: EEC00D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EEC00D second address: EEC031 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push esi 0x00000006 pushad 0x00000007 popad 0x00000008 jmp 00007FD4D8DCC437h 0x0000000d pop esi 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EEC031 second address: EEC03B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FD4D8D9C076h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EEC03B second address: EEC03F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F18E73 second address: F18E80 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FD4D8D9C076h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F18E80 second address: F18E88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F19420 second address: F19430 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 pop eax 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F19430 second address: F19434 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F197F8 second address: F19845 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jng 00007FD4D8D9C07Ah 0x0000000b jmp 00007FD4D8D9C07Ah 0x00000010 jng 00007FD4D8D9C08Ah 0x00000016 popad 0x00000017 pushad 0x00000018 jbe 00007FD4D8D9C085h 0x0000001e push ebx 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F19845 second address: F1984B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F19B39 second address: F19B46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jo 00007FD4D8D9C076h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F19B46 second address: F19B4A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F1DDE9 second address: F1DDF8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8D9C07Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EEA49E second address: EEA4A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push edi 0x00000008 pop edi 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2016B second address: F20171 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F202BD second address: F202C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F1EC12 second address: F1EC17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F1F344 second address: F1F34A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F1F34A second address: F1F354 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007FD4D8D9C076h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F23DA6 second address: F23DBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD4D8DCC434h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F23DBE second address: F23DC2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F23DC2 second address: F23DCE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FD4D8DCC426h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EE89E6 second address: EE8A00 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f pop edx 0x00000010 push ecx 0x00000011 push edx 0x00000012 pop edx 0x00000013 jng 00007FD4D8D9C076h 0x00000019 pop ecx 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EE8A00 second address: EE8A0B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 pop ecx 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F232F0 second address: F232F6 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F236C0 second address: F236DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD4D8DCC42Ch 0x00000009 popad 0x0000000a jg 00007FD4D8DCC42Eh 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F23941 second address: F23947 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F23947 second address: F23958 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 pushad 0x00000007 jl 00007FD4D8DCC426h 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F23AA0 second address: F23AB2 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FD4D8D9C07Ah 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F26F40 second address: F26F44 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2716C second address: F27170 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F27170 second address: F2717B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 push edi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F27658 second address: F2766A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8D9C07Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F27C47 second address: F27C4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F27C4B second address: F27C51 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F27C51 second address: F27C56 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F27C56 second address: F27C83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD4D8D9C083h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f ja 00007FD4D8D9C080h 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F27C83 second address: F27C89 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F27D7A second address: F27D80 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F27D80 second address: F27D84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F28256 second address: F28271 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FD4D8D9C083h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F28271 second address: F282AD instructions: 0x00000000 rdtsc 0x00000002 je 00007FD4D8DCC426h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push edi 0x0000000f call 00007FD4D8DCC428h 0x00000014 pop edi 0x00000015 mov dword ptr [esp+04h], edi 0x00000019 add dword ptr [esp+04h], 00000017h 0x00000021 inc edi 0x00000022 push edi 0x00000023 ret 0x00000024 pop edi 0x00000025 ret 0x00000026 mov edi, dword ptr [ebp+122D30C5h] 0x0000002c push eax 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 js 00007FD4D8DCC426h 0x00000037 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F282AD second address: F282B7 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FD4D8D9C076h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F29212 second address: F29216 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F29216 second address: F29220 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007FD4D8D9C076h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2A3D3 second address: F2A3D7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2A3D7 second address: F2A3DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2A3DD second address: F2A469 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8DCC430h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e pop edx 0x0000000f ja 00007FD4D8DCC42Ch 0x00000015 popad 0x00000016 nop 0x00000017 push 00000000h 0x00000019 push ecx 0x0000001a call 00007FD4D8DCC428h 0x0000001f pop ecx 0x00000020 mov dword ptr [esp+04h], ecx 0x00000024 add dword ptr [esp+04h], 00000016h 0x0000002c inc ecx 0x0000002d push ecx 0x0000002e ret 0x0000002f pop ecx 0x00000030 ret 0x00000031 push esi 0x00000032 mov si, cx 0x00000035 pop esi 0x00000036 push 00000000h 0x00000038 mov si, dx 0x0000003b push 00000000h 0x0000003d push 00000000h 0x0000003f push eax 0x00000040 call 00007FD4D8DCC428h 0x00000045 pop eax 0x00000046 mov dword ptr [esp+04h], eax 0x0000004a add dword ptr [esp+04h], 0000001Dh 0x00000052 inc eax 0x00000053 push eax 0x00000054 ret 0x00000055 pop eax 0x00000056 ret 0x00000057 mov di, 7F82h 0x0000005b sub dword ptr [ebp+1245C93Fh], ecx 0x00000061 push eax 0x00000062 push eax 0x00000063 push edx 0x00000064 jns 00007FD4D8DCC428h 0x0000006a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2AEAE second address: F2AEB4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2AEB4 second address: F2AEB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2AEB8 second address: F2AEFE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 js 00007FD4D8D9C07Eh 0x0000000f jo 00007FD4D8D9C078h 0x00000015 pushad 0x00000016 popad 0x00000017 nop 0x00000018 mov esi, dword ptr [ebp+122D390Fh] 0x0000001e push 00000000h 0x00000020 push 00000000h 0x00000022 push esi 0x00000023 mov dword ptr [ebp+122D2E39h], ebx 0x00000029 pop edi 0x0000002a xchg eax, ebx 0x0000002b push eax 0x0000002c push edx 0x0000002d je 00007FD4D8D9C089h 0x00000033 jmp 00007FD4D8D9C083h 0x00000038 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2AEFE second address: F2AF04 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2AF04 second address: F2AF2D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8D9C084h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jne 00007FD4D8D9C07Ch 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2AF2D second address: F2AF40 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD4D8DCC42Fh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2C953 second address: F2C965 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 pushad 0x00000007 pushad 0x00000008 jp 00007FD4D8D9C076h 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2DB0F second address: F2DB23 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8DCC42Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2D8D3 second address: F2D8D7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2DB23 second address: F2DB27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2E593 second address: F2E5DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8D9C081h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov dword ptr [esp], eax 0x0000000d mov edi, dword ptr [ebp+122D3BE7h] 0x00000013 push 00000000h 0x00000015 mov si, 2CCBh 0x00000019 push 00000000h 0x0000001b mov esi, dword ptr [ebp+122D398Fh] 0x00000021 xchg eax, ebx 0x00000022 jmp 00007FD4D8D9C07Dh 0x00000027 push eax 0x00000028 push eax 0x00000029 push edx 0x0000002a jmp 00007FD4D8D9C07Bh 0x0000002f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2E5DC second address: F2E5E2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F33C50 second address: F33C54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F33C54 second address: F33CC2 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FD4D8DCC426h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FD4D8DCC437h 0x0000000f popad 0x00000010 mov dword ptr [esp], eax 0x00000013 movsx edi, di 0x00000016 mov ebx, dword ptr [ebp+122D1C7Eh] 0x0000001c push 00000000h 0x0000001e jnc 00007FD4D8DCC42Ch 0x00000024 push 00000000h 0x00000026 jmp 00007FD4D8DCC42Bh 0x0000002b xchg eax, esi 0x0000002c pushad 0x0000002d push eax 0x0000002e push ebx 0x0000002f pop ebx 0x00000030 pop eax 0x00000031 jmp 00007FD4D8DCC438h 0x00000036 popad 0x00000037 push eax 0x00000038 pushad 0x00000039 push eax 0x0000003a push edx 0x0000003b push edx 0x0000003c pop edx 0x0000003d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F36BC6 second address: F36BCA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F36BCA second address: F36BD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F38A8A second address: F38A8E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F38A8E second address: F38AFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push ebp 0x0000000d call 00007FD4D8DCC428h 0x00000012 pop ebp 0x00000013 mov dword ptr [esp+04h], ebp 0x00000017 add dword ptr [esp+04h], 0000001Ah 0x0000001f inc ebp 0x00000020 push ebp 0x00000021 ret 0x00000022 pop ebp 0x00000023 ret 0x00000024 push 00000000h 0x00000026 mov ebx, dword ptr [ebp+122D3B97h] 0x0000002c push 00000000h 0x0000002e push 00000000h 0x00000030 push edi 0x00000031 call 00007FD4D8DCC428h 0x00000036 pop edi 0x00000037 mov dword ptr [esp+04h], edi 0x0000003b add dword ptr [esp+04h], 00000018h 0x00000043 inc edi 0x00000044 push edi 0x00000045 ret 0x00000046 pop edi 0x00000047 ret 0x00000048 sub edi, 65573290h 0x0000004e xchg eax, esi 0x0000004f push eax 0x00000050 push edx 0x00000051 pushad 0x00000052 push ebx 0x00000053 pop ebx 0x00000054 jmp 00007FD4D8DCC42Ch 0x00000059 popad 0x0000005a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F38AFD second address: F38B1C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8D9C084h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F38B1C second address: F38B22 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F39A60 second address: F39A64 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F34E77 second address: F34E7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F34E7E second address: F34E85 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F35D1C second address: F35D21 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F3BA53 second address: F3BA60 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F3BA60 second address: F3BA64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F39C9F second address: F39CC9 instructions: 0x00000000 rdtsc 0x00000002 js 00007FD4D8D9C07Ch 0x00000008 jc 00007FD4D8D9C076h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FD4D8D9C087h 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F3DB62 second address: F3DB77 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FD4D8DCC428h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push edi 0x00000011 pop edi 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F3DB77 second address: F3DB81 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007FD4D8D9C076h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F37B78 second address: F37B85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jne 00007FD4D8DCC426h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F3FB8A second address: F3FB8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F3FB8E second address: F3FB92 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F3FB92 second address: F3FB98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F3CCB1 second address: F3CCC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 jl 00007FD4D8DCC428h 0x0000000d pushad 0x0000000e popad 0x0000000f popad 0x00000010 push eax 0x00000011 push ecx 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F3CCC6 second address: F3CCCC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F3EC27 second address: F3EC2D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F3EC2D second address: F3EC31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F3FD4D second address: F3FD5F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD4D8DCC42Eh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F3FD5F second address: F3FD6C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edi 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F3FE23 second address: F3FE27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F42B81 second address: F42B85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F42B85 second address: F42B89 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F42B89 second address: F42BA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ecx 0x00000009 push esi 0x0000000a jg 00007FD4D8D9C07Eh 0x00000010 push ebx 0x00000011 push esi 0x00000012 pop esi 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EDCC05 second address: EDCC19 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8DCC42Eh 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EDCC19 second address: EDCC1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EEF57E second address: EEF584 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EEF584 second address: EEF5A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FD4D8D9C07Eh 0x0000000b popad 0x0000000c push ebx 0x0000000d jo 00007FD4D8D9C07Eh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F4649D second address: F464AF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8DCC42Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F464AF second address: F464B4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F464B4 second address: F464C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD4D8DCC42Ah 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F464C4 second address: F464CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F464CF second address: F464D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EE37E6 second address: EE37F7 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007FD4D8D9C07Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F55110 second address: F55114 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F55114 second address: F55136 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8D9C086h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jl 00007FD4D8D9C07Ch 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F55136 second address: F55146 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 je 00007FD4D8DCC432h 0x0000000b pushad 0x0000000c push edx 0x0000000d pop edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F54735 second address: F54739 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F54739 second address: F5473D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F548B7 second address: F548C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jnc 00007FD4D8D9C076h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F548C3 second address: F548C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F548C7 second address: F548CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F548CD second address: F548DD instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FD4D8DCC428h 0x00000008 push eax 0x00000009 push edx 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F54A54 second address: F54A5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F54A5A second address: F54A5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F54A5E second address: F54AB5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FD4D8D9C088h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push esi 0x0000000c jp 00007FD4D8D9C076h 0x00000012 push eax 0x00000013 pop eax 0x00000014 pop esi 0x00000015 pop edi 0x00000016 pushad 0x00000017 pushad 0x00000018 push esi 0x00000019 pop esi 0x0000001a jmp 00007FD4D8D9C080h 0x0000001f jmp 00007FD4D8D9C086h 0x00000024 popad 0x00000025 push ebx 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F54C25 second address: F54C29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F54C29 second address: F54C2D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F54C2D second address: F54C33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F54C33 second address: F54C5C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 jmp 00007FD4D8D9C07Ch 0x0000000a jl 00007FD4D8D9C076h 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 push eax 0x00000014 jmp 00007FD4D8D9C07Ch 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F54C5C second address: F54C99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a jmp 00007FD4D8DCC42Dh 0x0000000f ja 00007FD4D8DCC426h 0x00000015 jns 00007FD4D8DCC426h 0x0000001b popad 0x0000001c jnc 00007FD4D8DCC439h 0x00000022 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EDE6E5 second address: EDE6EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EDE6EB second address: EDE706 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FD4D8DCC42Ch 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jno 00007FD4D8DCC426h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F5D806 second address: F5D80A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F5D80A second address: F5D82C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8DCC42Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov eax, dword ptr [eax] 0x0000000c pushad 0x0000000d push eax 0x0000000e jo 00007FD4D8DCC426h 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 push edx 0x00000018 pop edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F5D82C second address: F5D841 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jns 00007FD4D8D9C076h 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F5D841 second address: F5D847 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EDB0D0 second address: EDB0F5 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FD4D8D9C076h 0x00000008 jmp 00007FD4D8D9C088h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push esi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EDB0F5 second address: EDB0FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EDB0FA second address: EDB0FF instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EDB0FF second address: EDB10E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FD4D8DCC426h 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EDB10E second address: EDB120 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD4D8D9C07Eh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F65CC7 second address: F65CDF instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007FD4D8DCC42Eh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F65CDF second address: F65CE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F66275 second address: F66280 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F66817 second address: F6681F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6681F second address: F66852 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8DCC430h 0x00000007 pushad 0x00000008 jns 00007FD4D8DCC426h 0x0000000e jns 00007FD4D8DCC426h 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007FD4D8DCC42Dh 0x00000020 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F66852 second address: F66863 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FD4D8D9C07Ah 0x00000008 pop ebx 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F66863 second address: F66878 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD4D8DCC42Fh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F669E8 second address: F66A19 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FD4D8D9C076h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FD4D8D9C07Ch 0x0000000f jmp 00007FD4D8D9C085h 0x00000014 popad 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F66A19 second address: F66A1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F66A1F second address: F66A52 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FD4D8D9C076h 0x00000008 jmp 00007FD4D8D9C083h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FD4D8D9C084h 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F66BA1 second address: F66BAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F66D39 second address: F66D65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FD4D8D9C076h 0x0000000a popad 0x0000000b pushad 0x0000000c push eax 0x0000000d pop eax 0x0000000e jmp 00007FD4D8D9C081h 0x00000013 pushad 0x00000014 popad 0x00000015 push edx 0x00000016 pop edx 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a jp 00007FD4D8D9C076h 0x00000020 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F66EE9 second address: F66EFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FD4D8DCC426h 0x0000000a pop esi 0x0000000b push ebx 0x0000000c jo 00007FD4D8DCC42Eh 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6AFE3 second address: F6AFE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6B609 second address: F6B62C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007FD4D8DCC42Bh 0x0000000d popad 0x0000000e jc 00007FD4D8DCC434h 0x00000014 push edi 0x00000015 je 00007FD4D8DCC426h 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6BB7A second address: F6BB80 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6BB80 second address: F6BB8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FD4D8DCC428h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6BCFC second address: F6BD1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD4D8D9C085h 0x00000009 je 00007FD4D8D9C076h 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6BD1E second address: F6BD3A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FD4D8DCC435h 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6BFB4 second address: F6BFC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 jo 00007FD4D8D9C076h 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6BFC3 second address: F6BFDB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FD4D8DCC42Fh 0x00000008 push edx 0x00000009 pop edx 0x0000000a popad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6F7E9 second address: F6F7FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD4D8D9C07Dh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F6F7FA second address: F6F816 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FD4D8DCC426h 0x00000008 jmp 00007FD4D8DCC432h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F25A33 second address: F25A45 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD4D8D9C07Eh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F25A45 second address: F25A49 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F25A49 second address: F0CB02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FD4D8D9C07Bh 0x0000000e nop 0x0000000f sub dword ptr [ebp+1245ED37h], esi 0x00000015 lea eax, dword ptr [ebp+1248B7CBh] 0x0000001b mov di, 45E2h 0x0000001f push eax 0x00000020 jmp 00007FD4D8D9C07Ah 0x00000025 mov dword ptr [esp], eax 0x00000028 push edi 0x00000029 push ebx 0x0000002a call 00007FD4D8D9C07Dh 0x0000002f pop edi 0x00000030 pop ecx 0x00000031 pop edx 0x00000032 call dword ptr [ebp+122D311Bh] 0x00000038 push eax 0x00000039 push edx 0x0000003a push eax 0x0000003b push eax 0x0000003c push edx 0x0000003d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2629A second address: F2629E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2629E second address: F262A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F262A4 second address: F262CD instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FD4D8DCC436h 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f jns 00007FD4D8DCC42Eh 0x00000015 push ecx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F26537 second address: F2653C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2653C second address: F26542 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F268D1 second address: F268D7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F26A4B second address: F26A58 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FD4D8DCC426h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F26B8F second address: F26B93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F0D5EE second address: F0D604 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 jmp 00007FD4D8DCC42Fh 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F0D604 second address: F0D60F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jng 00007FD4D8D9C076h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F75FDC second address: F75FF7 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FD4D8DCC432h 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F75FF7 second address: F76003 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F76003 second address: F76007 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7C33D second address: F7C348 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edi 0x00000007 pop edi 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7C348 second address: F7C364 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FD4D8DCC42Ah 0x00000008 pushad 0x00000009 popad 0x0000000a jp 00007FD4D8DCC426h 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7C364 second address: F7C368 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7AE35 second address: F7AE3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7AE3B second address: F7AE5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD4D8D9C083h 0x00000009 popad 0x0000000a jg 00007FD4D8D9C078h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7AFAD second address: F7AFB2 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7B567 second address: F7B56D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7B955 second address: F7B95D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7B95D second address: F7B969 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FD4D8D9C076h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7BB1A second address: F7BB20 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7AB78 second address: F7ABA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pushad 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a jmp 00007FD4D8D9C084h 0x0000000f je 00007FD4D8D9C076h 0x00000015 popad 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F804EF second address: F804F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F804F3 second address: F804F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F804F7 second address: F80529 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FD4D8DCC432h 0x0000000d jmp 00007FD4D8DCC438h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7FD80 second address: F7FDD5 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FD4D8D9C076h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FD4D8D9C07Dh 0x0000000f push eax 0x00000010 jmp 00007FD4D8D9C083h 0x00000015 push ebx 0x00000016 pop ebx 0x00000017 pop eax 0x00000018 popad 0x00000019 pushad 0x0000001a jnl 00007FD4D8D9C090h 0x00000020 push ebx 0x00000021 push esi 0x00000022 pop esi 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F7FDD5 second address: F7FDDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F80069 second address: F80073 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push edx 0x00000007 pop edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F80073 second address: F80077 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F80077 second address: F8007D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8007D second address: F80082 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F80082 second address: F80088 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F80088 second address: F80090 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8246B second address: F8246F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F825DD second address: F825E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F825E5 second address: F825FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FD4D8D9C080h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F825FA second address: F82604 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007FD4D8DCC426h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F84E27 second address: F84E2B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F88ACB second address: F88ACF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F88ACF second address: F88AD5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F88AD5 second address: F88AF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FD4D8DCC437h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F87F66 second address: F87FAE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD4D8D9C07Ah 0x00000009 push edx 0x0000000a pop edx 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e pushad 0x0000000f jmp 00007FD4D8D9C084h 0x00000014 pushad 0x00000015 popad 0x00000016 jmp 00007FD4D8D9C082h 0x0000001b popad 0x0000001c pushad 0x0000001d jno 00007FD4D8D9C076h 0x00000023 pushad 0x00000024 popad 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F880FB second address: F880FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F880FF second address: F8813B instructions: 0x00000000 rdtsc 0x00000002 ja 00007FD4D8D9C076h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FD4D8D9C087h 0x0000000f jne 00007FD4D8D9C088h 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F883C1 second address: F883E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pushad 0x0000000a jmp 00007FD4D8DCC434h 0x0000000f push edi 0x00000010 pop edi 0x00000011 popad 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F883E2 second address: F88407 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8D9C07Ah 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FD4D8D9C085h 0x0000000e push edi 0x0000000f pop edi 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F88543 second address: F88560 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jg 00007FD4D8DCC435h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F88560 second address: F88570 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FD4D8D9C07Bh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F886F4 second address: F886F8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8E081 second address: F8E0A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8D9C07Ch 0x00000007 jmp 00007FD4D8D9C07Eh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jns 00007FD4D8D9C078h 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8E0A9 second address: F8E0CC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8DCC434h 0x00000007 pushad 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a jl 00007FD4D8DCC426h 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8CCDC second address: F8CCE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8CCE0 second address: F8CD00 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FD4D8DCC426h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FD4D8DCC432h 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8CF96 second address: F8CFA2 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FD4D8D9C076h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8D275 second address: F8D29F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jmp 00007FD4D8DCC437h 0x0000000a push edi 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d pushad 0x0000000e popad 0x0000000f pop edi 0x00000010 push eax 0x00000011 push edx 0x00000012 jne 00007FD4D8DCC426h 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8D411 second address: F8D42F instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FD4D8D9C089h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F8F76A second address: F8F76E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F929AC second address: F929C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD4D8D9C080h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F929C0 second address: F929DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8DCC432h 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F929DC second address: F929E5 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F95203 second address: F95207 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F9A2E7 second address: F9A2EF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F9A2EF second address: F9A2F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F9A2F5 second address: F9A320 instructions: 0x00000000 rdtsc 0x00000002 js 00007FD4D8D9C076h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FD4D8D9C084h 0x0000000f pop edx 0x00000010 pop eax 0x00000011 pushad 0x00000012 push esi 0x00000013 push eax 0x00000014 pop eax 0x00000015 push ebx 0x00000016 pop ebx 0x00000017 pop esi 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F9A477 second address: F9A47F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F9A47F second address: F9A483 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F9A483 second address: F9A4A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD4D8DCC438h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F9AA6C second address: F9AA7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FD4D8D9C076h 0x0000000a pop ecx 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F9ACD8 second address: F9ACE3 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 je 00007FD4D8DCC426h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F9ACE3 second address: F9ACF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 jbe 00007FD4D8D9C076h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F9ACF1 second address: F9ACF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F9B2EA second address: F9B321 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FD4D8D9C080h 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007FD4D8D9C07Fh 0x00000012 popad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 jp 00007FD4D8D9C078h 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F9B321 second address: F9B33D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD4D8DCC438h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F9B33D second address: F9B368 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8D9C084h 0x00000007 jmp 00007FD4D8D9C083h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F9B8DF second address: F9B8FA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FD4D8DCC42Bh 0x0000000b popad 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f jl 00007FD4D8DCC426h 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F9B8FA second address: F9B8FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F9BB99 second address: F9BBB6 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FD4D8DCC42Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FD4D8DCC42Bh 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F9BE9A second address: F9BEAD instructions: 0x00000000 rdtsc 0x00000002 jo 00007FD4D8D9C076h 0x00000008 jbe 00007FD4D8D9C076h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FA0573 second address: FA0577 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FA0ADC second address: FA0B0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FD4D8D9C076h 0x0000000a pop eax 0x0000000b jmp 00007FD4D8D9C085h 0x00000010 push edi 0x00000011 pushad 0x00000012 popad 0x00000013 pushad 0x00000014 popad 0x00000015 pop edi 0x00000016 popad 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a jns 00007FD4D8D9C076h 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FA0B0E second address: FA0B12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FA0C3D second address: FA0C4D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push ecx 0x00000008 je 00007FD4D8D9C07Eh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FA0EEC second address: FA0EF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FA0EF0 second address: FA0F03 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b jg 00007FD4D8D9C076h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FA1094 second address: FA10A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD4D8DCC42Ch 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FA10A4 second address: FA10A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FA10A8 second address: FA10C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FD4D8DCC42Eh 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FA58BE second address: FA58C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FA58C2 second address: FA58D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jne 00007FD4D8DCC426h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FA58D0 second address: FA58DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FA58DA second address: FA58E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FA58E0 second address: FA58E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FA58E4 second address: FA5918 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FD4D8DCC426h 0x00000008 jmp 00007FD4D8DCC42Eh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jmp 00007FD4D8DCC436h 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FA5918 second address: FA591E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FA591E second address: FA5941 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FD4D8DCC426h 0x0000000a popad 0x0000000b jnc 00007FD4D8DCC438h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAC418 second address: FAC43A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 push edi 0x00000007 pushad 0x00000008 jmp 00007FD4D8D9C088h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAC43A second address: FAC440 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAC594 second address: FAC598 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAC598 second address: FAC59C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAC59C second address: FAC5A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAC6E6 second address: FAC6F0 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FD4D8DCC432h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FAC6F0 second address: FAC6F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FACC1A second address: FACC2C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8DCC42Eh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FACC2C second address: FACC32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FADA0B second address: FADA21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 jno 00007FD4D8DCC42Eh 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FADA21 second address: FADA6C instructions: 0x00000000 rdtsc 0x00000002 ja 00007FD4D8D9C09Ch 0x00000008 jmp 00007FD4D8D9C080h 0x0000000d jmp 00007FD4D8D9C086h 0x00000012 push eax 0x00000013 push edx 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 jmp 00007FD4D8D9C089h 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FADA6C second address: FADA70 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FABA08 second address: FABA0D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EE01D7 second address: EE01E2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007FD4D8DCC426h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EE01E2 second address: EE01EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EE01EA second address: EE022D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a jmp 00007FD4D8DCC42Ch 0x0000000f pushad 0x00000010 popad 0x00000011 jmp 00007FD4D8DCC433h 0x00000016 popad 0x00000017 pushad 0x00000018 jmp 00007FD4D8DCC431h 0x0000001d push ebx 0x0000001e pop ebx 0x0000001f pushad 0x00000020 popad 0x00000021 popad 0x00000022 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EE022D second address: EE0238 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jns 00007FD4D8D9C076h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EE0238 second address: EE0240 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FBFB82 second address: FBFB91 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8D9C07Bh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC3A59 second address: FC3A5D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC3A5D second address: FC3A63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC3A63 second address: FC3A6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC3A6F second address: FC3AAE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8D9C086h 0x00000007 jmp 00007FD4D8D9C07Bh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jmp 00007FD4D8D9C081h 0x00000013 pushad 0x00000014 ja 00007FD4D8D9C076h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC360F second address: FC3615 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC3615 second address: FC3619 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC9787 second address: FC9796 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FD4D8DCC426h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC9796 second address: FC979C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC979C second address: FC97C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push ebx 0x00000006 jmp 00007FD4D8DCC438h 0x0000000b pop ebx 0x0000000c popad 0x0000000d push ebx 0x0000000e jo 00007FD4D8DCC428h 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FC84B6 second address: FC84BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD1294 second address: FD129E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FD4D8DCC426h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD129E second address: FD12D0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FD4D8D9C080h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 jmp 00007FD4D8D9C086h 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD12D0 second address: FD12D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD12D4 second address: FD12E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD12E1 second address: FD12F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 pop eax 0x00000009 jnl 00007FD4D8DCC426h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD7A41 second address: FD7A45 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD7A45 second address: FD7A64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 pushad 0x00000008 jmp 00007FD4D8DCC432h 0x0000000d push ebx 0x0000000e push esi 0x0000000f pop esi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD7A64 second address: FD7A6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push edi 0x00000008 pop edi 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD7D3E second address: FD7D54 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD4D8DCC432h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD7D54 second address: FD7D99 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8D9C07Bh 0x00000007 jnp 00007FD4D8D9C076h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 jmp 00007FD4D8D9C083h 0x00000015 push esi 0x00000016 pop esi 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007FD4D8D9C082h 0x00000022 pushad 0x00000023 popad 0x00000024 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD80A2 second address: FD80B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jmp 00007FD4D8DCC42Eh 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD80B5 second address: FD80C2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jc 00007FD4D8D9C076h 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD8228 second address: FD8231 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 popad 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD8231 second address: FD8237 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD8237 second address: FD823B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FD823B second address: FD823F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FDB293 second address: FDB29F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jg 00007FD4D8DCC426h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FDB29F second address: FDB2A9 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FD4D8D9C076h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FDB2A9 second address: FDB2B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FDDC23 second address: FDDC2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FDDC2C second address: FDDC31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FDDD93 second address: FDDD99 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FDDD99 second address: FDDD9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FDDD9D second address: FDDDC5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8D9C07Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FD4D8D9C084h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FDDDC5 second address: FDDDF7 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FD4D8DCC426h 0x00000008 jmp 00007FD4D8DCC439h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push esi 0x00000012 push eax 0x00000013 jng 00007FD4D8DCC426h 0x00000019 pop eax 0x0000001a push eax 0x0000001b push edx 0x0000001c push esi 0x0000001d pop esi 0x0000001e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FDDDF7 second address: FDDDFB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FE909D second address: FE90A8 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pop edx 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF698D second address: FF69B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD4D8D9C07Bh 0x00000009 popad 0x0000000a jmp 00007FD4D8D9C080h 0x0000000f push eax 0x00000010 push edx 0x00000011 push esi 0x00000012 pop esi 0x00000013 push ecx 0x00000014 pop ecx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF69B3 second address: FF69BD instructions: 0x00000000 rdtsc 0x00000002 jno 00007FD4D8DCC426h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FFF3B6 second address: FFF3E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FD4D8D9C076h 0x0000000a push edx 0x0000000b pop edx 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f je 00007FD4D8D9C076h 0x00000015 jmp 00007FD4D8D9C087h 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: EDE6F7 second address: EDE706 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 jno 00007FD4D8DCC426h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FFF7A5 second address: FFF7AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FFF7AB second address: FFF7B3 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FFF7B3 second address: FFF7D9 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FD4D8D9C07Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f jng 00007FD4D8D9C076h 0x00000015 popad 0x00000016 jg 00007FD4D8D9C07Ah 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FFF7D9 second address: FFF7E3 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FD4D8DCC42Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FFF7E3 second address: FFF7FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 jmp 00007FD4D8D9C07Eh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FFFC0A second address: FFFC14 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FD4D8DCC42Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1001687 second address: 10016B8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8D9C082h 0x00000007 jmp 00007FD4D8D9C086h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f push eax 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10016B8 second address: 10016D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD4D8DCC438h 0x00000009 push eax 0x0000000a pop eax 0x0000000b popad 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10016D7 second address: 10016F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD4D8D9C088h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10016F3 second address: 1001701 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FD4D8DCC426h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1001701 second address: 1001707 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1001707 second address: 100170D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1002E88 second address: 1002E8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1002E8E second address: 1002E93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1002E93 second address: 1002ED3 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FD4D8D9C07Eh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jg 00007FD4D8D9C07Ah 0x00000011 push edi 0x00000012 pop edi 0x00000013 push edx 0x00000014 pop edx 0x00000015 jmp 00007FD4D8D9C084h 0x0000001a pushad 0x0000001b jmp 00007FD4D8D9C07Ah 0x00000020 push ebx 0x00000021 pop ebx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1002ED3 second address: 1002EDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1002EDB second address: 1002EE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1006165 second address: 1006195 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8DCC438h 0x00000007 jmp 00007FD4D8DCC431h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push edi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1005BEC second address: 1005BF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1005BF0 second address: 1005C03 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FD4D8DCC42Dh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 100C6D2 second address: 100C6E8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jl 00007FD4D8D9C07Ch 0x00000010 jc 00007FD4D8D9C076h 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 100FEBA second address: 100FED1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FD4D8DCC426h 0x0000000a push esi 0x0000000b pop esi 0x0000000c popad 0x0000000d jmp 00007FD4D8DCC42Ah 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 100707F second address: 1007083 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1007083 second address: 10070AF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD4D8DCC432h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FD4D8DCC430h 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10070AF second address: 10070B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10070B3 second address: 10070BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10070BD second address: 10070C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1005E9E second address: 1005EA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1005EA2 second address: 1005EA6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F29E49 second address: F29E52 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F2A215 second address: F2A219 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: D6DDFE instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: F20207 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: F1EA0E instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: D6DD0A instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeMemory allocated: 4900000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 4AD0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 4900000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF91BA rdtsc 0_2_00EF91BA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F0B604 sidt fword ptr [esp-02h]0_2_00F0B604
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 7428Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: file.exe, file.exe, 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
Source: file.exe, 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: regmonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: gbdyllo
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: procmon_window_class
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: ollydbg
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: filemonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeFile opened: NTICE
Source: C:\Users\user\Desktop\file.exeFile opened: SICE
Source: C:\Users\user\Desktop\file.exeFile opened: SIWVID
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF91BA rdtsc 0_2_00EF91BA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D6B79E LdrInitializeThunk,0_2_00D6B79E
Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior
Source: file.exe, 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: =lProgram Manager
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4EF1B GetSystemTime,GetFileTime,0_2_00F4EF1B

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\Desktop\file.exeRegistry key value created / modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications DisableNotifications 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableIOAVProtection 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableRealtimeMonitoring 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\NotificationsRegistry value created: DisableNotifications 1Jump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry value created: TamperProtection 0Jump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AUOptionsJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AutoInstallMinorUpdatesJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate DoNotConnectToWindowsUpdateInternetLocationsJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
41
Disable or Modify Tools
LSASS Memory641
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
Bypass User Account Control
271
Virtualization/Sandbox Evasion
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS271
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets23
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
Software Packing
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
Bypass User Account Control
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe50%VirustotalBrowse
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1544237
Start date and time:2024-10-29 05:01:05 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 24s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal100.evad.winEXE@1/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): SIHClient.exe
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\file.exe
File Type:CSV text
Category:dropped
Size (bytes):226
Entropy (8bit):5.360398796477698
Encrypted:false
SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
MD5:3A8957C6382192B71471BD14359D0B12
SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
Malicious:true
Reputation:high, very likely benign file
Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.493835301781505
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:file.exe
File size:2'838'528 bytes
MD5:473c91c8363cf492cf6192686e4aeae8
SHA1:4f56b6e25bbf8bb424a3fbb398040d980850a046
SHA256:265c128a8a9421847dea2121ae5ce79efb601616c4fd060ff9863f4c2c498c2f
SHA512:09cebc8843d1f3aacc502af0e55736e24d7675ded01c7e402820cefda513d4826a7e91167cc548a1b356bf58defeaf3a456f08e24bc42d6b560382e351d73c12
SSDEEP:49152:hB7Lsq3Y5sVCMfyPfrUF8gHZrOCOox7SkPFA:hB3sGYkCOyPfru5rEoxW4FA
TLSH:C0D54B96B94572CFD48E17B48427CD87591C42B94B2108C7A86CB4BEBF67EC122BFC25
File Content Preview:MZ......................@...........z...................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P(,e.........."...0..$............+.. ...`....@.. ........................,......h+...`................................
Icon Hash:90cececece8e8eb0
Entrypoint:0x6bc000
Entrypoint Section:.taggant
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE
Time Stamp:0x652C2850 [Sun Oct 15 17:58:40 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:2eabe9054cad5152567f0699947a2c5b
Instruction
jmp 00007FD4D8D0067Ah
ucomiss xmm5, dqword ptr [ebx]
add byte ptr [eax], al
add byte ptr [eax], al
add cl, ch
add byte ptr [eax], ah
add byte ptr [eax], al
add byte ptr [esi], al
or al, byte ptr [eax]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], dl
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [edx], al
or al, byte ptr [eax]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [esi], al
or al, byte ptr [eax]
add byte ptr [edx], al
or al, byte ptr [eax]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [ecx], al
add byte ptr [eax], 00000000h
add byte ptr [eax], al
add byte ptr [eax], al
adc byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add al, 0Ah
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x80550x69.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000x59c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x81f80x8.idata
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
0x20000x40000x12008c2d55778105ef17ccbdb9f6e2b2a06fFalse0.9338107638888888data7.808125394250483IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x60000x59c0x600aae15e30898a02f09cc86ed48aa06b09False0.4140625data4.036947054771808IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata 0x80000x20000x200ec9cb51e8cb4ea49a56ee3cf434fb69eFalse0.1484375data0.9342685949460681IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
bbzqfojp0xa0000x2b00000x2af000f23ee005ad453ae2faa65d42f77c950eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
ynvwdqnr0x2ba0000x20000x400424fc4f14c0d52d5a0d3d976ecfabee2False0.728515625data5.75923506799732IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.taggant0x2bc0000x40000x2200e6ed33c3d65263b5cdc36d825c591ec5False0.05801930147058824DOS executable (COM)0.6635176664795832IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x60900x30cdata0.42948717948717946
RT_MANIFEST0x63ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
DLLImport
kernel32.dlllstrcpy
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:00:01:57
Start date:29/10/2024
Path:C:\Users\user\Desktop\file.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\file.exe"
Imagebase:0xd60000
File size:2'838'528 bytes
MD5 hash:473C91C8363CF492CF6192686E4AEAE8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:4.5%
    Dynamic/Decrypted Code Coverage:3.5%
    Signature Coverage:1.5%
    Total number of Nodes:341
    Total number of Limit Nodes:16
    execution_graph 8834 f4fef7 8836 f4ff03 8834->8836 8837 f4ff1b 8836->8837 8840 f4ff23 8836->8840 8844 f4af0a 8837->8844 8841 f4ff45 8840->8841 8842 f4fe31 8840->8842 8848 f4fe3d 8842->8848 8845 f4af28 8844->8845 8846 f4aeac RtlAllocateHeap 8845->8846 8847 f4af32 8846->8847 8847->8840 8859 f4adce GetCurrentThreadId 8848->8859 8850 f4fe50 8851 f4fe75 8850->8851 8852 f4fe6a 8850->8852 8853 f4fe8e 8851->8853 8854 f4fec9 8851->8854 8875 f4d644 8852->8875 8857 f4fe70 8853->8857 8863 f4d508 8853->8863 8856 f4fece CreateFileMappingA 8854->8856 8856->8857 8860 f4ade6 8859->8860 8861 f4ae2d 8860->8861 8862 f4ae1c Sleep 8860->8862 8861->8850 8862->8860 8864 f4d51f 8863->8864 8865 f4d531 8863->8865 8867 f4aeac RtlAllocateHeap 8864->8867 8871 f4d61c 8865->8871 8879 f4aeac 8865->8879 8867->8865 8868 f4d54f 8869 f4d588 CreateFileA 8868->8869 8868->8871 8870 f4d5cd 8869->8870 8870->8871 8883 f4abee 8870->8883 8871->8857 8876 f4d66d 8875->8876 8877 f4abee RtlAllocateHeap 8876->8877 8878 f4d6b2 8876->8878 8877->8878 8878->8857 8880 f4aeb6 8879->8880 8881 f4aecd 8880->8881 8882 f4aebf RtlAllocateHeap 8880->8882 8881->8868 8882->8881 8884 f4aeac RtlAllocateHeap 8883->8884 8885 f4abfc 8884->8885 8885->8871 8886 f4cbe7 CloseHandle 8885->8886 8887 f4cbfb 8886->8887 8887->8871 8888 d6b79e 8889 d6b7a3 8888->8889 8890 d6b90e LdrInitializeThunk 8889->8890 8891 f4c93d 8893 f4c949 8891->8893 8894 f4c95d 8893->8894 8895 f4c965 8893->8895 8896 f4af0a RtlAllocateHeap 8894->8896 8898 f4c985 8895->8898 8899 f4c99e 8895->8899 8896->8895 8901 f4c9a7 8899->8901 8902 f4c9b6 8901->8902 8903 f4adce 2 API calls 8902->8903 8909 f4c9be 8902->8909 8906 f4c9c8 8903->8906 8904 f4ca61 GetModuleHandleW 8910 f4c9f6 8904->8910 8905 f4ca6f GetModuleHandleA 8905->8910 8907 f4c9e3 8906->8907 8911 f4b4e0 8906->8911 8907->8909 8907->8910 8909->8904 8909->8905 8912 f4b52e 8911->8912 8913 f4b4f1 8911->8913 8912->8907 8913->8912 8915 f4b381 8913->8915 8916 f4b3ae 8915->8916 8917 f4b3dc PathAddExtensionA 8916->8917 8918 f4b3f7 8916->8918 8924 f4b4b4 8916->8924 8917->8918 8920 f4b419 8918->8920 8927 f4b022 8918->8927 8921 f4b462 8920->8921 8920->8924 8925 f4b022 lstrcmpiA 8920->8925 8922 f4b48b 8921->8922 8923 f4b022 lstrcmpiA 8921->8923 8921->8924 8922->8924 8926 f4b022 lstrcmpiA 8922->8926 8923->8922 8924->8913 8925->8921 8926->8924 8928 f4b040 8927->8928 8929 f4b057 8928->8929 8931 f4af9f 8928->8931 8929->8920 8933 f4afca 8931->8933 8932 f4b012 8932->8929 8933->8932 8934 f4affc lstrcmpiA 8933->8934 8934->8932 8935 49a1510 8936 49a1558 ControlService 8935->8936 8937 49a158f 8936->8937 8938 d6e7dd 8939 d6e7f8 VirtualAlloc 8938->8939 8941 d6f6d7 8939->8941 8942 ef5321 LoadLibraryA 8943 ef5329 8942->8943 8944 f4c6fb 8946 f4c704 8944->8946 8947 f4c713 8946->8947 8948 f4c71b 8947->8948 8950 f4adce 2 API calls 8947->8950 8949 f4c748 GetProcAddress 8948->8949 8955 f4c73e 8949->8955 8951 f4c725 8950->8951 8952 f4c735 8951->8952 8953 f4c743 8951->8953 8956 f4c15c 8952->8956 8953->8949 8957 f4c17b 8956->8957 8961 f4c248 8956->8961 8958 f4c1b8 lstrcmpiA 8957->8958 8959 f4c1e2 8957->8959 8957->8961 8958->8957 8958->8959 8959->8961 8962 f4c0a5 8959->8962 8961->8955 8963 f4c0b6 8962->8963 8964 f4aeac RtlAllocateHeap 8963->8964 8971 f4c141 8963->8971 8965 f4c0de 8964->8965 8966 f4c0e6 lstrcpyn 8965->8966 8965->8971 8968 f4c102 8966->8968 8966->8971 8968->8971 8972 f4b5ea 8968->8972 8971->8961 8984 f4c42d 8972->8984 8992 f4c494 8984->8992 8994 f4c4a1 8992->8994 8996 f4c4b7 8994->8996 8995 f4c4bf 8997 f4c58c 8995->8997 8998 f4c59f 8995->8998 8996->8995 8999 f4adce 2 API calls 8996->8999 9025 f4c2cc 8997->9025 9001 f4c5bd LoadLibraryExA 8998->9001 9002 f4c5a9 LoadLibraryExW 8998->9002 9003 f4c4e1 8999->9003 9004 f4c563 9001->9004 9002->9004 9005 f4b4e0 2 API calls 9003->9005 9006 f4c4f2 9005->9006 9006->8995 9007 f4c520 9006->9007 9009 f4be0c 9007->9009 9010 f4be28 9009->9010 9011 f4be32 9009->9011 9010->9004 9029 f4b65f 9011->9029 9016 f4c61e 3 API calls 9016->9010 9018 f4be82 9019 f4beaf 9018->9019 9024 f4bee7 9018->9024 9039 f4b83d 9018->9039 9043 f4bad8 9019->9043 9022 f4beba 9022->9024 9048 f4ba4f 9022->9048 9024->9010 9024->9016 9026 f4c2d7 9025->9026 9027 f4c2e7 9026->9027 9028 f4c2f8 LoadLibraryExA 9026->9028 9027->9004 9028->9027 9030 f4b67b 9029->9030 9032 f4b6d4 9029->9032 9031 f4b6ab VirtualAlloc 9030->9031 9030->9032 9031->9032 9032->9010 9033 f4b705 VirtualAlloc 9032->9033 9034 f4b74a 9033->9034 9034->9024 9035 f4b782 9034->9035 9036 f4b7aa 9035->9036 9037 f4b821 9036->9037 9038 f4b7c3 VirtualAlloc 9036->9038 9037->9018 9038->9036 9038->9037 9040 f4b858 9039->9040 9042 f4b85d 9039->9042 9040->9019 9041 f4b890 lstrcmpiA 9041->9040 9041->9042 9042->9040 9042->9041 9044 f4bbe4 9043->9044 9046 f4bb05 9043->9046 9044->9022 9045 f4b5ea 17 API calls 9045->9046 9046->9044 9046->9045 9047 f4c6fb 17 API calls 9046->9047 9047->9046 9051 f4ba78 9048->9051 9049 f4bab9 9049->9024 9050 f4ba90 VirtualProtect 9050->9049 9050->9051 9051->9049 9051->9050 9072 f4c5e5 9073 f4c42d 17 API calls 9072->9073 9074 f4c5f8 9073->9074 9075 49a1308 9076 49a1349 ImpersonateLoggedOnUser 9075->9076 9077 49a1376 9076->9077 9078 49a0d48 9079 49a0d93 OpenSCManagerW 9078->9079 9081 49a0ddc 9079->9081 9082 ef91ba CreateFileA 9083 ef91ce 9082->9083 9083->9083 9084 d6ed83 VirtualAlloc 9085 d6ed9a 9084->9085 9086 f4c8a2 9088 f4c8ae 9086->9088 9089 f4aeac RtlAllocateHeap 9088->9089 9091 f4c8c7 9089->9091 9090 f4c91a 9091->9090 9096 f4c765 9091->9096 9098 f4c774 9096->9098 9099 f4adce 2 API calls 9098->9099 9100 f4c780 9099->9100 9101 f4c790 9100->9101 9102 f4c86f 9100->9102 9103 f4c7a4 GetModuleFileNameA 9101->9103 9104 f4c7f2 GetFullPathNameA 9101->9104 9106 f4c874 GetModuleFileNameA 9102->9106 9105 f4c7c3 9103->9105 9107 f4c813 9104->9107 9105->9107 9106->9107 9108 f01d2d 9109 f0277c LoadLibraryA 9108->9109 9111 f50055 9112 f4adce 2 API calls 9111->9112 9113 f50061 9112->9113 9114 f5007a 9113->9114 9115 f500c4 9113->9115 9116 f50086 9114->9116 9117 f500ad 9114->9117 9119 f500c9 MapViewOfFileEx 9115->9119 9120 f500a1 9116->9120 9122 f4bc76 9116->9122 9128 f4d6df 9117->9128 9119->9120 9123 f4bc86 9122->9123 9127 f4bd35 9122->9127 9123->9127 9132 f4acde 9123->9132 9126 f4acde RtlAllocateHeap 9126->9127 9127->9120 9130 f4d6ef 9128->9130 9131 f4d74b 9128->9131 9129 f4acde RtlAllocateHeap 9129->9131 9130->9129 9130->9131 9131->9120 9133 f4aeac RtlAllocateHeap 9132->9133 9134 f4acec 9133->9134 9134->9126 9134->9127 9135 f4ca90 9136 f4adce 2 API calls 9135->9136 9137 f4ca9c 9136->9137 9138 f4b4e0 2 API calls 9137->9138 9139 f4caba 9137->9139 9138->9139 9140 f4caeb GetModuleHandleExA 9139->9140 9141 f4cac2 9139->9141 9140->9141 9142 49a10f0 9143 49a1131 9142->9143 9146 f4db22 9143->9146 9144 49a1151 9147 f4adce 2 API calls 9146->9147 9148 f4db2e 9147->9148 9149 f4db57 9148->9149 9150 f4db47 9148->9150 9152 f4db5c CloseHandle 9149->9152 9154 f4cc0e 9150->9154 9153 f4db4d 9152->9153 9153->9144 9157 f4ac79 9154->9157 9158 f4ac8f 9157->9158 9160 f4aca9 9158->9160 9161 f4ac5d 9158->9161 9160->9153 9162 f4cbe7 CloseHandle 9161->9162 9163 f4ac6d 9162->9163 9163->9160 9164 f4f39e 9166 f4f3aa 9164->9166 9167 f4adce 2 API calls 9166->9167 9168 f4f3b6 9167->9168 9169 f4af0a RtlAllocateHeap 9168->9169 9170 f4f3ce 9169->9170 9172 f4f3d6 9170->9172 9173 f4f2f5 9170->9173 9175 f4f301 9173->9175 9176 f4f315 9175->9176 9177 f4adce 2 API calls 9176->9177 9178 f4f32d 9177->9178 9186 f4b532 9178->9186 9181 f4f358 9182 f4b4e0 2 API calls 9183 f4f350 9182->9183 9183->9181 9184 f4f374 GetFileAttributesW 9183->9184 9185 f4f385 GetFileAttributesA 9183->9185 9184->9181 9185->9181 9187 f4b5e6 9186->9187 9188 f4b546 9186->9188 9187->9181 9187->9182 9188->9187 9189 f4b381 2 API calls 9188->9189 9189->9188 9190 f4f718 9192 f4f721 9190->9192 9193 f4adce 2 API calls 9192->9193 9194 f4f72d 9193->9194 9195 f4f77d ReadFile 9194->9195 9196 f4f746 9194->9196 9195->9196 9197 ef8f01 9198 ef8e8a CreateFileA 9197->9198 9199 ef8f09 9197->9199 9200 ef8e95 9198->9200 9201 f4f605 9203 f4f611 9201->9203 9204 f4adce 2 API calls 9203->9204 9205 f4f61d 9204->9205 9206 f4af0a RtlAllocateHeap 9205->9206 9207 f4f635 9206->9207 9209 f4f63d 9207->9209 9210 f4f511 9207->9210 9212 f4f51d 9210->9212 9213 f4f531 9212->9213 9214 f4adce 2 API calls 9213->9214 9215 f4f549 9214->9215 9216 f4f55e 9215->9216 9239 f4f42a 9215->9239 9220 f4f566 9216->9220 9228 f4f4cf IsBadWritePtr 9216->9228 9222 f4f5b7 CreateFileW 9220->9222 9223 f4f5da CreateFileA 9220->9223 9221 f4b4e0 2 API calls 9224 f4f599 9221->9224 9227 f4f5a7 9222->9227 9223->9227 9224->9220 9225 f4f5a1 9224->9225 9230 f4cd24 9225->9230 9229 f4f4f1 9228->9229 9229->9220 9229->9221 9231 f4aeac RtlAllocateHeap 9230->9231 9235 f4cd31 9231->9235 9232 f4ce2c 9232->9227 9233 f4cd6a CreateFileA 9234 f4cdb6 9233->9234 9234->9232 9236 f4abee RtlAllocateHeap 9234->9236 9235->9232 9235->9233 9237 f4ce18 9236->9237 9237->9232 9238 f4cbe7 CloseHandle 9237->9238 9238->9232 9241 f4f439 GetWindowsDirectoryA 9239->9241 9242 f4f463 9241->9242 9243 f4c606 9246 f4c446 9243->9246 9248 f4c452 9246->9248 9249 f4af0a RtlAllocateHeap 9248->9249 9250 f4c467 9249->9250 9251 f4c494 17 API calls 9250->9251 9252 f4c485 9250->9252 9251->9252 9253 ef9016 9254 ef901d CreateFileA 9253->9254 9255 ef9032 9254->9255 9256 f02e8c 9257 f02ea4 9256->9257 9258 f068d3 RegOpenKeyA 9257->9258 9259 f068fa RegOpenKeyA 9257->9259 9258->9259 9260 f068f0 9258->9260 9261 f06917 9259->9261 9260->9259 9262 f0695b GetNativeSystemInfo 9261->9262 9263 f02af7 9261->9263 9262->9263 9264 f4ee89 9265 f4adce 2 API calls 9264->9265 9266 f4ee95 GetCurrentProcess 9265->9266 9267 f4eee1 9266->9267 9269 f4eea5 9266->9269 9268 f4eee6 DuplicateHandle 9267->9268 9272 f4eedc 9268->9272 9269->9267 9270 f4eed0 9269->9270 9273 f4cc26 9270->9273 9274 f4cc50 9273->9274 9276 f4cc9e 9274->9276 9277 f4abee RtlAllocateHeap 9274->9277 9275 f4cce3 9275->9272 9276->9275 9278 f4cc0e CloseHandle 9276->9278 9277->9276 9278->9275 9279 f4cb09 9281 f4cb15 9279->9281 9282 f4cb29 9281->9282 9284 f4cb31 9281->9284 9283 f4af0a RtlAllocateHeap 9282->9283 9283->9284

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 222 ef91ba-ef91c8 CreateFileA 223 ef920e-ef9211 222->223 224 ef91ce-ef91e9 222->224 226 ef921a-ef921d 223->226 227 ef9217 223->227 230 ef932a-ef933c call ef933f 224->230 228 ef921f-ef9291 226->228 229 ef9293-ef92a0 226->229 227->226 231 ef92a3-ef92cc call ef92d9 228->231 229->231 243 ef92ef-ef9300 231->243 244 ef92ce 231->244 245 ef9303 243->245 244->230 245->245
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID: C
    • API String ID: 823142352-1037565863
    • Opcode ID: 30803a9bba2927f9fd7545e8688d2b4af72ea1ad680a18db4108f2f950ef4721
    • Instruction ID: 62b4ef86013892245a0ebfadb5bec9e6d9188d16681744244ab4d54ddde9e620
    • Opcode Fuzzy Hash: 30803a9bba2927f9fd7545e8688d2b4af72ea1ad680a18db4108f2f950ef4721
    • Instruction Fuzzy Hash: F811297220825EBDFB149F25FC507FF3798EBD5315B70902AFAC5E6513D2254D019A28
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID:
    • String ID: !!iH
    • API String ID: 0-3430752988
    • Opcode ID: e404b68e764ee4fe848ca8e7b9373d9d418192bb8907214d3b60954e6114a3d3
    • Instruction ID: 8cb698c5fe43bab2269d52851e6aef65b29956356951d9f47ac363bce316eda4
    • Opcode Fuzzy Hash: e404b68e764ee4fe848ca8e7b9373d9d418192bb8907214d3b60954e6114a3d3
    • Instruction Fuzzy Hash: 15E0C2322449898BDB1A9F64880175D3B0DDB40720F904217FA51DBE49CB2D4D518B75

    Control-flow Graph

    APIs
    • LoadLibraryExW.KERNEL32(?,?,?), ref: 00F4C5B2
    • LoadLibraryExA.KERNELBASE(00000000,?,?), ref: 00F4C5C6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID: .dll$.exe$1002
    • API String ID: 1029625771-847511843
    • Opcode ID: 6e0f6f6594ef15d2efafca4f3238af3048b45dd8c8102dc1e78085fbd3988da2
    • Instruction ID: 1f1e0a429987b4b3d817996bc7eab9916d50ee616cd0e28c699f2fea5b460766
    • Opcode Fuzzy Hash: 6e0f6f6594ef15d2efafca4f3238af3048b45dd8c8102dc1e78085fbd3988da2
    • Instruction Fuzzy Hash: 4A318B72802209EFCF61AF54D900AAE7F75FF04321F14A155FE0196161D730AAA0FBE1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 37 f4c9a7-f4c9b8 call f4c30b 40 f4c9c3-f4c9cc call f4adce 37->40 41 f4c9be 37->41 48 f4ca00-f4ca07 40->48 49 f4c9d2-f4c9de call f4b4e0 40->49 42 f4ca57-f4ca5b 41->42 44 f4ca61-f4ca6a GetModuleHandleW 42->44 45 f4ca6f-f4ca72 GetModuleHandleA 42->45 47 f4ca78 44->47 45->47 51 f4ca82-f4ca84 47->51 52 f4ca52 call f4ae79 48->52 53 f4ca0d-f4ca14 48->53 55 f4c9e3-f4c9e5 49->55 52->42 53->52 56 f4ca1a-f4ca21 53->56 55->52 57 f4c9eb-f4c9f0 55->57 56->52 58 f4ca27-f4ca2e 56->58 57->52 59 f4c9f6-f4ca7d call f4ae79 57->59 58->52 60 f4ca34-f4ca48 58->60 59->51 60->52
    APIs
    • GetModuleHandleW.KERNEL32(?,?,?,?,00F4C939,?,00000000,00000000), ref: 00F4CA64
    • GetModuleHandleA.KERNEL32(00000000,?,?,?,00F4C939,?,00000000,00000000), ref: 00F4CA72
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: HandleModule
    • String ID: .dll
    • API String ID: 4139908857-2738580789
    • Opcode ID: ebef7399265695470a19adb2060935dea92424f7f06adb8bd7071ba154e382ca
    • Instruction ID: ebb94822f04a1fdd53ae9e101c61674a48c966328a0d26c3f8f82909ebcb00f4
    • Opcode Fuzzy Hash: ebef7399265695470a19adb2060935dea92424f7f06adb8bd7071ba154e382ca
    • Instruction Fuzzy Hash: 2F113C3150660DEBEBB0DF61C8187A97F70BF01399F04A226AD05548E0D7BD99E4FAD2

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 64 f4f301-f4f30f 65 f4f315-f4f31c 64->65 66 f4f321 64->66 67 f4f328-f4f33e call f4adce call f4b532 65->67 66->67 72 f4f344-f4f352 call f4b4e0 67->72 73 f4f35d 67->73 78 f4f358 72->78 79 f4f369-f4f36e 72->79 75 f4f361-f4f364 73->75 77 f4f394-f4f39b call f4ae79 75->77 78->75 82 f4f374-f4f380 GetFileAttributesW 79->82 83 f4f385-f4f388 GetFileAttributesA 79->83 84 f4f38e-f4f38f 82->84 83->84 84->77
    APIs
    • GetFileAttributesW.KERNELBASE(00796FAC,-11565FEC), ref: 00F4F37A
    • GetFileAttributesA.KERNEL32(00000000,-11565FEC), ref: 00F4F388
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: AttributesFile
    • String ID: @
    • API String ID: 3188754299-2726393805
    • Opcode ID: 5da3815f3c7ee91d6bf2a5b35ad5221ae9d4374ab510228c100822a41dc727f8
    • Instruction ID: 63110aa05acfb06be03d3ad50aadd520ea2960e209ce16599cb5e8a3321f57a3
    • Opcode Fuzzy Hash: 5da3815f3c7ee91d6bf2a5b35ad5221ae9d4374ab510228c100822a41dc727f8
    • Instruction Fuzzy Hash: 8C01D131504208FBEB20DF54D909BADBE70BF40345F104135ED0A650A1C7789A99FB00

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 85 f4c774-f4c77b call f4adce 87 f4c780-f4c78a call f4c253 85->87 90 f4c790-f4c79e 87->90 91 f4c86f-f4c88a call f4ae79 GetModuleFileNameA 87->91 93 f4c7a4-f4c7c1 GetModuleFileNameA 90->93 94 f4c7f2-f4c80d GetFullPathNameA 90->94 101 f4c894-f4c89f 91->101 95 f4c7c3-f4c7c6 93->95 97 f4c813-f4c82b 94->97 98 f4c88f call f4ae79 94->98 99 f4c7d2-f4c7d4 95->99 100 f4c7cc-f4c7cd 95->100 107 f4c831-f4c84d 97->107 108 f4c852-f4c86a 97->108 98->101 103 f4c7d6-f4c7d9 99->103 100->95 105 f4c7df-f4c7e5 103->105 106 f4c7ea-f4c7ed 103->106 105->103 106->97 107->98 108->98
    APIs
      • Part of subcall function 00F4ADCE: GetCurrentThreadId.KERNEL32 ref: 00F4ADDD
      • Part of subcall function 00F4ADCE: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 00F4AE20
    • GetModuleFileNameA.KERNEL32(00000000,?,0000028B,-11565FEC,00000000,?), ref: 00F4C7B4
    • GetFullPathNameA.KERNEL32(?,0000028B,?,00000000,-11565FEC,?), ref: 00F4C804
    • GetModuleFileNameA.KERNEL32(?,?,?,?), ref: 00F4C87D
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: Name$FileModule$CurrentFullPathSleepThread
    • String ID:
    • API String ID: 90702387-0
    • Opcode ID: 0ed051ced67f10be75c88da400698d3b09036beb84bb61679636a5fb74a07702
    • Instruction ID: 7bef713297981721a1d3d6c64d375f123eea852b977a62bdbefb246da1bcd922
    • Opcode Fuzzy Hash: 0ed051ced67f10be75c88da400698d3b09036beb84bb61679636a5fb74a07702
    • Instruction Fuzzy Hash: 2D315C72A0124AEFEB61DF64CC88F9ABFB4FF45341F105194F90696150C7705991EFA1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 111 f02e8c-f068d1 116 f068d3-f068ee RegOpenKeyA 111->116 117 f068fa-f06915 RegOpenKeyA 111->117 116->117 118 f068f0 116->118 119 f06917-f06921 117->119 120 f0692d-f06959 117->120 118->117 119->120 123 f06966-f06970 120->123 124 f0695b-f06964 GetNativeSystemInfo 120->124 125 f06972 123->125 126 f0697c-f0698a 123->126 124->123 125->126 128 f06996-f0699d 126->128 129 f0698c 126->129 130 f069b0 128->130 131 f069a3-f069aa 128->131 129->128 130->130 131->130 132 f02af7-f02afe 131->132 133 f05b14-f05b2a 132->133 134 f02b04-f02b15 132->134 134->133
    APIs
    • RegOpenKeyA.ADVAPI32(80000001,?,?), ref: 00F068E6
    • RegOpenKeyA.ADVAPI32(80000002,?,?), ref: 00F0690D
    • GetNativeSystemInfo.KERNELBASE(?), ref: 00F06964
    Memory Dump Source
    • Source File: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: Open$InfoNativeSystem
    • String ID:
    • API String ID: 1247124224-0
    • Opcode ID: e640548f7210ecea793ec1c35a5930a3d5ecd17de2289438ea2e392bf770d754
    • Instruction ID: c58d5a094648848d219479b49a1e12b7d998419f21238dcaf24c783346cc2cb2
    • Opcode Fuzzy Hash: e640548f7210ecea793ec1c35a5930a3d5ecd17de2289438ea2e392bf770d754
    • Instruction Fuzzy Hash: BC31F9B290420EDFEF15DF24C888BEF3AA5EF04315F100426E945C6980E7B65DA8EF59

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 135 ef8e45-ef8e8f CreateFileA 138 ef920e-ef9211 135->138 139 ef8e95-ef8edd 135->139 140 ef921a-ef921d 138->140 141 ef9217 138->141 145 ef8ee3 139->145 146 ef8ede call ef8ee6 139->146 143 ef921f-ef9291 140->143 144 ef9293-ef92a0 140->144 141->140 147 ef92a3-ef92cc call ef92d9 143->147 144->147 146->145 157 ef92ef-ef9300 147->157 158 ef92ce-ef933c call ef933f 147->158 160 ef9303 157->160 160->160
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID: C
    • API String ID: 823142352-1037565863
    • Opcode ID: ed749c4605fde718d32bff215c1549dd485eb74871428ff03481369f8548cf54
    • Instruction ID: 35805e4966881474e0e4995b6a909a75ef7619182f3758c5880fbc90b5545230
    • Opcode Fuzzy Hash: ed749c4605fde718d32bff215c1549dd485eb74871428ff03481369f8548cf54
    • Instruction Fuzzy Hash: 0B3107B710C2597DF7018E61BE10AFF7BADE9D2330730906BF982D6413D2650D495631

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 163 ef8fc7-ef902c CreateFileA 167 ef920e-ef9211 163->167 168 ef9032-ef903a call ef903d 163->168 169 ef921a-ef921d 167->169 170 ef9217 167->170 173 ef921f-ef9291 169->173 174 ef9293-ef92a0 169->174 170->169 175 ef92a3-ef92cc call ef92d9 173->175 174->175 185 ef92ef-ef9300 175->185 186 ef92ce-ef933c call ef933f 175->186 188 ef9303 185->188 188->188
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID: C
    • API String ID: 823142352-1037565863
    • Opcode ID: b3faeaa6eeed1dd233edd1f697fb6d6a5c99139d4fa4a8fb0a4242940acd8d83
    • Instruction ID: 07e3433485009f7f77b84ba4b8ca757b818aff6624bd68069adaafac2505dd4f
    • Opcode Fuzzy Hash: b3faeaa6eeed1dd233edd1f697fb6d6a5c99139d4fa4a8fb0a4242940acd8d83
    • Instruction Fuzzy Hash: B32131B220C26E7CF7018E21BD60BFE37ADEAE6330730A02AF982E6053D6554D495534

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 191 f4b381-f4b3b1 193 f4b3b7-f4b3cc 191->193 194 f4b4dc-f4b4dd 191->194 193->194 196 f4b3d2-f4b3d6 193->196 197 f4b3dc-f4b3ee PathAddExtensionA 196->197 198 f4b3f8-f4b3ff 196->198 201 f4b3f7 197->201 199 f4b405-f4b414 call f4b022 198->199 200 f4b421-f4b428 198->200 207 f4b419-f4b41b 199->207 203 f4b42e-f4b435 200->203 204 f4b46a-f4b471 200->204 201->198 208 f4b44e-f4b45d call f4b022 203->208 209 f4b43b-f4b444 203->209 205 f4b477-f4b48d call f4b022 204->205 206 f4b493-f4b49a 204->206 205->194 205->206 211 f4b4a0-f4b4b6 call f4b022 206->211 212 f4b4bc-f4b4c3 206->212 207->194 207->200 218 f4b462-f4b464 208->218 209->208 213 f4b44a 209->213 211->194 211->212 212->194 217 f4b4c9-f4b4d6 call f4b05b 212->217 213->208 217->194 218->194 218->204
    APIs
    • PathAddExtensionA.KERNELBASE(?,00000000), ref: 00F4B3E3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: ExtensionPath
    • String ID: \\?\
    • API String ID: 158807944-4282027825
    • Opcode ID: e127de9b3995de84e7bbe567394b28fa470f06f13e6a9be16b1b4839cb9978b6
    • Instruction ID: f847c58ee0b18be3f72925a07d754d782ba46d059234fe7136d359f5af70a1f0
    • Opcode Fuzzy Hash: e127de9b3995de84e7bbe567394b28fa470f06f13e6a9be16b1b4839cb9978b6
    • Instruction Fuzzy Hash: 7131F435A0020ABFEF26DF94CC09B9EBE7AAF44351F001564BE01A50A3D776DA65EB50

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 246 f4ca90-f4caa3 call f4adce 249 f4cae6-f4cafa call f4ae79 GetModuleHandleExA 246->249 250 f4caa9-f4cab5 call f4b4e0 246->250 255 f4cb04-f4cb06 249->255 254 f4caba-f4cabc 250->254 254->249 256 f4cac2-f4cac9 254->256 257 f4cad2-f4caff call f4ae79 256->257 258 f4cacf 256->258 257->255 258->257
    APIs
      • Part of subcall function 00F4ADCE: GetCurrentThreadId.KERNEL32 ref: 00F4ADDD
      • Part of subcall function 00F4ADCE: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 00F4AE20
    • GetModuleHandleExA.KERNELBASE(?,?,?), ref: 00F4CAF4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: CurrentHandleModuleSleepThread
    • String ID: .dll
    • API String ID: 683542999-2738580789
    • Opcode ID: 001a9703c3686ecf6ffba8d1e283c45a27dbe446b49939ec86fbf8579e56461f
    • Instruction ID: 2a3b7862c85d0e8221766f4da8da8c4e69223f5256e46706a34227a775f59ff2
    • Opcode Fuzzy Hash: 001a9703c3686ecf6ffba8d1e283c45a27dbe446b49939ec86fbf8579e56461f
    • Instruction Fuzzy Hash: 91F09A72640208AFDF60EF64DC46BAA3FA5FF08350F108111FE158A162D739C8A0FAA1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 261 f4f51d-f4f52b 262 f4f531-f4f538 261->262 263 f4f53d 261->263 264 f4f544-f4f550 call f4adce 262->264 263->264 267 f4f556-f4f560 call f4f42a 264->267 268 f4f56b-f4f57b call f4f4cf 264->268 267->268 273 f4f566 267->273 274 f4f581-f4f588 268->274 275 f4f58d-f4f59b call f4b4e0 268->275 276 f4f5ac-f4f5b1 273->276 274->276 275->276 281 f4f5a1-f4f5a2 call f4cd24 275->281 278 f4f5b7-f4f5d5 CreateFileW 276->278 279 f4f5da-f4f5ef CreateFileA 276->279 282 f4f5f5-f4f5f6 278->282 279->282 285 f4f5a7 281->285 284 f4f5fb-f4f602 call f4ae79 282->284 285->284
    APIs
    • CreateFileW.KERNELBASE(00796FAC,?,?,-11565FEC,?,?,?,-11565FEC,?), ref: 00F4F5CF
      • Part of subcall function 00F4F4CF: IsBadWritePtr.KERNEL32(?,00000004), ref: 00F4F4DD
    • CreateFileA.KERNEL32(?,?,?,-11565FEC,?,?,?,-11565FEC,?), ref: 00F4F5EF
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: CreateFile$Write
    • String ID:
    • API String ID: 1125675974-0
    • Opcode ID: 24ae78a87fbaf4550aa7f60ee613d66ff6a4493508ffb9215387471eb459151d
    • Instruction ID: 5c570f49d7e73da629cc0049f01a553abbc3c831db3fb15624bff9c16e5c714e
    • Opcode Fuzzy Hash: 24ae78a87fbaf4550aa7f60ee613d66ff6a4493508ffb9215387471eb459151d
    • Instruction Fuzzy Hash: 6B11D37240410AFBDF12AFA0DD09B9A3E72BF04355F184025BD19644B1DB7ACABAFB51

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 288 f4ee89-f4ee9f call f4adce GetCurrentProcess 291 f4eea5-f4eea8 288->291 292 f4eee1-f4ef03 call f4ae79 DuplicateHandle 288->292 291->292 294 f4eeae-f4eeb1 291->294 298 f4ef0d-f4ef0f 292->298 294->292 296 f4eeb7-f4eeca call f4ac28 294->296 296->292 300 f4eed0-f4ef08 call f4cc26 call f4ae79 296->300 300->298
    APIs
      • Part of subcall function 00F4ADCE: GetCurrentThreadId.KERNEL32 ref: 00F4ADDD
      • Part of subcall function 00F4ADCE: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 00F4AE20
    • GetCurrentProcess.KERNEL32(-11565FEC), ref: 00F4EE96
    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00F4EEFC
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: Current$DuplicateHandleProcessSleepThread
    • String ID:
    • API String ID: 2846201637-0
    • Opcode ID: ba8f0aab26549dd618a3c14c4b423096dae45a37d38cf729524214c118efb274
    • Instruction ID: d95f220f2e43439a938528b41772b33aa3268652802d5c8ccd3a9725f3309c13
    • Opcode Fuzzy Hash: ba8f0aab26549dd618a3c14c4b423096dae45a37d38cf729524214c118efb274
    • Instruction Fuzzy Hash: 9201F67254004ABB8F12AFA8DC49DAE3F7ABF883647014615FE5494020C73AC4A2FB62

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 305 f4c8ae-f4c8cc call f4aeac 308 f4c922-f4c927 305->308 309 f4c8d2-f4c8d9 call f4c765 305->309 311 f4c8de-f4c8e4 309->311 312 f4c903-f4c919 MultiByteToWideChar 311->312 313 f4c8ea-f4c8fe GetModuleFileNameW 311->313 314 f4c91a-f4c91d call f4aed1 312->314 313->314 314->308
    APIs
      • Part of subcall function 00F4AEAC: RtlAllocateHeap.NTDLL(00000000,00000000,00F4AB55,?,?,00F4AB55,00000008), ref: 00F4AEC6
    • GetModuleFileNameW.KERNEL32(?,?,?,-11565FEC,?,00000000,?,?), ref: 00F4C8F4
    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,-11565FEC,?,00000000,?,?), ref: 00F4C913
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: AllocateByteCharFileHeapModuleMultiNameWide
    • String ID:
    • API String ID: 1823253148-0
    • Opcode ID: 8ed6093c06488385f4a65223caa003ba129237571cb0d3af5ad798b0424c76c2
    • Instruction ID: 2d052988046a9a7f727dfe82b354f2dba82aa308b2bbcc211b57474c86132891
    • Opcode Fuzzy Hash: 8ed6093c06488385f4a65223caa003ba129237571cb0d3af5ad798b0424c76c2
    • Instruction Fuzzy Hash: AB01D632A0124AFFDF129F95CC04B9E7F71FF84320F109564F921561A0CB358A61BB50

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 316 f4adce-f4ade4 GetCurrentThreadId 317 f4ade6-f4adf2 316->317 318 f4ae2d-f4ae3a 317->318 319 f4adf8-f4adfa 317->319 319->318 320 f4ae00-f4ae07 319->320 321 f4ae1c-f4ae28 Sleep 320->321 322 f4ae0d-f4ae14 320->322 321->317 322->321 324 f4ae1a 322->324 324->321
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 00F4ADDD
    • Sleep.KERNELBASE(00000005,00050000,00000000), ref: 00F4AE20
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: CurrentSleepThread
    • String ID:
    • API String ID: 1164918020-0
    • Opcode ID: 456bd493506aa6e21d46f88dbc36e14d85336cd64032cd75ea4a14dad78522ed
    • Instruction ID: 241d204e4c2418964424284d4eac12ff31f8d862f8a879c7d84c68c3cc30a190
    • Opcode Fuzzy Hash: 456bd493506aa6e21d46f88dbc36e14d85336cd64032cd75ea4a14dad78522ed
    • Instruction Fuzzy Hash: 66F05932902106EBC7218F61C8887AE7BB4FF4132AF20003AD603810C0C3B55D95EE82
    APIs
    • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,?,00000000,00000010), ref: 00F4D5BD
      • Part of subcall function 00F4AEAC: RtlAllocateHeap.NTDLL(00000000,00000000,00F4AB55,?,?,00F4AB55,00000008), ref: 00F4AEC6
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: AllocateCreateFileHeap
    • String ID:
    • API String ID: 3125202945-0
    • Opcode ID: 0756fa242576a0272d7c653db4e117f74643aa4a50ac31fb7ab78e33bd4fff16
    • Instruction ID: fca18eeb0b7c2030ef53405de31207821a8280c2a8916e50b1d1c451931e9635
    • Opcode Fuzzy Hash: 0756fa242576a0272d7c653db4e117f74643aa4a50ac31fb7ab78e33bd4fff16
    • Instruction Fuzzy Hash: B131A071900208BFEB209FA5DC45F9EBFB8FF44324F208269FD15AA191D7759951EB10
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID:
    • API String ID: 1029625771-0
    • Opcode ID: 6e0b3edd2830d55c86c11a5789cc9d9179b34231dc1d55b524566173b8b6b302
    • Instruction ID: 2549ff2cf3c786e311d434c11016fdd2065b97ce30a421d4a1897931f33a8ef2
    • Opcode Fuzzy Hash: 6e0b3edd2830d55c86c11a5789cc9d9179b34231dc1d55b524566173b8b6b302
    • Instruction Fuzzy Hash: 6F3123B290C310EFE305AF19D8816BEFBE4EF89360F16482DE6C597610D73584808B97
    APIs
      • Part of subcall function 00F4AEAC: RtlAllocateHeap.NTDLL(00000000,00000000,00F4AB55,?,?,00F4AB55,00000008), ref: 00F4AEC6
    • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,?,00000000), ref: 00F4CDA6
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: AllocateCreateFileHeap
    • String ID:
    • API String ID: 3125202945-0
    • Opcode ID: 42169aae207b4ec83d8321d3fb62a9fd5518055bff050ac88150fdd64d546355
    • Instruction ID: a4898786ff1b720ba364bf34b216288e9136e0eb682c7ac0ffde8b18ce04a973
    • Opcode Fuzzy Hash: 42169aae207b4ec83d8321d3fb62a9fd5518055bff050ac88150fdd64d546355
    • Instruction Fuzzy Hash: D531E171A00205BBEB209F64EC45F997FB8FF04724F20426AFA10FA1D1C3B1A5419B90
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 512d4017f0b636813bd64bc0fdeeda06cc2c406921f58b201ef935f4c6044a54
    • Instruction ID: c85cfde1f9f5282aaf3cf74e04ed95bc5e7036574b40dc98207afdbd26a1cdd6
    • Opcode Fuzzy Hash: 512d4017f0b636813bd64bc0fdeeda06cc2c406921f58b201ef935f4c6044a54
    • Instruction Fuzzy Hash: A7F044FB24C1583DF6208A626F24AFAB76DEAC2730B30942AF802D1842D2900E8D1631
    APIs
    • OpenSCManagerW.SECHOST(00000000,00000000,?), ref: 049A0DCD
    Memory Dump Source
    • Source File: 00000000.00000002.1827951213.00000000049A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049A0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_49a0000_file.jbxd
    Similarity
    • API ID: ManagerOpen
    • String ID:
    • API String ID: 1889721586-0
    • Opcode ID: d60caa506a212fcebf705e5c85caa1ca104eeaa3bea285c00f36a3123d293dac
    • Instruction ID: cb860a3b35627008aad2f055330950280d48d05624fa454a2480de6ee0987d6e
    • Opcode Fuzzy Hash: d60caa506a212fcebf705e5c85caa1ca104eeaa3bea285c00f36a3123d293dac
    • Instruction Fuzzy Hash: 062115B6C013189FCB50CF99D884ADEFBF4FB88310F15812AD908AB245D774A554CBA4
    APIs
    • OpenSCManagerW.SECHOST(00000000,00000000,?), ref: 049A0DCD
    Memory Dump Source
    • Source File: 00000000.00000002.1827951213.00000000049A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049A0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_49a0000_file.jbxd
    Similarity
    • API ID: ManagerOpen
    • String ID:
    • API String ID: 1889721586-0
    • Opcode ID: 2fa07649cead7aad36f8be5831296a33df27343f7896c20ecf6a4c67f536198f
    • Instruction ID: 35852667a02e5845159be86adb11bca89c2da76ee0636e7ceaafb80cf3083d01
    • Opcode Fuzzy Hash: 2fa07649cead7aad36f8be5831296a33df27343f7896c20ecf6a4c67f536198f
    • Instruction Fuzzy Hash: C32127B6C013198FCB44CFA9D884BDEFBF5FB88310F15816AD909AB245C734A555CBA4
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 77d2258c155dfad51a69c11e917780cd570f2f8a66293307f9fa031d20723406
    • Instruction ID: 5f49f1c4980e5b0b8bc7d32b8f0b1bd369f2d046e912c67000c18718b11baceb
    • Opcode Fuzzy Hash: 77d2258c155dfad51a69c11e917780cd570f2f8a66293307f9fa031d20723406
    • Instruction Fuzzy Hash: 86F0F0AB54C1943CF21286322E20BFF7B6CEAD373473894AFF881D1403C2410E4A8236
    APIs
    • ControlService.ADVAPI32(?,?,?), ref: 049A1580
    Memory Dump Source
    • Source File: 00000000.00000002.1827951213.00000000049A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049A0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_49a0000_file.jbxd
    Similarity
    • API ID: ControlService
    • String ID:
    • API String ID: 253159669-0
    • Opcode ID: 02d34abc22fb6c7f71dbd31e09c5712657b890dcb7a7f37f7431e0de90f58f53
    • Instruction ID: 84c2cb5b9b6e20ef76f56f22f438acf5c35da63c59aeeceabb8d7b2122a3795c
    • Opcode Fuzzy Hash: 02d34abc22fb6c7f71dbd31e09c5712657b890dcb7a7f37f7431e0de90f58f53
    • Instruction Fuzzy Hash: C611E4B19003499FDB10CF9AC585BDEFBF4EB48320F14802AE559A3250D778A644CFA5
    APIs
    • ControlService.ADVAPI32(?,?,?), ref: 049A1580
    Memory Dump Source
    • Source File: 00000000.00000002.1827951213.00000000049A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049A0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_49a0000_file.jbxd
    Similarity
    • API ID: ControlService
    • String ID:
    • API String ID: 253159669-0
    • Opcode ID: e2cc0839a75b3af70d7eef02b01dbf4f84efb0f322ca386df2f43103001ded81
    • Instruction ID: 9ba059c76350ee66db0a1e0d757c2a42b28923143329ab4e8358b20a61acb85b
    • Opcode Fuzzy Hash: e2cc0839a75b3af70d7eef02b01dbf4f84efb0f322ca386df2f43103001ded81
    • Instruction Fuzzy Hash: 592112B59003498FDB10CFAAC584BDEFBF4EB48320F14842AE959A7250C778A654CFA5
    APIs
      • Part of subcall function 00F4ADCE: GetCurrentThreadId.KERNEL32 ref: 00F4ADDD
      • Part of subcall function 00F4ADCE: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 00F4AE20
    • MapViewOfFileEx.KERNELBASE(?,?,?,?,?,?,-11565FEC), ref: 00F500DC
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: CurrentFileSleepThreadView
    • String ID:
    • API String ID: 2270672837-0
    • Opcode ID: e6c5904bb06f9d884718875f9cde0882f2bbc596469cbde3e46d9673ec804b62
    • Instruction ID: 94c08209981ca64d40dd99135ad685861f9c242b2ed4a696ad3f9e31682c16c7
    • Opcode Fuzzy Hash: e6c5904bb06f9d884718875f9cde0882f2bbc596469cbde3e46d9673ec804b62
    • Instruction Fuzzy Hash: 4011A57254410AEFCF22AFA4DD05E9B3E66AF49352B004521FF1155061CB3AC4BAFBA1
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: CurrentSleepThread
    • String ID:
    • API String ID: 1164918020-0
    • Opcode ID: 0fb0dd9add96564c8cafd6d5ccc1ef4aa45d6649ca51d96a081e75b3ff727339
    • Instruction ID: e901259d23a08bf50d46c251fc2a41ff3ed09c8ef3ea823c0cf2a92a45658d20
    • Opcode Fuzzy Hash: 0fb0dd9add96564c8cafd6d5ccc1ef4aa45d6649ca51d96a081e75b3ff727339
    • Instruction Fuzzy Hash: 60115B7290020AFBCF12AFA4DD09E9E3FB5AF44305F004421BD0955076C779C9A9FB61
    APIs
    • ImpersonateLoggedOnUser.KERNELBASE ref: 049A1367
    Memory Dump Source
    • Source File: 00000000.00000002.1827951213.00000000049A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049A0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_49a0000_file.jbxd
    Similarity
    • API ID: ImpersonateLoggedUser
    • String ID:
    • API String ID: 2216092060-0
    • Opcode ID: 933ad3d9bcb5a17439b6428fd93ad71f217588c9b6daa3c37a8f72ac2c0d8aef
    • Instruction ID: 83d75c9508d96bf3f053e317b3794f75b3764dae71f2ce902656c2261e12d328
    • Opcode Fuzzy Hash: 933ad3d9bcb5a17439b6428fd93ad71f217588c9b6daa3c37a8f72ac2c0d8aef
    • Instruction Fuzzy Hash: BA1125B1800249CFDB10CF9AC485BDEFBF4EF48320F14842AD558A3250D778A544CFA5
    APIs
    • ImpersonateLoggedOnUser.KERNELBASE ref: 049A1367
    Memory Dump Source
    • Source File: 00000000.00000002.1827951213.00000000049A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049A0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_49a0000_file.jbxd
    Similarity
    • API ID: ImpersonateLoggedUser
    • String ID:
    • API String ID: 2216092060-0
    • Opcode ID: 2d877389a455ba98f4a2b5f14eedd2631a779e08eab3d7ad0f7add22ff022cfa
    • Instruction ID: 0a585f1364093ffe05141ef1d6ea864e20cf2ccf5fbcb3d36181239a7f6870e9
    • Opcode Fuzzy Hash: 2d877389a455ba98f4a2b5f14eedd2631a779e08eab3d7ad0f7add22ff022cfa
    • Instruction Fuzzy Hash: 931103B1800349CFDB10DF9AC945BDEFBF8EB48320F24846AD559A3650D778A944CFA5
    APIs
      • Part of subcall function 00F4ADCE: GetCurrentThreadId.KERNEL32 ref: 00F4ADDD
      • Part of subcall function 00F4ADCE: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 00F4AE20
    • ReadFile.KERNELBASE(?,00000000,?,00000400,?,-11565FEC,?,?,00F4D450,?,?,00000400,?,00000000,?,00000000), ref: 00F4F78D
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: CurrentFileReadSleepThread
    • String ID:
    • API String ID: 1253362762-0
    • Opcode ID: 35bc9e3f4ebbcbdb6dc0eeebf4385a302cb57125e4afc21a3b72be00a600ddb3
    • Instruction ID: 4db286a8ee4bf5f3e9c84bc7a71d0f5deab56e28879793657c043d941efb22b1
    • Opcode Fuzzy Hash: 35bc9e3f4ebbcbdb6dc0eeebf4385a302cb57125e4afc21a3b72be00a600ddb3
    • Instruction Fuzzy Hash: 43F0C47664010ABBDF125FA4DC09E9E3FB6AF44350B045421FE1999021C73AC8A5FBA2
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: ef186a5b6b85af6684839789d9b792a49fd340f80b509fbd2882422e0b6a8fc3
    • Instruction ID: 5cb224a338f45cfc194f69e3b5bc35f8041f47382b2dc2dccf625eb1d1685773
    • Opcode Fuzzy Hash: ef186a5b6b85af6684839789d9b792a49fd340f80b509fbd2882422e0b6a8fc3
    • Instruction Fuzzy Hash: 06E02BB224C29A3CF71A8A641D60FBE379DD7D7370F30515AF842D50C7DE9448855160
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 84101429561e3001be356e41beca675625e06e0dcde3c97dbfc637a1cf1ca7f5
    • Instruction ID: 2a88c910b9a3af0215529b083fbb5b6dc7036e03dabb1e146193f83f9f5a0138
    • Opcode Fuzzy Hash: 84101429561e3001be356e41beca675625e06e0dcde3c97dbfc637a1cf1ca7f5
    • Instruction Fuzzy Hash: B2F0F67230C24D6DDB15DB248B51B7E3B66EE82744B0458ACD982AB843CA514C549A5D
    APIs
    • GetProcAddress.KERNEL32(00F4BEBA,00F4BEBA), ref: 00F4C74F
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: AddressProc
    • String ID:
    • API String ID: 190572456-0
    • Opcode ID: 14d5a4c9f542ab251303b0efb2cab6e9af5112b4904bae6bfe1343215cf7e957
    • Instruction ID: 412d3044669f6c66d7fc8b1f1b8a37af7eb38e3644b09279cbd81a06ae69c73d
    • Opcode Fuzzy Hash: 14d5a4c9f542ab251303b0efb2cab6e9af5112b4904bae6bfe1343215cf7e957
    • Instruction Fuzzy Hash: 17E01277641008BBDF913F75DD0995E3E656F84350B00E021BD0594061DB79C551FAE6
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID:
    • API String ID: 1029625771-0
    • Opcode ID: 0e125f633bac2d36a8f80692af284081d4872fed0cf86624be7be037a99b8e37
    • Instruction ID: 64713f5b7ba9db2068c447995f1f722639fa3caf884864474aeed9c96b2cc9fc
    • Opcode Fuzzy Hash: 0e125f633bac2d36a8f80692af284081d4872fed0cf86624be7be037a99b8e37
    • Instruction Fuzzy Hash: BBD0ECB251C7059FD7956E5884983BAB3D4EF08611F11081DE282C2240D6305440A7A6
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 880fd6414ad350e8aa3d0ad92327109319eb7e1ce5033e6630e6c9a627db0d61
    • Instruction ID: 6e7760cc6a06e583615d8e89a147aada3722702c5746d87c67f338e6d6e13546
    • Opcode Fuzzy Hash: 880fd6414ad350e8aa3d0ad92327109319eb7e1ce5033e6630e6c9a627db0d61
    • Instruction Fuzzy Hash: 6BD0227124C30829EB14C9701AA1B7E3781CB832A0F202568C482DA2C3C5508C0B8240
    APIs
    • RtlAllocateHeap.NTDLL(00000000,00000000,00F4AB55,?,?,00F4AB55,00000008), ref: 00F4AEC6
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: AllocateHeap
    • String ID:
    • API String ID: 1279760036-0
    • Opcode ID: 6c83dd4e4dc0b52adc629d91ba81e06c3a2691b88011d29eea44260e99d9de59
    • Instruction ID: c70c7a49f706b7cf462bcafe1c9871bc632623f5d1624141da2eb3fe5b86ead0
    • Opcode Fuzzy Hash: 6c83dd4e4dc0b52adc629d91ba81e06c3a2691b88011d29eea44260e99d9de59
    • Instruction Fuzzy Hash: F1D01273600305B7CE355A5ADC09F9F7E7CEBC5B91F000121F90290440D766E151D5B5
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: lstrcmpi
    • String ID:
    • API String ID: 1586166983-0
    • Opcode ID: 7f99c1fd629a8e415469ceaf1429f635c75d16c9b3da3370168e042f3434f1d3
    • Instruction ID: fad06ef1cb0ac09029fc7c24ebc8e3004bfe0c56d837468827e15210e5213d23
    • Opcode Fuzzy Hash: 7f99c1fd629a8e415469ceaf1429f635c75d16c9b3da3370168e042f3434f1d3
    • Instruction Fuzzy Hash: 1801D636A0010DBFCF269FA8CC05E9EBF76EF48352F005161A810A5061DB339661EB61
    APIs
      • Part of subcall function 00F4ADCE: GetCurrentThreadId.KERNEL32 ref: 00F4ADDD
      • Part of subcall function 00F4ADCE: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 00F4AE20
    • CloseHandle.KERNELBASE(00F4D4E5,-11565FEC,?,?,00F4D4E5,?), ref: 00F4DB60
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: CloseCurrentHandleSleepThread
    • String ID:
    • API String ID: 4003616898-0
    • Opcode ID: 75a331417cdf91cefe6ddaa1da1a26aba3dc1a240426df888531d59295b6bf1e
    • Instruction ID: 3e4d7d7e86dfc11efc78004b29adc813f9a54001d1492205009bc85630e10652
    • Opcode Fuzzy Hash: 75a331417cdf91cefe6ddaa1da1a26aba3dc1a240426df888531d59295b6bf1e
    • Instruction Fuzzy Hash: 9CE086A7680009B7CE117B7AEC09D5E3F78DFC0384B011122FE0185116CB39C492F672
    APIs
    • VirtualAlloc.KERNELBASE(00000000), ref: 00D6F3AB
    Memory Dump Source
    • Source File: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: a6a156c67086271814f05c2ba0b5077140361636a1d7549a1522787721e6ac80
    • Instruction ID: 07606b23360806b3d734969509060a94a01d2deb4d5752324d31fa6def77075e
    • Opcode Fuzzy Hash: a6a156c67086271814f05c2ba0b5077140361636a1d7549a1522787721e6ac80
    • Instruction Fuzzy Hash: 47E065B881CA14DFE700AF29E0413BDBBE0EF89340F118839C6C293A44E63648449BA6
    APIs
    • VirtualAlloc.KERNELBASE(00000000), ref: 00D6ED88
    Memory Dump Source
    • Source File: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: a68a7156703699d7b8de9d731e49928b30d96ebf10474d80392467ac5d6264f8
    • Instruction ID: 10703a210361c6fa50de4b8b028ceb2cbac98dd04a5c38c4e586b4382476aec7
    • Opcode Fuzzy Hash: a68a7156703699d7b8de9d731e49928b30d96ebf10474d80392467ac5d6264f8
    • Instruction Fuzzy Hash: 25E0C2B584CA49DFC7946F31C44866EBBF0FF45311F120A1CE8E286A90C7729890DB27
    APIs
    • CloseHandle.KERNELBASE(?,?,00F4AC6D,?,?), ref: 00F4CBED
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: CloseHandle
    • String ID:
    • API String ID: 2962429428-0
    • Opcode ID: 265c7e543947f5ad24f785ccd34414288e39588f412238b4db309bc84108eb25
    • Instruction ID: 2b62722c0068fdfc8614296e6ee2e1d2579672731227ce63fc307723e185c813
    • Opcode Fuzzy Hash: 265c7e543947f5ad24f785ccd34414288e39588f412238b4db309bc84108eb25
    • Instruction Fuzzy Hash: 31B09231001108BBCB42BF52FC0684DBF79FF5A399B009121BD05440318B76E964EBD0
    APIs
      • Part of subcall function 00F4ADCE: GetCurrentThreadId.KERNEL32 ref: 00F4ADDD
      • Part of subcall function 00F4ADCE: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 00F4AE20
    • GetSystemTime.KERNEL32(?,-11565FEC), ref: 00F4EF50
    • GetFileTime.KERNEL32(?,?,?,?,-11565FEC), ref: 00F4EF93
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: Time$CurrentFileSleepSystemThread
    • String ID:
    • API String ID: 3818558864-0
    • Opcode ID: ebe69059c5c04073894a1e95156425323b7e2a411dd84a33c48b08df43692080
    • Instruction ID: 330512f71769a8c110d16ec7ad3a77568c691e7d2d314c53e11f3330ef06b555
    • Opcode Fuzzy Hash: ebe69059c5c04073894a1e95156425323b7e2a411dd84a33c48b08df43692080
    • Instruction Fuzzy Hash: AE01D23224044AFBCF21AF69EC08D9E7F76FFC5321B408221F95185060CB35D8A5EA62
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID:
    • String ID: WO~$ga~}
    • API String ID: 0-2345489174
    • Opcode ID: 8e8cb85e33a82513877bbcda27e1f9b19620e48ec68ca246a737257dc06a2912
    • Instruction ID: e4f1125f0f9d0d36beafabcb83fb265fdda99202f14fe12ca513c6ea25a48882
    • Opcode Fuzzy Hash: 8e8cb85e33a82513877bbcda27e1f9b19620e48ec68ca246a737257dc06a2912
    • Instruction Fuzzy Hash: EEB147F3A082049FE7149E2DEC8076BB7E5EF98720F29453DEB84C3754E63A5C048696
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID:
    • String ID: JfW$eh}{
    • API String ID: 0-450012108
    • Opcode ID: 1d59578c9e3ad10049c2ecf4a2e8066e7a4466246dec39196c57394b78496f35
    • Instruction ID: df4da1b66c9cf31374177d6a14b2de0565fa112e41e30141767d5aaba3d6deec
    • Opcode Fuzzy Hash: 1d59578c9e3ad10049c2ecf4a2e8066e7a4466246dec39196c57394b78496f35
    • Instruction Fuzzy Hash: AF5109B351C300DFD308BA29DD8673AB7E5EB94324F25852DEAC6C3744E9345841B697
    APIs
    • CryptVerifySignatureA.ADVAPI32(?,?,?,?,?,?), ref: 00F4FE20
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: CryptSignatureVerify
    • String ID:
    • API String ID: 1015439381-0
    • Opcode ID: cc6349345cca2603dbed5cbb672d6eef2bfeb6d0258f3524a19b0b84b14d5f99
    • Instruction ID: e9534304e796da309f167fa230374a04c920722be13aa8f9d3071cff8dd228fa
    • Opcode Fuzzy Hash: cc6349345cca2603dbed5cbb672d6eef2bfeb6d0258f3524a19b0b84b14d5f99
    • Instruction Fuzzy Hash: C5F0D43260020AEFCF01CF94D90498D7BB2FF08306B108165FA0596121D7759664EF80
    Memory Dump Source
    • Source File: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c1e21dde4fda16286be51b3da654cdebc0faa3cf82a87327b2dd3d8970358e07
    • Instruction ID: 816e27f49f418b0b20df9a8516a29082086b875b7df0f1fec82e6a8ebf47d09b
    • Opcode Fuzzy Hash: c1e21dde4fda16286be51b3da654cdebc0faa3cf82a87327b2dd3d8970358e07
    • Instruction Fuzzy Hash: A64102F350CA20EFD3056A28FC54B7EBBE5EB94310F66493ED2D286704E2354891B6D6
    Memory Dump Source
    • Source File: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6bb944698e825f0ede30189be841013ab8c3ca705cd2f5a629893287b4f64a2a
    • Instruction ID: 6f939aeb360a09baa81051a9f5bd7939f234593cc553d95456b3115c3f702270
    • Opcode Fuzzy Hash: 6bb944698e825f0ede30189be841013ab8c3ca705cd2f5a629893287b4f64a2a
    • Instruction Fuzzy Hash: 6E3178B250C210AFE745AF2DD84166AFBE9EF98710F164D2EEAC5C3210E7319850CB87
    Memory Dump Source
    • Source File: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 48c9bcb7362f8b40ad1e667e04e166fa33ff430bc78da5c0796f92fc0fcce699
    • Instruction ID: ec4b6d173e46cf9f9e6a1a391e2e1702e8b9262b40b0d3b811ef91cc5fdea539
    • Opcode Fuzzy Hash: 48c9bcb7362f8b40ad1e667e04e166fa33ff430bc78da5c0796f92fc0fcce699
    • Instruction Fuzzy Hash: 88116AB300C208DFE300AE25DC809BAB6D6E7C0310F625A2EC782AA748E63154429647
    Memory Dump Source
    • Source File: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c0598c30f2e2b06fd4051332e960f3874d00b155f5767da485b121c97648e2c8
    • Instruction ID: b0faef7b3700b84fc95457112fc3fe8e90812fd870541c2eca204201a956363e
    • Opcode Fuzzy Hash: c0598c30f2e2b06fd4051332e960f3874d00b155f5767da485b121c97648e2c8
    • Instruction Fuzzy Hash: AB119EB300C20CDFE3049E26DCC19BAB6D6E7C0310F665B2EC783A7748E63154429647
    Memory Dump Source
    • Source File: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7e9e9301de91be117effebd8bc9f54d928823e962d35859b8be7ddac0236625b
    • Instruction ID: 44f8f8eab7aca29578ef0b7a139cf1072ead214ad55ae554e068d9cb817def32
    • Opcode Fuzzy Hash: 7e9e9301de91be117effebd8bc9f54d928823e962d35859b8be7ddac0236625b
    • Instruction Fuzzy Hash: 83E086761042019EC7009F64C85599FFBF4FF19321F608445E444C7762C3768D41DB29
    APIs
      • Part of subcall function 00F4ADCE: GetCurrentThreadId.KERNEL32 ref: 00F4ADDD
      • Part of subcall function 00F4ADCE: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 00F4AE20
      • Part of subcall function 00F4F4CF: IsBadWritePtr.KERNEL32(?,00000004), ref: 00F4F4DD
    • wsprintfA.USER32 ref: 00F4E497
    • LoadImageA.USER32(?,?,?,?,?,?), ref: 00F4E55B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: CurrentImageLoadSleepThreadWritewsprintf
    • String ID: %8x$%8x
    • API String ID: 2375920415-2046107164
    • Opcode ID: 8303eae78e156c2c469d980a3ca0d4c6ee3798d9ac578960b67b403135c029cc
    • Instruction ID: eeec5590349bcf4e304c115c75b7745823638793f86624bd9963d003938e2122
    • Opcode Fuzzy Hash: 8303eae78e156c2c469d980a3ca0d4c6ee3798d9ac578960b67b403135c029cc
    • Instruction Fuzzy Hash: 1D31F471A0010AABDF11DFA4DC09FAEBF75FF88310F108126BA11A61A0D7719A61EB61
    APIs
    • GetFileAttributesExW.KERNEL32(00796FAC,00004020,00000000,-11565FEC), ref: 00F4F10F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1826074376.0000000000F43000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
    • Associated: 00000000.00000002.1825416403.0000000000D60000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825433984.0000000000D62000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825457696.0000000000D66000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825483190.0000000000D6A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825512999.0000000000D74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825533967.0000000000D75000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825558167.0000000000D76000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825759387.0000000000ED9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825789517.0000000000EDC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EF3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825829416.0000000000EFD000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825881219.0000000000EFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825901048.0000000000F00000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825922388.0000000000F09000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825939245.0000000000F0A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1825986447.0000000000F1A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826021969.0000000000F1B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826056419.0000000000F38000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826095377.0000000000F51000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826114293.0000000000F52000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826130772.0000000000F53000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826146667.0000000000F55000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826164470.0000000000F5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826180321.0000000000F5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826257675.0000000000F69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826276848.0000000000F6C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826294459.0000000000F74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826315044.0000000000F77000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826342158.0000000000F78000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826368365.0000000000F7D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826394344.0000000000F8A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826412293.0000000000F90000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826431247.0000000000F9B000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826449835.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826467223.0000000000FA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826484884.0000000000FA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826503385.0000000000FAD000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826519276.0000000000FAF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826537287.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826552877.0000000000FBE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826586113.0000000001002000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826602376.0000000001003000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.0000000001004000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826618675.000000000100C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826656419.000000000101A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1826673335.000000000101C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d60000_file.jbxd
    Similarity
    • API ID: AttributesFile
    • String ID: @
    • API String ID: 3188754299-2726393805
    • Opcode ID: 741b76d2f96c053c0b1738b8dcfa4e0e5fc3e9c6300c5c416b19eb5ad7292af1
    • Instruction ID: 26717af9a7f0086a198602e1981cdb05319e91b01e5a343e4f97233a6f5f21a0
    • Opcode Fuzzy Hash: 741b76d2f96c053c0b1738b8dcfa4e0e5fc3e9c6300c5c416b19eb5ad7292af1
    • Instruction Fuzzy Hash: 79319E71900705EFCB24CF54D844B8ABFB0FF48310F008529E95A67651C3B9EAA9EF90