Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1561503
MD5:00737bada48d092c96d1d6a8829f680f
SHA1:55dfedce4c520fe53ca2180f848e2089924365fb
SHA256:d550c57c2b194b654d639537aa23827b98e2f03f0bd58957c7ae1bef570253e9
Tags:exeuser-Bitsight
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
AI detected suspicious sample
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Hides threads from debuggers
Machine Learning detection for sample
Modifies windows update settings
PE file contains section with special chars
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Entry point lies outside standard sections
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 6988 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 00737BADA48D092C96D1D6A8829F680F)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: file.exeJoe Sandbox ML: detected
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: file.exe, 00000005.00000003.1284730596.0000000004C20000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmp

System Summary

barindex
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C950FB5_2_00C950FB
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00D3203F5_2_00D3203F
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C271845_2_00C27184
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C271595_2_00C27159
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00D2C4595_2_00D2C459
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C2F7275_2_00C2F727
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00AADF025_2_00AADF02
Source: file.exe, 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000005.00000002.1425596261.0000000000D9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
Source: file.exeBinary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: classification engineClassification label: mal100.evad.winEXE@1/1@0/0
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.logJump to behavior
Source: C:\Users\user\Desktop\file.exeMutant created: NULL
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeString found in binary or memory: 3The file %s is missing. Please, re-install this application
Source: file.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: file.exeString found in binary or memory: RtlAllocateHeap3Cannot find '%s'. Please, re-install this applicationThunRTMain__vbaVarTstNe
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: file.exeStatic file information: File size 2789888 > 1048576
Source: file.exeStatic PE information: Raw size of faexbrgj is bigger than: 0x100000 < 0x2a3200
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: file.exe, 00000005.00000003.1284730596.0000000004C20000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmp

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 5.2.file.exe.aa0000.0.unpack :EW;.rsrc:W;.idata :W;faexbrgj:EW;fsrgkmwp:EW;.taggant:EW; vs :ER;.rsrc:W;
Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
Source: file.exeStatic PE information: real checksum: 0x2a92d3 should be: 0x2ab73b
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: file.exeStatic PE information: section name: faexbrgj
Source: file.exeStatic PE information: section name: fsrgkmwp
Source: file.exeStatic PE information: section name: .taggant
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00AAE631 push ecx; mov dword ptr [esp], 2EDFEAB8h5_2_00AAF4E6
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C2691C push eax; mov dword ptr [esp], edx5_2_00C2696C
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C2691C push edi; mov dword ptr [esp], 15D9BB73h5_2_00C269B8
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C2691C push eax; mov dword ptr [esp], 776FA7D7h5_2_00C269E1
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C2691C push eax; mov dword ptr [esp], edx5_2_00C26A53
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C2691C push edx; mov dword ptr [esp], esp5_2_00C26A6D
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C26A8D push ecx; mov dword ptr [esp], 1F9A5B00h5_2_00C26A9D
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C26A8D push eax; mov dword ptr [esp], 7A7B13FBh5_2_00C26AD7
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C26A8D push 3DDD64CCh; mov dword ptr [esp], ebx5_2_00C26B43
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C26A8D push 353378F6h; mov dword ptr [esp], eax5_2_00C26B92
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00AAEBE8 push ecx; mov dword ptr [esp], 3A7030C6h5_2_00AAEEAF
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C33ED5 push 7E89483Ch; mov dword ptr [esp], esi5_2_00C34323
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C3B0C0 push 698F884Dh; mov dword ptr [esp], ebx5_2_00C3B735
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00D160C2 push ecx; mov dword ptr [esp], edi5_2_00D161B8
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00AAF0B3 push 2E982ECAh; mov dword ptr [esp], esi5_2_00AAF78E
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00AAD087 push esi; mov dword ptr [esp], 72EF4426h5_2_00AAD2B5
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C300ED push 3867E794h; mov dword ptr [esp], edi5_2_00C300F9
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C300ED push edi; mov dword ptr [esp], 2E662B80h5_2_00C30253
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C300ED push 0612B6FEh; mov dword ptr [esp], eax5_2_00C302B9
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C300ED push 07E9DF3Bh; mov dword ptr [esp], edx5_2_00C30403
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C300ED push 68901B99h; mov dword ptr [esp], edi5_2_00C304B3
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C950FB push 52E70452h; mov dword ptr [esp], ebx5_2_00C95103
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C950FB push eax; mov dword ptr [esp], 55FB5BECh5_2_00C951EB
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C950FB push 34AE4773h; mov dword ptr [esp], esp5_2_00C951FA
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C950FB push 078B0E8Bh; mov dword ptr [esp], edx5_2_00C95240
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C270FA push ebp; mov dword ptr [esp], 09600DC2h5_2_00C27119
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C270FA push 56CAA343h; mov dword ptr [esp], ebp5_2_00C27140
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00AB10EA push 32AC7660h; mov dword ptr [esp], ecx5_2_00AB2C22
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C3108C push eax; mov dword ptr [esp], eax5_2_00C31434
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C3108C push eax; mov dword ptr [esp], eax5_2_00C314A8
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C3108C push eax; mov dword ptr [esp], esp5_2_00C32612
Source: file.exeStatic PE information: section name: entropy: 7.767064817005539

Boot Survival

barindex
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AAE532 second address: AADE14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 nop 0x00000008 jl 00007FE7A8F64FACh 0x0000000e push dword ptr [ebp+122D0E85h] 0x00000014 mov dword ptr [ebp+122D1CC3h], eax 0x0000001a pushad 0x0000001b mov si, DC3Eh 0x0000001f mov ecx, dword ptr [ebp+122D3B17h] 0x00000025 popad 0x00000026 call dword ptr [ebp+122D1F5Dh] 0x0000002c pushad 0x0000002d mov dword ptr [ebp+122D1D1Fh], ebx 0x00000033 xor eax, eax 0x00000035 add dword ptr [ebp+122D22D5h], ebx 0x0000003b mov edx, dword ptr [esp+28h] 0x0000003f jmp 00007FE7A8F64FABh 0x00000044 mov dword ptr [ebp+122D39ABh], eax 0x0000004a cmc 0x0000004b pushad 0x0000004c call 00007FE7A8F64FB0h 0x00000051 mov edi, ecx 0x00000053 pop ebx 0x00000054 mov edi, dword ptr [ebp+122D3D27h] 0x0000005a popad 0x0000005b mov esi, 0000003Ch 0x00000060 or dword ptr [ebp+122D2259h], ebx 0x00000066 add esi, dword ptr [esp+24h] 0x0000006a jl 00007FE7A8F64FA7h 0x00000070 stc 0x00000071 cmc 0x00000072 lodsw 0x00000074 jmp 00007FE7A8F64FAEh 0x00000079 add eax, dword ptr [esp+24h] 0x0000007d jmp 00007FE7A8F64FB2h 0x00000082 mov ebx, dword ptr [esp+24h] 0x00000086 jbe 00007FE7A8F64FA7h 0x0000008c clc 0x0000008d nop 0x0000008e push ecx 0x0000008f push eax 0x00000090 push edx 0x00000091 jo 00007FE7A8F64FA6h 0x00000097 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C26796 second address: C2679C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C2679C second address: C267C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FE7A8F64FADh 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007FE7A8F64FB4h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C267C8 second address: C267CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C2692B second address: C2692F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C2692F second address: C26939 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C26D3A second address: C26D3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C2896B second address: C289F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 nop 0x00000008 mov edx, dword ptr [ebp+122D3CCFh] 0x0000000e push 00000000h 0x00000010 push 00000000h 0x00000012 push esi 0x00000013 call 00007FE7A8C37278h 0x00000018 pop esi 0x00000019 mov dword ptr [esp+04h], esi 0x0000001d add dword ptr [esp+04h], 0000001Ah 0x00000025 inc esi 0x00000026 push esi 0x00000027 ret 0x00000028 pop esi 0x00000029 ret 0x0000002a push EC9EC341h 0x0000002f pushad 0x00000030 jmp 00007FE7A8C3727Dh 0x00000035 pushad 0x00000036 pushad 0x00000037 popad 0x00000038 pushad 0x00000039 popad 0x0000003a popad 0x0000003b popad 0x0000003c add dword ptr [esp], 13613D3Fh 0x00000043 mov edx, edi 0x00000045 push 00000003h 0x00000047 push esi 0x00000048 sub dword ptr [ebp+122D221Ch], edx 0x0000004e pop edx 0x0000004f push 00000000h 0x00000051 jo 00007FE7A8C3727Ch 0x00000057 push 00000003h 0x00000059 mov edi, dword ptr [ebp+122D3B83h] 0x0000005f call 00007FE7A8C37279h 0x00000064 pushad 0x00000065 push eax 0x00000066 push edx 0x00000067 je 00007FE7A8C37276h 0x0000006d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C289F2 second address: C28A16 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FE7A8F64FA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FE7A8F64FB8h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C28A16 second address: C28A47 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8C37288h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FE7A8C37281h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C28A47 second address: C28B03 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FE7A8F64FB5h 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f jnc 00007FE7A8F64FBBh 0x00000015 mov eax, dword ptr [eax] 0x00000017 jmp 00007FE7A8F64FAEh 0x0000001c mov dword ptr [esp+04h], eax 0x00000020 jmp 00007FE7A8F64FAEh 0x00000025 pop eax 0x00000026 jmp 00007FE7A8F64FAFh 0x0000002b lea ebx, dword ptr [ebp+1244E7E8h] 0x00000031 clc 0x00000032 xchg eax, ebx 0x00000033 jnc 00007FE7A8F64FC6h 0x00000039 push eax 0x0000003a push eax 0x0000003b push edx 0x0000003c pushad 0x0000003d jmp 00007FE7A8F64FB7h 0x00000042 jg 00007FE7A8F64FA6h 0x00000048 popad 0x00000049 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C28B03 second address: C28B0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007FE7A8C37276h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C28BC8 second address: C28BCC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C28C80 second address: C28C84 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C28C84 second address: C28CB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 push ebx 0x00000009 jmp 00007FE7A8F64FB8h 0x0000000e pop ebx 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 jmp 00007FE7A8F64FABh 0x0000001b pop eax 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C28CB9 second address: C28CDE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FE7A8C3727Dh 0x00000008 push eax 0x00000009 pop eax 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov eax, dword ptr [eax] 0x0000000f push eax 0x00000010 push edx 0x00000011 jbe 00007FE7A8C3727Ch 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C28CDE second address: C28CE4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C28CE4 second address: C28D33 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c jc 00007FE7A8C37284h 0x00000012 pushad 0x00000013 jnc 00007FE7A8C37276h 0x00000019 jc 00007FE7A8C37276h 0x0000001f popad 0x00000020 pop eax 0x00000021 mov dword ptr [ebp+122D1D13h], edx 0x00000027 lea ebx, dword ptr [ebp+1244E7F1h] 0x0000002d sbb si, 2296h 0x00000032 jmp 00007FE7A8C37288h 0x00000037 xchg eax, ebx 0x00000038 push eax 0x00000039 push ecx 0x0000003a push eax 0x0000003b push edx 0x0000003c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C28D33 second address: C28D42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C28D42 second address: C28D52 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FE7A8C3727Bh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C28D9C second address: C28E31 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007FE7A8F64FB1h 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007FE7A8F64FAEh 0x00000011 nop 0x00000012 jmp 00007FE7A8F64FADh 0x00000017 push 00000000h 0x00000019 push ecx 0x0000001a mov di, F58Dh 0x0000001e pop ecx 0x0000001f push 1DF4CA9Ah 0x00000024 push esi 0x00000025 jmp 00007FE7A8F64FB7h 0x0000002a pop esi 0x0000002b xor dword ptr [esp], 1DF4CA1Ah 0x00000032 jne 00007FE7A8F64FABh 0x00000038 push 00000003h 0x0000003a jno 00007FE7A8F64FA7h 0x00000040 mov dword ptr [ebp+122D21C0h], edi 0x00000046 push 00000000h 0x00000048 mov dword ptr [ebp+122D1CADh], edi 0x0000004e push 00000003h 0x00000050 adc dh, 00000043h 0x00000053 call 00007FE7A8F64FA9h 0x00000058 pushad 0x00000059 push edi 0x0000005a push eax 0x0000005b push edx 0x0000005c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C28E31 second address: C28E59 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jmp 00007FE7A8C3727Ah 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f jmp 00007FE7A8C37283h 0x00000014 pop ecx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C28E59 second address: C28E88 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jne 00007FE7A8F64FA6h 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 jns 00007FE7A8F64FB8h 0x00000016 mov eax, dword ptr [eax] 0x00000018 push edi 0x00000019 push eax 0x0000001a push edx 0x0000001b push ecx 0x0000001c pop ecx 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C28E88 second address: C28EBE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b jmp 00007FE7A8C37282h 0x00000010 pop eax 0x00000011 lea ebx, dword ptr [ebp+1244E7FCh] 0x00000017 pushad 0x00000018 mov dword ptr [ebp+122D20A6h], ecx 0x0000001e popad 0x0000001f push eax 0x00000020 push ebx 0x00000021 jl 00007FE7A8C3727Ch 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C3BC5F second address: C3BC64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C47EA9 second address: C47EAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C47EAD second address: C47EBB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C47EBB second address: C47EBF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C47EBF second address: C47EC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C4804D second address: C48051 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C48051 second address: C4805D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FE7A8F64FA6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C4805D second address: C48078 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE7A8C37281h 0x00000009 jnl 00007FE7A8C37276h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C4861E second address: C48643 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8F64FB6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FE7A8F64FABh 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C48643 second address: C48649 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C48649 second address: C4864D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C4864D second address: C48674 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FE7A8C37276h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f pushad 0x00000010 jmp 00007FE7A8C37285h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C48674 second address: C486A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FE7A8F64FB3h 0x00000009 jmp 00007FE7A8F64FB3h 0x0000000e popad 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C486A4 second address: C486AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C3F222 second address: C3F227 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C10A76 second address: C10A7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C10A7A second address: C10A8D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8F64FACh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C10A8D second address: C10A93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C49269 second address: C4926D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C4926D second address: C49276 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C493D8 second address: C493DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C493DC second address: C493E0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C4969E second address: C496AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jl 00007FE7A8F64FB2h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C496AB second address: C496B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C4CD6B second address: C4CD9A instructions: 0x00000000 rdtsc 0x00000002 jo 00007FE7A8F64FB6h 0x00000008 jmp 00007FE7A8F64FB0h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push edx 0x00000013 jmp 00007FE7A8F64FB0h 0x00000018 pop edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C4CD9A second address: C4CDB4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c push eax 0x0000000d push edx 0x0000000e jns 00007FE7A8C3727Ch 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C4CDB4 second address: C4CE00 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FE7A8F64FB7h 0x00000008 jmp 00007FE7A8F64FB1h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov eax, dword ptr [eax] 0x00000012 jmp 00007FE7A8F64FB0h 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e push edi 0x0000001f pop edi 0x00000020 pushad 0x00000021 popad 0x00000022 popad 0x00000023 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C4CF2D second address: C4CF3F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8C3727Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c pop edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C55B0A second address: C55B14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FE7A8F64FA6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C55B14 second address: C55B2F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FE7A8C37281h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C55B2F second address: C55B33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C55B33 second address: C55B37 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C55C9D second address: C55CB8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8F64FB6h 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C55E2C second address: C55E31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C56703 second address: C5674D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 xor dword ptr [esp], 56024F73h 0x0000000e add esi, 2693D876h 0x00000014 call 00007FE7A8F64FA9h 0x00000019 jmp 00007FE7A8F64FB2h 0x0000001e push eax 0x0000001f jns 00007FE7A8F64FACh 0x00000025 mov eax, dword ptr [esp+04h] 0x00000029 push eax 0x0000002a push edx 0x0000002b jng 00007FE7A8F64FA8h 0x00000031 push esi 0x00000032 pop esi 0x00000033 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5674D second address: C56753 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C56753 second address: C56757 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C56757 second address: C56795 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8C37289h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [eax] 0x0000000d pushad 0x0000000e jmp 00007FE7A8C37288h 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C56795 second address: C56799 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C56799 second address: C567B2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FE7A8C3727Bh 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C567B2 second address: C567B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C56BAD second address: C56BBB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b pushad 0x0000000c popad 0x0000000d pop ebx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C56C6F second address: C56C81 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jnp 00007FE7A8F64FAEh 0x0000000f push ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C56D9E second address: C56DA2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C573C6 second address: C573DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jo 00007FE7A8F64FACh 0x0000000b jnc 00007FE7A8F64FA6h 0x00000011 popad 0x00000012 push eax 0x00000013 push eax 0x00000014 push edx 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C573DE second address: C573E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C57846 second address: C5784D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5784D second address: C57853 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C57A0A second address: C57A10 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C57A10 second address: C57A3C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8C3727Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e pushad 0x0000000f push ecx 0x00000010 mov edi, dword ptr [ebp+122D3CFBh] 0x00000016 pop eax 0x00000017 popad 0x00000018 mov dword ptr [ebp+1245036Bh], edi 0x0000001e push eax 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C57A3C second address: C57A40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C57A40 second address: C57A44 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5898A second address: C5898F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5898F second address: C58994 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C58994 second address: C58A2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FE7A8F64FA6h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e jng 00007FE7A8F64FB8h 0x00000014 jmp 00007FE7A8F64FB2h 0x00000019 push 00000000h 0x0000001b push 00000000h 0x0000001d push esi 0x0000001e call 00007FE7A8F64FA8h 0x00000023 pop esi 0x00000024 mov dword ptr [esp+04h], esi 0x00000028 add dword ptr [esp+04h], 00000014h 0x00000030 inc esi 0x00000031 push esi 0x00000032 ret 0x00000033 pop esi 0x00000034 ret 0x00000035 mov si, bx 0x00000038 push 00000000h 0x0000003a xchg eax, ebx 0x0000003b pushad 0x0000003c jmp 00007FE7A8F64FB7h 0x00000041 push edx 0x00000042 jmp 00007FE7A8F64FB3h 0x00000047 pop edx 0x00000048 popad 0x00000049 push eax 0x0000004a push eax 0x0000004b push edx 0x0000004c pushad 0x0000004d jnp 00007FE7A8F64FA6h 0x00000053 jmp 00007FE7A8F64FB6h 0x00000058 popad 0x00000059 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C591D4 second address: C591F0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE7A8C37288h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C591F0 second address: C5921B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8F64FAEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FE7A8F64FB4h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5B361 second address: C5B36D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5B36D second address: C5B371 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5B371 second address: C5B375 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5BA29 second address: C5BA2E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5C50C second address: C5C512 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5CF84 second address: C5CF88 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5CF88 second address: C5CFC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FE7A8C37285h 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FE7A8C37289h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5CFC0 second address: C5CFCA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007FE7A8F64FA6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5CFCA second address: C5CFCE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5DA17 second address: C5DA1D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5DA1D second address: C5DA21 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5DA21 second address: C5DA47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jmp 00007FE7A8F64FB8h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5DA47 second address: C5DA4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5DA4C second address: C5DA8E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push eax 0x0000000c call 00007FE7A8F64FA8h 0x00000011 pop eax 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 add dword ptr [esp+04h], 00000017h 0x0000001e inc eax 0x0000001f push eax 0x00000020 ret 0x00000021 pop eax 0x00000022 ret 0x00000023 push 00000000h 0x00000025 cld 0x00000026 push 00000000h 0x00000028 mov dword ptr [ebp+122D221Ch], edx 0x0000002e xchg eax, ebx 0x0000002f jo 00007FE7A8F64FB2h 0x00000035 jl 00007FE7A8F64FACh 0x0000003b push eax 0x0000003c push edx 0x0000003d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5E4C3 second address: C5E4C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5E235 second address: C5E23B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5E4C7 second address: C5E4CB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5E4CB second address: C5E4D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C61229 second address: C6122D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C6122D second address: C61233 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C61A2F second address: C61A4C instructions: 0x00000000 rdtsc 0x00000002 js 00007FE7A8C37276h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FE7A8C37281h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C61A4C second address: C61A79 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8F64FACh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d je 00007FE7A8F64FB9h 0x00000013 jmp 00007FE7A8F64FB3h 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C638ED second address: C638F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C64AA0 second address: C64AD6 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FE7A8F64FACh 0x00000008 ja 00007FE7A8F64FA6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 jmp 00007FE7A8F64FB6h 0x00000019 jmp 00007FE7A8F64FABh 0x0000001e popad 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C64AD6 second address: C64ADC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C64ADC second address: C64AE0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C62B3A second address: C62B3E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C63B39 second address: C63B3F instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C63B3F second address: C63B5C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FE7A8C37288h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C62B3E second address: C62BC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 mov dword ptr [esp], eax 0x0000000a mov di, si 0x0000000d push dword ptr fs:[00000000h] 0x00000014 push 00000000h 0x00000016 push edi 0x00000017 call 00007FE7A8F64FA8h 0x0000001c pop edi 0x0000001d mov dword ptr [esp+04h], edi 0x00000021 add dword ptr [esp+04h], 0000001Ah 0x00000029 inc edi 0x0000002a push edi 0x0000002b ret 0x0000002c pop edi 0x0000002d ret 0x0000002e sub ebx, 3AD8FF37h 0x00000034 mov dword ptr fs:[00000000h], esp 0x0000003b mov edi, dword ptr [ebp+122D230Fh] 0x00000041 mov eax, dword ptr [ebp+122D0855h] 0x00000047 push 00000000h 0x00000049 push esi 0x0000004a call 00007FE7A8F64FA8h 0x0000004f pop esi 0x00000050 mov dword ptr [esp+04h], esi 0x00000054 add dword ptr [esp+04h], 00000019h 0x0000005c inc esi 0x0000005d push esi 0x0000005e ret 0x0000005f pop esi 0x00000060 ret 0x00000061 push FFFFFFFFh 0x00000063 mov dword ptr [ebp+122D20E7h], ecx 0x00000069 push eax 0x0000006a pushad 0x0000006b pushad 0x0000006c jo 00007FE7A8F64FA6h 0x00000072 push eax 0x00000073 push edx 0x00000074 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C63B5C second address: C63B69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C63C2F second address: C63C44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 popad 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c je 00007FE7A8F64FA6h 0x00000012 push esi 0x00000013 pop esi 0x00000014 popad 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C69015 second address: C6901B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C6901B second address: C6908C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jp 00007FE7A8F64FB7h 0x0000000e jmp 00007FE7A8F64FB3h 0x00000013 popad 0x00000014 pushad 0x00000015 pushad 0x00000016 jmp 00007FE7A8F64FB0h 0x0000001b pushad 0x0000001c popad 0x0000001d jmp 00007FE7A8F64FABh 0x00000022 popad 0x00000023 jmp 00007FE7A8F64FB5h 0x00000028 pushad 0x00000029 jp 00007FE7A8F64FA6h 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C14010 second address: C14014 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C69671 second address: C696EB instructions: 0x00000000 rdtsc 0x00000002 jl 00007FE7A8F64FA8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push ecx 0x00000010 call 00007FE7A8F64FA8h 0x00000015 pop ecx 0x00000016 mov dword ptr [esp+04h], ecx 0x0000001a add dword ptr [esp+04h], 0000001Bh 0x00000022 inc ecx 0x00000023 push ecx 0x00000024 ret 0x00000025 pop ecx 0x00000026 ret 0x00000027 pushad 0x00000028 mov edi, dword ptr [ebp+122D3B9Fh] 0x0000002e je 00007FE7A8F64FACh 0x00000034 xor ebx, dword ptr [ebp+12461668h] 0x0000003a popad 0x0000003b push 00000000h 0x0000003d push ecx 0x0000003e mov dword ptr [ebp+1245036Bh], eax 0x00000044 pop edi 0x00000045 push 00000000h 0x00000047 pushad 0x00000048 movsx eax, ax 0x0000004b jmp 00007FE7A8F64FB0h 0x00000050 popad 0x00000051 xchg eax, esi 0x00000052 pushad 0x00000053 jne 00007FE7A8F64FACh 0x00000059 pushad 0x0000005a pushad 0x0000005b popad 0x0000005c push eax 0x0000005d push edx 0x0000005e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C696EB second address: C696F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C69863 second address: C6986D instructions: 0x00000000 rdtsc 0x00000002 js 00007FE7A8F64FA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C6B744 second address: C6B748 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C6B748 second address: C6B774 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FE7A8F64FA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop esi 0x0000000b push eax 0x0000000c pushad 0x0000000d push edi 0x0000000e pushad 0x0000000f popad 0x00000010 pop edi 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FE7A8F64FB9h 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C6A8A8 second address: C6A8B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop esi 0x00000006 push eax 0x00000007 jc 00007FE7A8C37280h 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C6A8B8 second address: C6A958 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push ebx 0x0000000b call 00007FE7A8F64FA8h 0x00000010 pop ebx 0x00000011 mov dword ptr [esp+04h], ebx 0x00000015 add dword ptr [esp+04h], 00000018h 0x0000001d inc ebx 0x0000001e push ebx 0x0000001f ret 0x00000020 pop ebx 0x00000021 ret 0x00000022 sub dword ptr [ebp+12470561h], ebx 0x00000028 push dword ptr fs:[00000000h] 0x0000002f mov edi, eax 0x00000031 jnl 00007FE7A8F64FACh 0x00000037 or dword ptr [ebp+122D1FC1h], eax 0x0000003d mov dword ptr fs:[00000000h], esp 0x00000044 call 00007FE7A8F64FB8h 0x00000049 sub dword ptr [ebp+122D2223h], eax 0x0000004f pop edi 0x00000050 mov eax, dword ptr [ebp+122D0DC9h] 0x00000056 mov bl, ABh 0x00000058 push FFFFFFFFh 0x0000005a mov bl, 71h 0x0000005c nop 0x0000005d jmp 00007FE7A8F64FB4h 0x00000062 push eax 0x00000063 push eax 0x00000064 push edx 0x00000065 jmp 00007FE7A8F64FB3h 0x0000006a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C6C809 second address: C6C80D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C6C80D second address: C6C81A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b push esi 0x0000000c pop esi 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C6D6F0 second address: C6D6F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C6B967 second address: C6B971 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007FE7A8F64FA6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C6B971 second address: C6B97E instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C6E525 second address: C6E52A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C6E52A second address: C6E537 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C6E537 second address: C6E54B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FE7A8F64FABh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C6E54B second address: C6E54F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C6E54F second address: C6E5E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push ebp 0x0000000b call 00007FE7A8F64FA8h 0x00000010 pop ebp 0x00000011 mov dword ptr [esp+04h], ebp 0x00000015 add dword ptr [esp+04h], 00000018h 0x0000001d inc ebp 0x0000001e push ebp 0x0000001f ret 0x00000020 pop ebp 0x00000021 ret 0x00000022 jmp 00007FE7A8F64FB5h 0x00000027 push 00000000h 0x00000029 jmp 00007FE7A8F64FB5h 0x0000002e push 00000000h 0x00000030 push 00000000h 0x00000032 push edi 0x00000033 call 00007FE7A8F64FA8h 0x00000038 pop edi 0x00000039 mov dword ptr [esp+04h], edi 0x0000003d add dword ptr [esp+04h], 00000019h 0x00000045 inc edi 0x00000046 push edi 0x00000047 ret 0x00000048 pop edi 0x00000049 ret 0x0000004a push ebx 0x0000004b mov dword ptr [ebp+122D1D62h], esi 0x00000051 pop ebx 0x00000052 push eax 0x00000053 push eax 0x00000054 push edx 0x00000055 jmp 00007FE7A8F64FB2h 0x0000005a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C6E5E3 second address: C6E5E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C6E5E9 second address: C6E5ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C7152D second address: C71532 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C71532 second address: C71549 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE7A8F64FB3h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C7067B second address: C70681 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C70681 second address: C70685 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C72512 second address: C7251B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C7251B second address: C72556 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 mov dword ptr [ebp+1246169Ah], ecx 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push esi 0x00000014 call 00007FE7A8F64FA8h 0x00000019 pop esi 0x0000001a mov dword ptr [esp+04h], esi 0x0000001e add dword ptr [esp+04h], 00000014h 0x00000026 inc esi 0x00000027 push esi 0x00000028 ret 0x00000029 pop esi 0x0000002a ret 0x0000002b push 00000000h 0x0000002d mov ebx, dword ptr [ebp+122D3D07h] 0x00000033 push eax 0x00000034 push eax 0x00000035 push edx 0x00000036 pushad 0x00000037 push eax 0x00000038 push edx 0x00000039 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C72556 second address: C7255D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C73632 second address: C736DB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jnp 00007FE7A8F64FBEh 0x0000000d nop 0x0000000e mov dword ptr [ebp+122D5C66h], ecx 0x00000014 push dword ptr fs:[00000000h] 0x0000001b mov dword ptr [ebp+122D1D18h], edx 0x00000021 mov dword ptr fs:[00000000h], esp 0x00000028 mov edi, dword ptr [ebp+1245D04Dh] 0x0000002e mov ebx, dword ptr [ebp+122D3AAFh] 0x00000034 mov eax, dword ptr [ebp+122D0DD1h] 0x0000003a mov ebx, dword ptr [ebp+122D3CE7h] 0x00000040 push FFFFFFFFh 0x00000042 push 00000000h 0x00000044 push edi 0x00000045 call 00007FE7A8F64FA8h 0x0000004a pop edi 0x0000004b mov dword ptr [esp+04h], edi 0x0000004f add dword ptr [esp+04h], 00000014h 0x00000057 inc edi 0x00000058 push edi 0x00000059 ret 0x0000005a pop edi 0x0000005b ret 0x0000005c jmp 00007FE7A8F64FB5h 0x00000061 nop 0x00000062 jmp 00007FE7A8F64FB7h 0x00000067 push eax 0x00000068 pushad 0x00000069 push eax 0x0000006a push edx 0x0000006b push eax 0x0000006c push edx 0x0000006d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C736DB second address: C736DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C736DF second address: C736FA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8F64FAFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jnp 00007FE7A8F64FA6h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C7701D second address: C77021 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C7F009 second address: C7F00D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C21811 second address: C2181B instructions: 0x00000000 rdtsc 0x00000002 jl 00007FE7A8C3727Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C7E6DB second address: C7E6E4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C7E6E4 second address: C7E6EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C7E81D second address: C7E83A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 jmp 00007FE7A8F64FB6h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C7E83A second address: C7E84A instructions: 0x00000000 rdtsc 0x00000002 je 00007FE7A8C37278h 0x00000008 push eax 0x00000009 push edx 0x0000000a push edx 0x0000000b pop edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C7E84A second address: C7E84E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C7E84E second address: C7E852 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C7E9D7 second address: C7E9DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C7E9DB second address: C7E9E9 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007FE7A8C3727Eh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C7EB41 second address: C7EB4F instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FE7A8F64FA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ecx 0x0000000b push eax 0x0000000c pop eax 0x0000000d pop ecx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C7EB4F second address: C7EB6B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FE7A8C37285h 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C7EB6B second address: C7EB7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FE7A8F64FAAh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C94DBE second address: C94DC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C94DC6 second address: C94DE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FE7A8F64FAFh 0x0000000a pop eax 0x0000000b jng 00007FE7A8F64FDDh 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C94DE5 second address: C94DE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C940E8 second address: C940EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C940EE second address: C940F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C981A4 second address: C981AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5F722 second address: C3F222 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 js 00007FE7A8C37276h 0x00000009 push esi 0x0000000a pop esi 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov dword ptr [esp], eax 0x00000011 push esi 0x00000012 or dword ptr [ebp+122D2141h], eax 0x00000018 pop edi 0x00000019 call dword ptr [ebp+122D226Dh] 0x0000001f push eax 0x00000020 push edx 0x00000021 push eax 0x00000022 pushad 0x00000023 popad 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5FD90 second address: C5FDB4 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FE7A8F64FACh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp+04h], eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FE7A8F64FACh 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5FDB4 second address: C5FDC8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8C37280h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5FDC8 second address: C5FE35 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 jmp 00007FE7A8F64FB9h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pop eax 0x0000000e push 00000000h 0x00000010 push ebp 0x00000011 call 00007FE7A8F64FA8h 0x00000016 pop ebp 0x00000017 mov dword ptr [esp+04h], ebp 0x0000001b add dword ptr [esp+04h], 00000015h 0x00000023 inc ebp 0x00000024 push ebp 0x00000025 ret 0x00000026 pop ebp 0x00000027 ret 0x00000028 xor dx, 00DDh 0x0000002d call 00007FE7A8F64FA9h 0x00000032 pushad 0x00000033 push edi 0x00000034 jmp 00007FE7A8F64FADh 0x00000039 pop edi 0x0000003a push edx 0x0000003b jc 00007FE7A8F64FA6h 0x00000041 pop edx 0x00000042 popad 0x00000043 push eax 0x00000044 push eax 0x00000045 push edx 0x00000046 push edi 0x00000047 push ecx 0x00000048 pop ecx 0x00000049 pop edi 0x0000004a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C5FF6E second address: C5FF72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C60113 second address: C60119 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C60311 second address: C60317 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C607F2 second address: C60801 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FE7A8F64FAAh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C60A70 second address: C60B1F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8C3727Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jne 00007FE7A8C37281h 0x00000010 jmp 00007FE7A8C3727Bh 0x00000015 nop 0x00000016 push 00000000h 0x00000018 push ebp 0x00000019 call 00007FE7A8C37278h 0x0000001e pop ebp 0x0000001f mov dword ptr [esp+04h], ebp 0x00000023 add dword ptr [esp+04h], 0000001Dh 0x0000002b inc ebp 0x0000002c push ebp 0x0000002d ret 0x0000002e pop ebp 0x0000002f ret 0x00000030 push edi 0x00000031 xor ecx, dword ptr [ebp+122D3C3Fh] 0x00000037 pop edi 0x00000038 lea eax, dword ptr [ebp+124854BEh] 0x0000003e push 00000000h 0x00000040 push eax 0x00000041 call 00007FE7A8C37278h 0x00000046 pop eax 0x00000047 mov dword ptr [esp+04h], eax 0x0000004b add dword ptr [esp+04h], 00000018h 0x00000053 inc eax 0x00000054 push eax 0x00000055 ret 0x00000056 pop eax 0x00000057 ret 0x00000058 jno 00007FE7A8C3727Ch 0x0000005e nop 0x0000005f pushad 0x00000060 jmp 00007FE7A8C37288h 0x00000065 push eax 0x00000066 push edx 0x00000067 jmp 00007FE7A8C37280h 0x0000006c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C60B1F second address: C3FD62 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FE7A8F64FA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c jno 00007FE7A8F64FB2h 0x00000012 nop 0x00000013 stc 0x00000014 lea eax, dword ptr [ebp+1248547Ah] 0x0000001a push 00000000h 0x0000001c push edx 0x0000001d call 00007FE7A8F64FA8h 0x00000022 pop edx 0x00000023 mov dword ptr [esp+04h], edx 0x00000027 add dword ptr [esp+04h], 00000014h 0x0000002f inc edx 0x00000030 push edx 0x00000031 ret 0x00000032 pop edx 0x00000033 ret 0x00000034 adc di, 1429h 0x00000039 push eax 0x0000003a jmp 00007FE7A8F64FB0h 0x0000003f mov dword ptr [esp], eax 0x00000042 mov edx, 11E7134Ah 0x00000047 call dword ptr [ebp+122D2F15h] 0x0000004d push edi 0x0000004e push eax 0x0000004f push edx 0x00000050 push edi 0x00000051 pop edi 0x00000052 jo 00007FE7A8F64FA6h 0x00000058 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C3FD62 second address: C3FD8F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8C37281h 0x00000007 jmp 00007FE7A8C37285h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C1C60F second address: C1C64B instructions: 0x00000000 rdtsc 0x00000002 js 00007FE7A8F64FA8h 0x00000008 pushad 0x00000009 popad 0x0000000a push edi 0x0000000b jmp 00007FE7A8F64FB5h 0x00000010 push esi 0x00000011 pop esi 0x00000012 pop edi 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FE7A8F64FB5h 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C1C64B second address: C1C652 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C98450 second address: C9845D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C9845D second address: C98461 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C98743 second address: C98747 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C98747 second address: C9874D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C988C3 second address: C988E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 jl 00007FE7A8F64FA6h 0x0000000e pushad 0x0000000f popad 0x00000010 jl 00007FE7A8F64FA6h 0x00000016 popad 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d popad 0x0000001e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C988E1 second address: C98904 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8C3727Dh 0x00000007 jp 00007FE7A8C37276h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 pushad 0x00000013 popad 0x00000014 jbe 00007FE7A8C37276h 0x0000001a popad 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C98A22 second address: C98A28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C98A28 second address: C98A46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FE7A8C37289h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C98D4E second address: C98D7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pushad 0x0000000b popad 0x0000000c jns 00007FE7A8F64FA6h 0x00000012 popad 0x00000013 jmp 00007FE7A8F64FB9h 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C98D7D second address: C98D83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C98ED5 second address: C98EDE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C1E236 second address: C1E241 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FE7A8C37276h 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C1E241 second address: C1E25A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE7A8F64FAFh 0x00000009 jne 00007FE7A8F64FA6h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C1E25A second address: C1E279 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8C37286h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CA176C second address: CA1772 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CA1772 second address: CA1776 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CA1776 second address: CA17A5 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FE7A8F64FAEh 0x0000000c jmp 00007FE7A8F64FAFh 0x00000011 jng 00007FE7A8F64FA6h 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CA17A5 second address: CA17AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CA17AB second address: CA17AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CA17AF second address: CA17B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CA60E7 second address: CA60F8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8F64FADh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C17620 second address: C1763E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8C3727Bh 0x00000007 jmp 00007FE7A8C3727Fh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C1763E second address: C17651 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FE7A8F64FAEh 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C0EFE5 second address: C0EFE9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C0EFE9 second address: C0F000 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FE7A8F64FAFh 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAA330 second address: CAA33A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FE7A8C37276h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAA4DB second address: CAA4DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAA4DF second address: CAA4E4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAA4E4 second address: CAA4F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push edi 0x0000000a pop edi 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAA4F1 second address: CAA4F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAA5FA second address: CAA616 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 pop eax 0x00000008 popad 0x00000009 pushad 0x0000000a jo 00007FE7A8F64FA6h 0x00000010 pushad 0x00000011 popad 0x00000012 jnl 00007FE7A8F64FA6h 0x00000018 popad 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAA8AF second address: CAA8BD instructions: 0x00000000 rdtsc 0x00000002 jg 00007FE7A8C37276h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAA8BD second address: CAA8D8 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jmp 00007FE7A8F64FB5h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAA8D8 second address: CAA8EF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 ja 00007FE7A8C37276h 0x0000000b jnc 00007FE7A8C37276h 0x00000011 popad 0x00000012 pushad 0x00000013 pushad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAA8EF second address: CAA902 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FE7A8F64FA6h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAA902 second address: CAA908 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAA908 second address: CAA910 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAAAB1 second address: CAAABD instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jp 00007FE7A8C37276h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAAC4B second address: CAAC4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAAC4F second address: CAAC61 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FE7A8C37276h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jo 00007FE7A8C3727Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAB007 second address: CAB03C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FE7A8F64FAAh 0x00000009 pop esi 0x0000000a push eax 0x0000000b pushad 0x0000000c popad 0x0000000d pop eax 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 popad 0x00000014 jp 00007FE7A8F64FC0h 0x0000001a jmp 00007FE7A8F64FB4h 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAB03C second address: CAB057 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FE7A8C37281h 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAB1B2 second address: CAB1D7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8F64FB7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jno 00007FE7A8F64FA8h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAB1D7 second address: CAB1DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAB1DD second address: CAB1E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAB38A second address: CAB3A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FE7A8C37280h 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAE140 second address: CAE152 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push esi 0x00000007 pop esi 0x00000008 jc 00007FE7A8F64FA6h 0x0000000e popad 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CADE4B second address: CADE51 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CADE51 second address: CADE6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FE7A8F64FB8h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB0B73 second address: CB0B77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB0CD8 second address: CB0CE1 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB0CE1 second address: CB0D03 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 popad 0x00000009 jmp 00007FE7A8C3727Eh 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 jnp 00007FE7A8C37276h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB0E35 second address: CB0E39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB0E39 second address: CB0E5B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007FE7A8C37286h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push esi 0x0000000c pushad 0x0000000d popad 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 pop esi 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB65BC second address: CB65C1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB65C1 second address: CB65C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB66E4 second address: CB66E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB6838 second address: CB683E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB683E second address: CB684E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push edi 0x00000008 pop edi 0x00000009 push esi 0x0000000a pop esi 0x0000000b pop esi 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB684E second address: CB6852 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB6C70 second address: CB6C76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB76E5 second address: CB7704 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FE7A8C37288h 0x00000008 push eax 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB7704 second address: CB770A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBA882 second address: CBA886 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBA886 second address: CBA89E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jns 00007FE7A8F64FA8h 0x0000000e js 00007FE7A8F64FACh 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBA01A second address: CBA01F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBA2D5 second address: CBA2D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBFD22 second address: CBFD27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBF037 second address: CBF061 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FE7A8F64FAEh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FE7A8F64FAFh 0x00000011 jns 00007FE7A8F64FA6h 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBF316 second address: CBF335 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FE7A8C37289h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBF335 second address: CBF348 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FE7A8F64FAEh 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBF348 second address: CBF352 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FE7A8C37276h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBF352 second address: CBF36E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jc 00007FE7A8F64FA6h 0x0000000f jne 00007FE7A8F64FA6h 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 pushad 0x00000019 push esi 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBF36E second address: CBF389 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FE7A8C37276h 0x0000000a pop esi 0x0000000b ja 00007FE7A8C3727Ch 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBF955 second address: CBF959 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CC7BD7 second address: CC7BE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FE7A8C37276h 0x0000000a jnl 00007FE7A8C37276h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CC5FB4 second address: CC5FD2 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jo 00007FE7A8F64FA6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FE7A8F64FB0h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C17648 second address: C17651 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CC7071 second address: CC707D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCE822 second address: CCE830 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FE7A8C37276h 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCFDB9 second address: CCFDBD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCFDBD second address: CCFDCE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push ecx 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push edx 0x0000000c pop edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD2BDD second address: CD2BF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FE7A8F64FB1h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD2BF2 second address: CD2C0C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 je 00007FE7A8C3727Eh 0x0000000c jng 00007FE7A8C37276h 0x00000012 push edi 0x00000013 pop edi 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD2C0C second address: CD2C10 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD2C10 second address: CD2C16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD2C16 second address: CD2C35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FE7A8F64FB6h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD2C35 second address: CD2C5E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8C3727Ah 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FE7A8C3727Ah 0x0000000e jmp 00007FE7A8C37281h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD2DD2 second address: CD2DD6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD2DD6 second address: CD2DEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jng 00007FE7A8C3728Eh 0x0000000c push eax 0x0000000d push edx 0x0000000e jnl 00007FE7A8C37276h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD2DEA second address: CD2DF3 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD30D0 second address: CD30E2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FE7A8C3727Bh 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD3220 second address: CD3226 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD3226 second address: CD322A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD322A second address: CD3235 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD34E2 second address: CD34E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD379E second address: CD37CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push ebx 0x0000000c jmp 00007FE7A8F64FB5h 0x00000011 jbe 00007FE7A8F64FA6h 0x00000017 pop ebx 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDB5D5 second address: CDB5DB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDB5DB second address: CDB5F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FE7A8F64FABh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDB5F0 second address: CDB5F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD970F second address: CD9713 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD9713 second address: CD972A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FE7A8C3727Dh 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD9B7B second address: CD9B8B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8F64FACh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD9B8B second address: CD9B91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD9E2F second address: CD9E44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FE7A8F64FB1h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD9E44 second address: CD9E4A instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD9E4A second address: CD9E50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD9E50 second address: CD9E55 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD9E55 second address: CD9E63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD9E63 second address: CD9E88 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8C37288h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jne 00007FE7A8C37276h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD9E88 second address: CD9E97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FE7A8F64FA6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD9E97 second address: CD9E9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDA012 second address: CDA02E instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push esi 0x00000004 pop esi 0x00000005 pushad 0x00000006 popad 0x00000007 pop edi 0x00000008 jmp 00007FE7A8F64FAEh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDA02E second address: CDA03D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jp 00007FE7A8C37276h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDA483 second address: CDA487 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDA487 second address: CDA499 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FE7A8C3727Ch 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDA499 second address: CDA4A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDA4A1 second address: CDA4A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDAC08 second address: CDAC22 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8F64FB6h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CE3F5B second address: CE3F65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CE3F65 second address: CE3F69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CE3F69 second address: CE3F6D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CE3F6D second address: CE3F73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CEC4E4 second address: CEC4EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CEC4EE second address: CEC503 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 jmp 00007FE7A8F64FAEh 0x0000000b pop esi 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CF2FAB second address: CF2FB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CF7F58 second address: CF7F6F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007FE7A8F64FADh 0x0000000e pop ebx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CF7F6F second address: CF7F99 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FE7A8C3727Bh 0x00000008 jbe 00007FE7A8C37276h 0x0000000e push eax 0x0000000f pop eax 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FE7A8C37281h 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CF7F99 second address: CF7F9F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CFB877 second address: CFB87D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D087C0 second address: D087DF instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FE7A8F64FB9h 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D087DF second address: D087E4 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0E819 second address: D0E81D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0E81D second address: D0E849 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8C37287h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007FE7A8C3727Ah 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0E849 second address: D0E887 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FE7A8F64FB3h 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d popad 0x0000000e push edx 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 jnp 00007FE7A8F64FA6h 0x00000017 pop edx 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e popad 0x0000001f jmp 00007FE7A8F64FB1h 0x00000024 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0E887 second address: D0E8A8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8C3727Bh 0x00000007 jmp 00007FE7A8C37282h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0E8A8 second address: D0E8AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0E8AE second address: D0E8CA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8C37288h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0E8CA second address: D0E8DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jc 00007FE7A8F64FA6h 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0EA1E second address: D0EA22 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0EA22 second address: D0EA2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0EA2E second address: D0EA34 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0EA34 second address: D0EA3A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0EA3A second address: D0EA40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0EA40 second address: D0EA44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0EA44 second address: D0EA48 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0FB0D second address: D0FB11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D12CEF second address: D12CF3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D12CF3 second address: D12D01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 je 00007FE7A8F64FA6h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D12D01 second address: D12D05 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D12D05 second address: D12D11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FE7A8F64FA6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D12D11 second address: D12D29 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8C37282h 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D12D29 second address: D12D2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D127E6 second address: D1280F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jnl 00007FE7A8C37276h 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f jmp 00007FE7A8C37283h 0x00000014 popad 0x00000015 popad 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D1280F second address: D12813 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D12813 second address: D12850 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 js 00007FE7A8C37282h 0x0000000e jmp 00007FE7A8C3727Ch 0x00000013 jbe 00007FE7A8C3727Ch 0x00000019 jnc 00007FE7A8C37276h 0x0000001f push eax 0x00000020 push edx 0x00000021 jng 00007FE7A8C37276h 0x00000027 jmp 00007FE7A8C3727Fh 0x0000002c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D129DD second address: D12A08 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FE7A8F64FA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jno 00007FE7A8F64FA8h 0x00000010 pop ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FE7A8F64FB6h 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D1603A second address: D1605A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8C3727Ch 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FE7A8C3727Ch 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D1605A second address: D1607F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE7A8F64FAEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jns 00007FE7A8F64FA8h 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 push ecx 0x00000013 jng 00007FE7A8F64FA6h 0x00000019 pop ecx 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D2EEE3 second address: D2EF00 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FE7A8C37276h 0x00000008 jmp 00007FE7A8C37283h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D2EAF2 second address: D2EAF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D36979 second address: D36997 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FE7A8C37288h 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D36997 second address: D369A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FE7A8F64FA6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D369A1 second address: D369A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D369A5 second address: D369CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a jno 00007FE7A8F64FA6h 0x00000010 jmp 00007FE7A8F64FADh 0x00000015 jno 00007FE7A8F64FA6h 0x0000001b popad 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D369CC second address: D369E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 jmp 00007FE7A8C3727Dh 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jbe 00007FE7A8C37276h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3622F second address: D3623D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FE7A8F64FA6h 0x0000000a pop edx 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3623D second address: D3626B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pushad 0x00000007 jbe 00007FE7A8C3727Ch 0x0000000d jp 00007FE7A8C37278h 0x00000013 push ebx 0x00000014 jmp 00007FE7A8C37280h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D363AB second address: D363CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FE7A8F64FB4h 0x00000009 jg 00007FE7A8F64FACh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3667B second address: D3668A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FE7A8C3727Bh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3668A second address: D366C0 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FE7A8F64FA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FE7A8F64FB9h 0x00000011 jmp 00007FE7A8F64FB1h 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D39CAC second address: D39CB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D39CB2 second address: D39CB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D39CB6 second address: D39CD4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FE7A8C37283h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D39CD4 second address: D39CF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 ja 00007FE7A8F64FA6h 0x0000000c popad 0x0000000d push ebx 0x0000000e jo 00007FE7A8F64FA6h 0x00000014 pushad 0x00000015 popad 0x00000016 pop ebx 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b pushad 0x0000001c popad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D39CF3 second address: D39D29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FE7A8C37276h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FE7A8C37286h 0x00000012 jmp 00007FE7A8C37283h 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D39D29 second address: D39D33 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FE7A8F64FA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3DC32 second address: D3DC38 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3DC38 second address: D3DC3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3DC3E second address: D3DC42 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D40545 second address: D40549 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D44032 second address: D44044 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FE7A8C3727Eh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D44044 second address: D44051 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FE7A8F64FA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D44051 second address: D44057 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D39867 second address: D3986B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3ABB6 second address: D3ABD7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FE7A8C37286h 0x0000000b popad 0x0000000c pushad 0x0000000d push ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3ABD7 second address: D3ABDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3ABDD second address: D3ABE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3ABE5 second address: D3ABEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3ABEE second address: D3ABF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3ABF2 second address: D3ABF6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3ABF6 second address: D3ABFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: AADDA6 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: AADE85 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: AAB27A instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: C5F8A3 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: CE6B52 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: C4B337 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeMemory allocated: 4DF0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 5010000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 4DF0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C2691C rdtsc 5_2_00C2691C
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 7304Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C89F0C GetSystemInfo,VirtualAlloc,5_2_00C89F0C
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: file.exe, file.exe, 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
Source: file.exe, 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: regmonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: gbdyllo
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: procmon_window_class
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: ollydbg
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: filemonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeFile opened: NTICE
Source: C:\Users\user\Desktop\file.exeFile opened: SICE
Source: C:\Users\user\Desktop\file.exeFile opened: SIWVID
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00C2691C rdtsc 5_2_00C2691C
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00AAB7DE LdrInitializeThunk,5_2_00AAB7DE
Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior
Source: file.exe, file.exe, 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpBinary or memory string: !NProgram Manager

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\Desktop\file.exeRegistry key value created / modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications DisableNotifications 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableIOAVProtection 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableRealtimeMonitoring 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\NotificationsRegistry value created: DisableNotifications 1Jump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry value created: TamperProtection 0Jump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AUOptionsJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AutoInstallMinorUpdatesJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate DoNotConnectToWindowsUpdateInternetLocationsJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping641
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
41
Disable or Modify Tools
LSASS Memory2
Process Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
Bypass User Account Control
261
Virtualization/Sandbox Evasion
Security Account Manager261
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS23
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
Software Packing
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
Bypass User Account Control
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1561503
Start date and time:2024-11-23 15:37:10 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 21s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:12
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal100.evad.winEXE@1/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, ctldl.windowsupdate.com, time.windows.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • VT rate limit hit for: file.exe
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\file.exe
File Type:CSV text
Category:dropped
Size (bytes):226
Entropy (8bit):5.360398796477698
Encrypted:false
SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
MD5:3A8957C6382192B71471BD14359D0B12
SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
Malicious:true
Reputation:high, very likely benign file
Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.512911276418392
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:file.exe
File size:2'789'888 bytes
MD5:00737bada48d092c96d1d6a8829f680f
SHA1:55dfedce4c520fe53ca2180f848e2089924365fb
SHA256:d550c57c2b194b654d639537aa23827b98e2f03f0bd58957c7ae1bef570253e9
SHA512:ae20be90d29fde0df2a6ff38a4fbd35125b077f4d3f743d3e2403845e2a816cc7035aafa6a849044e5261b09ed87e8a9c12e6068654b473f6466cb8897ca5cd2
SSDEEP:49152:Kv+OTSKS5EOWbmnE1SLrHTCgEf/QgZpWGMRrKX:NHVObmnE1srHe9LMhK
TLSH:2FD53962B94962CFD48F27746137CD82A95D43F9872008D7DC2CA9BE7D63CC521BAD28
File Content Preview:MZ......................@...........z...................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P(,e.........."...0..$............+.. ...`....@.. .......................@+.......*...`................................
Icon Hash:00928e8e8686b000
Entrypoint:0x6b0000
Entrypoint Section:.taggant
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE
Time Stamp:0x652C2850 [Sun Oct 15 17:58:40 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:2eabe9054cad5152567f0699947a2c5b
Instruction
jmp 00007FE7A896F01Ah
pshufw mm5, qword ptr [edx], 00h
add byte ptr [eax], al
add byte ptr [eax], al
jmp 00007FE7A8971015h
add byte ptr [0000000Ah], al
add byte ptr [eax], al
add byte ptr [eax], dh
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add al, byte ptr [eax]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [0000000Ah], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [edi], al
add byte ptr [eax], 00000000h
add byte ptr [eax], al
add byte ptr [eax], al
adc byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add al, 0Ah
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x80550x69.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000x59c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x81f80x8.idata
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
0x20000x40000x1200f8400e64472ed813e49655e3469e2517False0.9301215277777778data7.767064817005539IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x60000x59c0x600aae15e30898a02f09cc86ed48aa06b09False0.4140625data4.036947054771808IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata 0x80000x20000x200ec9cb51e8cb4ea49a56ee3cf434fb69eFalse0.1484375data0.9342685949460681IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
faexbrgj0xa0000x2a40000x2a3200f25f4604c3fa89f2c5245d8056dbffa2unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
fsrgkmwp0x2ae0000x20000x40061c0b82eb28e07729e5ac6c1949ba1a3False0.8154296875data6.350584241124989IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.taggant0x2b00000x40000x22005272f4559f4029617bc8ec7ad605e834False0.06399356617647059DOS executable (COM)0.6773507637832054IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x60900x30cdata0.42948717948717946
RT_MANIFEST0x63ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
DLLImport
kernel32.dlllstrcpy
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:5
Start time:09:38:08
Start date:23/11/2024
Path:C:\Users\user\Desktop\file.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\file.exe"
Imagebase:0xaa0000
File size:2'789'888 bytes
MD5 hash:00737BADA48D092C96D1D6A8829F680F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:5.3%
    Dynamic/Decrypted Code Coverage:3.8%
    Signature Coverage:8.1%
    Total number of Nodes:234
    Total number of Limit Nodes:10
    execution_graph 7349 aaebe8 VirtualAlloc 7350 aaebfa 7349->7350 7351 c28ee1 7352 c28ef6 CreateFileA 7351->7352 7353 c28f03 7352->7353 7354 c89f0c GetSystemInfo 7355 c89f6a VirtualAlloc 7354->7355 7356 c89f2c 7354->7356 7369 c8a258 7355->7369 7356->7355 7358 c89fb1 7359 c8a258 VirtualAlloc GetModuleFileNameA VirtualProtect 7358->7359 7367 c8a086 7358->7367 7361 c89fdb 7359->7361 7360 c8a0a2 GetModuleFileNameA VirtualProtect 7368 c8a04a 7360->7368 7362 c8a258 VirtualAlloc GetModuleFileNameA VirtualProtect 7361->7362 7361->7367 7363 c8a005 7362->7363 7364 c8a258 VirtualAlloc GetModuleFileNameA VirtualProtect 7363->7364 7363->7367 7365 c8a02f 7364->7365 7366 c8a258 VirtualAlloc GetModuleFileNameA VirtualProtect 7365->7366 7365->7367 7365->7368 7366->7367 7367->7360 7367->7368 7371 c8a260 7369->7371 7372 c8a28c 7371->7372 7373 c8a274 7371->7373 7375 c8a124 2 API calls 7372->7375 7379 c8a124 7373->7379 7376 c8a29d 7375->7376 7381 c8a2af 7376->7381 7384 c8a12c 7379->7384 7382 c8a2c0 VirtualAlloc 7381->7382 7383 c8a2ab 7381->7383 7382->7383 7385 c8a13f 7384->7385 7387 c8a182 7385->7387 7388 c8a777 7385->7388 7391 c8a77e 7388->7391 7390 c8a7c8 7390->7387 7391->7390 7393 c8a685 7391->7393 7397 c8a938 7391->7397 7396 c8a69a 7393->7396 7394 c8a75a 7394->7391 7395 c8a724 GetModuleFileNameA 7395->7396 7396->7394 7396->7395 7399 c8a94c 7397->7399 7398 c8a964 7398->7391 7399->7398 7400 c8aa87 VirtualProtect 7399->7400 7400->7399 7401 c81c0f 7404 c81a57 7401->7404 7407 c81abe 7404->7407 7406 c81a6c 7409 c81acb 7407->7409 7411 c81ae1 7409->7411 7410 c81ae9 7414 c81bc9 7410->7414 7415 c81bb6 7410->7415 7411->7410 7412 c81b06 7411->7412 7432 c8b17f 7411->7432 7426 c803f8 GetCurrentThreadId 7412->7426 7419 c81bd3 LoadLibraryExW 7414->7419 7420 c81be7 LoadLibraryExA 7414->7420 7454 c818f6 7415->7454 7425 c81b8d 7419->7425 7420->7425 7423 c81b4a 7434 c81436 7423->7434 7427 c80410 7426->7427 7428 c80b0a 7427->7428 7429 c80b58 7428->7429 7430 c80b1b 7428->7430 7429->7410 7429->7423 7430->7429 7458 c809ab 7430->7458 7478 c8b18e 7432->7478 7435 c8145c 7434->7435 7436 c81452 7434->7436 7486 c80c89 7435->7486 7436->7425 7443 c814ac 7444 c814d9 7443->7444 7452 c81556 7443->7452 7496 c80e67 7443->7496 7500 c81102 7444->7500 7447 c814e4 7447->7452 7505 c81079 7447->7505 7449 c81511 7450 c81539 7449->7450 7449->7452 7509 c8add4 7449->7509 7450->7452 7513 c8aacd 7450->7513 7452->7436 7518 c81c48 7452->7518 7455 c81901 7454->7455 7456 c81911 7455->7456 7457 c81922 LoadLibraryExA 7455->7457 7456->7425 7457->7456 7460 c809d8 7458->7460 7459 c80ade 7459->7430 7460->7459 7461 c80a21 7460->7461 7462 c80a06 PathAddExtensionA 7460->7462 7467 c80a43 7461->7467 7470 c8064c 7461->7470 7462->7461 7464 c80a8c 7464->7459 7465 c80ab5 7464->7465 7466 c8064c lstrcmpiA 7464->7466 7465->7459 7469 c8064c lstrcmpiA 7465->7469 7466->7465 7467->7459 7467->7464 7468 c8064c lstrcmpiA 7467->7468 7468->7464 7469->7459 7471 c8066a 7470->7471 7472 c80681 7471->7472 7474 c805c9 7471->7474 7472->7467 7476 c805f4 7474->7476 7475 c8063c 7475->7472 7476->7475 7477 c80626 lstrcmpiA 7476->7477 7477->7475 7479 c8b19e 7478->7479 7480 c803f8 GetCurrentThreadId 7479->7480 7485 c8b1f0 7479->7485 7481 c8b206 7480->7481 7482 c80b0a 2 API calls 7481->7482 7483 c8b218 7482->7483 7484 c80b0a 2 API calls 7483->7484 7483->7485 7484->7485 7487 c80ca5 7486->7487 7489 c80cfe 7486->7489 7488 c80cd5 VirtualAlloc 7487->7488 7487->7489 7488->7489 7489->7436 7490 c80d2f VirtualAlloc 7489->7490 7491 c80d74 7490->7491 7491->7452 7492 c80dac 7491->7492 7495 c80dd4 7492->7495 7493 c80e4b 7493->7443 7494 c80ded VirtualAlloc 7494->7493 7494->7495 7495->7493 7495->7494 7497 c80e87 7496->7497 7499 c80e82 7496->7499 7498 c80eba lstrcmpiA 7497->7498 7497->7499 7498->7497 7498->7499 7499->7444 7501 c8120e 7500->7501 7503 c8112f 7500->7503 7501->7447 7503->7501 7520 c80c14 7503->7520 7528 c81d25 7503->7528 7507 c810a2 7505->7507 7506 c810ba VirtualProtect 7506->7507 7508 c810e3 7506->7508 7507->7506 7507->7508 7508->7449 7510 c8aea1 7509->7510 7511 c8adf0 7509->7511 7510->7450 7511->7510 7512 c8a938 VirtualProtect 7511->7512 7512->7511 7515 c8ab61 7513->7515 7517 c8aade 7513->7517 7514 c8a777 2 API calls 7514->7517 7515->7452 7516 c8a938 VirtualProtect 7516->7517 7517->7514 7517->7515 7517->7516 7553 c81c54 7518->7553 7521 c81a57 17 API calls 7520->7521 7522 c80c27 7521->7522 7523 c80c79 7522->7523 7525 c80c50 7522->7525 7527 c80c6d 7522->7527 7524 c81c48 2 API calls 7523->7524 7524->7527 7526 c81c48 2 API calls 7525->7526 7525->7527 7526->7527 7527->7503 7530 c81d2e 7528->7530 7531 c81d3d 7530->7531 7533 c803f8 GetCurrentThreadId 7531->7533 7535 c81d45 7531->7535 7532 c81d72 GetProcAddress 7538 c81d68 7532->7538 7534 c81d4f 7533->7534 7534->7535 7536 c81d5f 7534->7536 7535->7532 7539 c81786 7536->7539 7540 c81872 7539->7540 7541 c817a5 7539->7541 7540->7538 7541->7540 7542 c817e2 lstrcmpiA 7541->7542 7543 c8180c 7541->7543 7542->7541 7542->7543 7543->7540 7545 c816cf 7543->7545 7546 c816e0 7545->7546 7547 c81710 lstrcpyn 7546->7547 7548 c8176b 7546->7548 7547->7548 7550 c8172c 7547->7550 7548->7540 7549 c80c14 16 API calls 7551 c8175a 7549->7551 7550->7548 7550->7549 7551->7548 7552 c81d25 16 API calls 7551->7552 7552->7548 7554 c81c63 7553->7554 7556 c803f8 GetCurrentThreadId 7554->7556 7558 c81c6b 7554->7558 7555 c81cb9 FreeLibrary 7561 c81ca0 7555->7561 7557 c81c75 7556->7557 7557->7558 7559 c81c85 7557->7559 7558->7555 7562 c81636 7559->7562 7563 c81659 7562->7563 7565 c81699 7562->7565 7563->7565 7566 c801f2 7563->7566 7565->7561 7567 c801fb 7566->7567 7568 c80213 7567->7568 7570 c801d9 7567->7570 7568->7565 7571 c81c48 2 API calls 7570->7571 7572 c801e6 7571->7572 7572->7567 7573 c28d6c CreateFileA 7574 c28d7c 7573->7574 7575 4fe1510 7576 4fe1558 ControlService 7575->7576 7577 4fe158f 7576->7577 7578 c8aea6 7580 c8aeb2 7578->7580 7581 c8aec4 7580->7581 7582 c8aacd 2 API calls 7581->7582 7583 c8aed6 7582->7583 7586 c28b33 7587 c28b39 CreateFileA 7586->7587 7588 c28ba6 7586->7588 7589 c28b4d 7587->7589 7590 c8af5c 7592 c8af68 7590->7592 7593 c8af7a 7592->7593 7598 c81a70 7593->7598 7595 c8af89 7596 c8afa2 7595->7596 7597 c8aacd GetModuleFileNameA VirtualProtect 7595->7597 7597->7596 7600 c81a7c 7598->7600 7601 c81a91 7600->7601 7602 c81abe 17 API calls 7601->7602 7603 c81aaf 7601->7603 7602->7603 7604 aab7de 7605 aab7e3 7604->7605 7606 aab94e LdrInitializeThunk 7605->7606 7607 c33ed5 7608 c33ef7 7607->7608 7609 c33f06 RegOpenKeyA 7608->7609 7610 c33f2d RegOpenKeyA 7608->7610 7609->7610 7611 c33f23 7609->7611 7612 c33f4a 7610->7612 7611->7610 7613 c33f8e GetNativeSystemInfo 7612->7613 7614 c33525 7612->7614 7613->7614 7615 4fe0d48 7616 4fe0d93 OpenSCManagerW 7615->7616 7618 4fe0ddc 7616->7618 7619 4fe1308 7620 4fe1349 ImpersonateLoggedOnUser 7619->7620 7621 4fe1376 7620->7621 7622 c8af10 7624 c8af1c 7622->7624 7625 c8af2e 7624->7625 7626 c81a57 17 API calls 7625->7626 7627 c8af3d 7626->7627 7628 c8af56 7627->7628 7629 c8aacd 2 API calls 7627->7629 7629->7628 7630 aae631 7631 aae945 VirtualAlloc 7630->7631 7633 aaf61c 7631->7633 7634 c2691c LoadLibraryA 7635 c2695a 7634->7635

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 162 c89f0c-c89f26 GetSystemInfo 163 c89f6a-c89fb3 VirtualAlloc call c8a258 162->163 164 c89f2c-c89f64 162->164 168 c8a099 call c8a0a2 163->168 169 c89fb9-c89fdd call c8a258 163->169 164->163 174 c8a09e 168->174 169->168 175 c89fe3-c8a007 call c8a258 169->175 176 c8a0a0-c8a0a1 174->176 175->168 179 c8a00d-c8a031 call c8a258 175->179 179->168 182 c8a037-c8a044 179->182 183 c8a06a-c8a081 call c8a258 182->183 184 c8a04a-c8a065 182->184 187 c8a086-c8a088 183->187 188 c8a094 184->188 187->168 189 c8a08e 187->189 188->176 189->188
    APIs
    • GetSystemInfo.KERNELBASE(?,-11825FEC), ref: 00C89F18
    • VirtualAlloc.KERNELBASE(00000000,00004000,00001000,00000004), ref: 00C89F79
    Memory Dump Source
    • Source File: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID: AllocInfoSystemVirtual
    • String ID:
    • API String ID: 3440192736-0
    • Opcode ID: 7ccaf0e0e04d5f822b109fd50dd9b0d024f810153d70336bc3c52f12f8dc43ac
    • Instruction ID: dd64953fe734b4f2ecedb909e692acbd7122952671741f58f90c0f059e921145
    • Opcode Fuzzy Hash: 7ccaf0e0e04d5f822b109fd50dd9b0d024f810153d70336bc3c52f12f8dc43ac
    • Instruction Fuzzy Hash: 264173B2D00606AFE335DF61C805BA6B7ECFB48741F1141A7B607C94C2E77295D08BA4

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 299 c2691c-c26942 LoadLibraryA 300 c2695a-c26a87 299->300
    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID:
    • API String ID: 1029625771-0
    • Opcode ID: 8f9dd45a050807a0c547df93772f0e5b1a741acba39bd8b003b24a1e3f29d924
    • Instruction ID: 98ddaef5eec8a08443f49e37cc887c9ea12656e310a55909a37b657a3b5995e3
    • Opcode Fuzzy Hash: 8f9dd45a050807a0c547df93772f0e5b1a741acba39bd8b003b24a1e3f29d924
    • Instruction Fuzzy Hash: 7E315BF650C210AFE301AF29D88067EFBF9EF94720F16482DE6C4C2650D23549948BA7
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID:
    • String ID: !!iH
    • API String ID: 0-3430752988
    • Opcode ID: ffeda01b9b1bdb47613ca9b54b39c39022ce86a57fb9ebe30e58a5855b1bdb46
    • Instruction ID: 4893908be335d6d5af64bbcdce6b730f37769bdcee5c65a168958468566fb130
    • Opcode Fuzzy Hash: ffeda01b9b1bdb47613ca9b54b39c39022ce86a57fb9ebe30e58a5855b1bdb46
    • Instruction Fuzzy Hash: 68E0C2B22244858ACF17AF24890179E3B1DDF43700F904115FB519BECBCB2D4C1187B6

    Control-flow Graph

    APIs
    • LoadLibraryExW.KERNEL32(?,?,?), ref: 00C81BDC
    • LoadLibraryExA.KERNELBASE(00000000,?,?), ref: 00C81BF0
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID: .dll$.exe$1002
    • API String ID: 1029625771-847511843
    • Opcode ID: 35671097b01d7b452b0cccaf2ee059331593ff14f97ad973104148f3e8e02bb0
    • Instruction ID: 117c644e299e1ce2898c57422f1e0844ebccf7af1168eb5ce44eb243a809bbd1
    • Opcode Fuzzy Hash: 35671097b01d7b452b0cccaf2ee059331593ff14f97ad973104148f3e8e02bb0
    • Instruction Fuzzy Hash: 1131ADB1804205EFCF25BF50E905ABD7BB9FF14359F184165FC0256060E7309AA2EB99

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 38 c8a938-c8a946 39 c8a969-c8a973 call c8a7cd 38->39 40 c8a94c-c8a95e 38->40 45 c8a979 39->45 46 c8a97e-c8a987 39->46 40->39 44 c8a964 40->44 47 c8aac8-c8aaca 44->47 45->47 48 c8a98d-c8a994 46->48 49 c8a99f-c8a9a6 46->49 48->49 52 c8a99a 48->52 50 c8a9ac 49->50 51 c8a9b1-c8a9c1 49->51 50->47 51->47 53 c8a9c7-c8a9d3 call c8a8a2 51->53 52->47 56 c8a9d6-c8a9da 53->56 56->47 57 c8a9e0-c8a9ea 56->57 58 c8a9f0-c8aa03 57->58 59 c8aa11-c8aa14 57->59 58->59 64 c8aa09-c8aa0b 58->64 60 c8aa17-c8aa1a 59->60 62 c8aac0-c8aac3 60->62 63 c8aa20-c8aa27 60->63 62->56 65 c8aa2d-c8aa33 63->65 66 c8aa55-c8aa6e 63->66 64->59 64->62 67 c8aa39-c8aa3e 65->67 68 c8aa50 65->68 72 c8aa74-c8aa82 66->72 73 c8aa87-c8aa8f VirtualProtect 66->73 67->68 69 c8aa44-c8aa4a 67->69 70 c8aab8-c8aabb 68->70 69->66 69->68 70->60 74 c8aa95-c8aa98 72->74 73->74 74->70 76 c8aa9e-c8aab7 74->76 76->70
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID:
    • String ID: .exe$.exe
    • API String ID: 0-1392631246
    • Opcode ID: a4ea7ccefee7476e854d7feee08c4e4f0c570ae6babd1f70bb0f61e838f9ae4f
    • Instruction ID: a3efaaeeea05b83515641650a64d739fc28339b94cb3cdae47ca52246c06e7f5
    • Opcode Fuzzy Hash: a4ea7ccefee7476e854d7feee08c4e4f0c570ae6babd1f70bb0f61e838f9ae4f
    • Instruction Fuzzy Hash: 1A41D371900205EFFB29EF10DA44BAD77B0FF04318F158056E413AA991C335AE90EF9A

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 78 c33ed5-c33f04 80 c33f06-c33f21 RegOpenKeyA 78->80 81 c33f2d-c33f48 RegOpenKeyA 78->81 80->81 82 c33f23 80->82 83 c33f60-c33f8c 81->83 84 c33f4a-c33f54 81->84 82->81 87 c33f99-c33fa3 83->87 88 c33f8e-c33f97 GetNativeSystemInfo 83->88 84->83 89 c33fa5 87->89 90 c33faf-c33fbd 87->90 88->87 89->90 92 c33fc9-c33fd0 90->92 93 c33fbf 90->93 94 c33fe3 92->94 95 c33fd6-c33fdd 92->95 93->92 96 c3430b-c34312 94->96 95->94 95->96 97 c33525-c33c66 96->97 98 c34318-c34326 96->98
    APIs
    • RegOpenKeyA.ADVAPI32(80000001,?,?), ref: 00C33F19
    • RegOpenKeyA.ADVAPI32(80000002,?,?), ref: 00C33F40
    • GetNativeSystemInfo.KERNELBASE(?), ref: 00C33F97
    Memory Dump Source
    • Source File: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID: Open$InfoNativeSystem
    • String ID:
    • API String ID: 1247124224-0
    • Opcode ID: aaf50d59ad2368f496187459ee843df69cdfdeabcab0f67ed009ce821043ab81
    • Instruction ID: 59ef1e037790d5d118fd7fc06c45210eca19157984690b0b5984d4458cb51fd9
    • Opcode Fuzzy Hash: aaf50d59ad2368f496187459ee843df69cdfdeabcab0f67ed009ce821043ab81
    • Instruction Fuzzy Hash: 5431F87191424EDFEF21DF90C848BEF3BA5EF08305F500526E98282951EBB65EA4CF59

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 100 c809ab-c809db 102 c809e1-c809f6 100->102 103 c80b06-c80b07 100->103 102->103 105 c809fc-c80a00 102->105 106 c80a22-c80a29 105->106 107 c80a06-c80a18 PathAddExtensionA 105->107 108 c80a4b-c80a52 106->108 109 c80a2f-c80a3e call c8064c 106->109 110 c80a21 107->110 112 c80a58-c80a5f 108->112 113 c80a94-c80a9b 108->113 116 c80a43-c80a45 109->116 110->106 117 c80a78-c80a87 call c8064c 112->117 118 c80a65-c80a6e 112->118 114 c80abd-c80ac4 113->114 115 c80aa1-c80ab7 call c8064c 113->115 120 c80aca-c80ae0 call c8064c 114->120 121 c80ae6-c80aed 114->121 115->103 115->114 116->103 116->108 127 c80a8c-c80a8e 117->127 118->117 122 c80a74 118->122 120->103 120->121 121->103 126 c80af3-c80b00 call c80685 121->126 122->117 126->103 127->103 127->113
    APIs
    • PathAddExtensionA.KERNELBASE(?,00000000), ref: 00C80A0D
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID: ExtensionPath
    • String ID: \\?\
    • API String ID: 158807944-4282027825
    • Opcode ID: d1692686fe0c260f34d6148e81ed43a0f93b867f1a3fb881523b4647305f7bd2
    • Instruction ID: eded31a6e6b9ecd8eafe51c5128672285485422f60c125d7ac8c6e0c477e0e3a
    • Opcode Fuzzy Hash: d1692686fe0c260f34d6148e81ed43a0f93b867f1a3fb881523b4647305f7bd2
    • Instruction Fuzzy Hash: BF313975A00609BFDF61EF94CD09F9E777AFF44348F100064F911A5060D7329A68EB98

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 131 c28d6c-c28d76 CreateFileA 132 c28f20-c28f22 131->132 133 c28d7c-c28dfd 131->133 134 c28f28 132->134 135 c28f2e-c28f63 call c28f66 132->135 144 c28e03 133->144 145 c28e08-c28e0a 133->145 134->135 144->145 146 c28e10 145->146 147 c28e11-c28e2b call c28e2d 145->147 146->147
    APIs
    • CreateFileA.KERNELBASE(?,00C28C77,00000003), ref: 00C28D73
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID: C
    • API String ID: 823142352-1037565863
    • Opcode ID: 73067c0868b6bd5406daa4a23e2a71fd96122b1f1d744a82c6ce95c05ddfe2b2
    • Instruction ID: 61f9238fe86a951e9924b7091aac40b0b1b27ef947ef8f347f2d50600472040e
    • Opcode Fuzzy Hash: 73067c0868b6bd5406daa4a23e2a71fd96122b1f1d744a82c6ce95c05ddfe2b2
    • Instruction Fuzzy Hash: 0C117AB718A36A6ED7108E15BC11BFE3B68E795320F30411AF50596C86DFA10E0D4625

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 150 c28ee1-c28efd CreateFileA 152 c28f03-c28f11 150->152 153 c28f20-c28f22 150->153 152->153 156 c2904f-c29059 call c2905c 152->156 154 c28f28 153->154 155 c28f2e-c28f63 call c28f66 153->155 154->155
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID: C
    • API String ID: 823142352-1037565863
    • Opcode ID: ab82ba0997840581405af36259ea5307d51d92120d5efa30f8910263e04c3f60
    • Instruction ID: 4452104780961b0fd1ad17b07edca3f92472d94d228d9625ab9e58f872f15e7c
    • Opcode Fuzzy Hash: ab82ba0997840581405af36259ea5307d51d92120d5efa30f8910263e04c3f60
    • Instruction Fuzzy Hash: 97F08B771892382ED7118A996D117EE7385EB59330F300119F489E3D82D6A81E09563A

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 190 aae631-aaf4ee VirtualAlloc 194 aaf61c-aaf810 190->194
    APIs
    • VirtualAlloc.KERNELBASE(00000000), ref: 00AAF4D9
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID: 3M_
    • API String ID: 4275171209-2939996684
    • Opcode ID: 500f57350c6ede9c80d08564849c3446e797720911ae4851a6649d1d3c792e56
    • Instruction ID: bc2334d8413611178d3526fa6bd50b2adc196836d08ff2610055c4647e96c691
    • Opcode Fuzzy Hash: 500f57350c6ede9c80d08564849c3446e797720911ae4851a6649d1d3c792e56
    • Instruction Fuzzy Hash: 3BF03AB054D341EFD7849F65D4805AFB6F4EF5A720F21892DAAE6872D0D3300C41AB67

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 204 c28c7b-c28cd2 208 c28cd8-c28cdd 204->208 209 c28cde-c28cf0 204->209 208->209 210 c28cf6-c28d03 209->210 211 c28d04-c28d76 call c28d6c CreateFileA 209->211 210->211 218 c28f20-c28f22 211->218 219 c28d7c-c28dfd 211->219 220 c28f28 218->220 221 c28f2e-c28f63 call c28f66 218->221 230 c28e03 219->230 231 c28e08-c28e0a 219->231 220->221 230->231 232 c28e10 231->232 233 c28e11-c28e2b call c28e2d 231->233 232->233
    APIs
    • CreateFileA.KERNELBASE(?,00C28C77,00000003), ref: 00C28D73
    Memory Dump Source
    • Source File: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 4fd28bc2029f913929409dc93a20c7a1bc9c6273efe5786415ffbc58859f34b6
    • Instruction ID: 39dff99a1198b532748df633712f119f1d9a6f53f642ffb9f1dc48e8f6a683b1
    • Opcode Fuzzy Hash: 4fd28bc2029f913929409dc93a20c7a1bc9c6273efe5786415ffbc58859f34b6
    • Instruction Fuzzy Hash: D33181FB14A2667DF201CA457E25EFA6B6DE7D6730F30882AF402D5886DA910E0E2135

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 236 c28c92-c28cd2 240 c28cd8-c28cdd 236->240 241 c28cde-c28cf0 236->241 240->241 242 c28cf6-c28d03 241->242 243 c28d04-c28d76 call c28d6c CreateFileA 241->243 242->243 250 c28f20-c28f22 243->250 251 c28d7c-c28dfd 243->251 252 c28f28 250->252 253 c28f2e-c28f63 call c28f66 250->253 262 c28e03 251->262 263 c28e08-c28e0a 251->263 252->253 262->263 264 c28e10 263->264 265 c28e11-c28e2b call c28e2d 263->265 264->265
    APIs
    • CreateFileA.KERNELBASE(?,00C28C77,00000003), ref: 00C28D73
    Memory Dump Source
    • Source File: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 5b5a5df969a0cd6260336bef0ef337efb3e5eaaa241006d091428eda0cc76653
    • Instruction ID: 7ac45fd8f67176d4e6e6e09e748e17d86fa65440a14758f16d49140b7116296d
    • Opcode Fuzzy Hash: 5b5a5df969a0cd6260336bef0ef337efb3e5eaaa241006d091428eda0cc76653
    • Instruction Fuzzy Hash: 3F31D5FB18A2666DF301CE457E21BFA7B6CE7D2730F30842AF402D5986DA910E0D6135

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 268 c28cb2-c28cd2 269 c28cd8-c28cdd 268->269 270 c28cde-c28cf0 268->270 269->270 271 c28cf6-c28d03 270->271 272 c28d04-c28d76 call c28d6c CreateFileA 270->272 271->272 279 c28f20-c28f22 272->279 280 c28d7c-c28dfd 272->280 281 c28f28 279->281 282 c28f2e-c28f63 call c28f66 279->282 291 c28e03 280->291 292 c28e08-c28e0a 280->292 281->282 291->292 293 c28e10 292->293 294 c28e11-c28e2b call c28e2d 292->294 293->294
    APIs
    • CreateFileA.KERNELBASE(?,00C28C77,00000003), ref: 00C28D73
    Memory Dump Source
    • Source File: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 3e7485170c20b427db7c738e3f4dd70c1d613cb6fff17521de56a60a776529c6
    • Instruction ID: b8a6603cfae25918b6936c7e03f1872c60aa5afd7701c69120a5d4bcc68d8252
    • Opcode Fuzzy Hash: 3e7485170c20b427db7c738e3f4dd70c1d613cb6fff17521de56a60a776529c6
    • Instruction Fuzzy Hash: 0831C7B714A2666DE302CE557E15BBA7B6DE7D2730F30846AF402C6886DA910E0D6235

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 297 c26a8d-c26b0f LoadLibraryA 298 c26b10-c26be0 297->298
    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID:
    • API String ID: 1029625771-0
    • Opcode ID: 5b454a78d22498c2785179c448c26684dd740ae0182a2a92eeec428c79b48e2c
    • Instruction ID: a4367cc066033592ef11dbe347309727ca0bab1ec4ea233d5b7c0cb8b2a9e613
    • Opcode Fuzzy Hash: 5b454a78d22498c2785179c448c26684dd740ae0182a2a92eeec428c79b48e2c
    • Instruction Fuzzy Hash: 90314DB250C314AFE705BF19EC81ABAFBE8EF55721F164D2DE6C483600EA3558448B97

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 301 c28d1b-c28d29 302 c28cfb-c28d16 301->302 303 c28d2b-c28d2d 301->303 305 c28d2e-c28d76 call c28d6c CreateFileA 302->305 303->305 311 c28f20-c28f22 305->311 312 c28d7c-c28dfd 305->312 313 c28f28 311->313 314 c28f2e-c28f63 call c28f66 311->314 323 c28e03 312->323 324 c28e08-c28e0a 312->324 313->314 323->324 325 c28e10 324->325 326 c28e11-c28e2b call c28e2d 324->326 325->326
    APIs
    • CreateFileA.KERNELBASE(?,00C28C77,00000003), ref: 00C28D73
    Memory Dump Source
    • Source File: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 9afff1e003af64f3bd8f5cf1d9d06aca788bea61d266958373905ad6fdbbbe5d
    • Instruction ID: 9afd13893a5bf4efeae310b5f895b73f4904c18e702a788e235b6d739e25f659
    • Opcode Fuzzy Hash: 9afff1e003af64f3bd8f5cf1d9d06aca788bea61d266958373905ad6fdbbbe5d
    • Instruction Fuzzy Hash: B1212BB714926A6DE301CE117D21BBA7B6CF792730F30452BF402CA886DB900E0E5634
    Memory Dump Source
    • Source File: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: ef2b5e1ebe662260f2ae56cd6396d90aac51b4f512528bcc990c6d6febf8213c
    • Instruction ID: e5e99bbea59fb32582c0224333493dc573fcb8984689c46bfbe3c6bc69489976
    • Opcode Fuzzy Hash: ef2b5e1ebe662260f2ae56cd6396d90aac51b4f512528bcc990c6d6febf8213c
    • Instruction Fuzzy Hash: 0F01497718936B5DE7118E117D21FBE3B28F7D2720F70442AE502CA8C6DF610E0E5124
    APIs
    • GetModuleFileNameA.KERNELBASE(?,?,0000028A,?,?), ref: 00C8A732
    Memory Dump Source
    • Source File: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID: FileModuleName
    • String ID:
    • API String ID: 514040917-0
    • Opcode ID: f2a94b94b9a18dfc4cca02e9e418da1e38fb7fb1cc14cc49c896e5179318a484
    • Instruction ID: 1bc6ef2ac9dcb6be3e62c955e3f671ab7c55e4c25fc18882f244ad03db041847
    • Opcode Fuzzy Hash: f2a94b94b9a18dfc4cca02e9e418da1e38fb7fb1cc14cc49c896e5179318a484
    • Instruction Fuzzy Hash: 7C11B272A012259FFB307A458D4CBEA777CEF14758F2040A7F915A7041D7749E80ABAA
    APIs
    • OpenSCManagerW.SECHOST(00000000,00000000,?), ref: 04FE0DCD
    Memory Dump Source
    • Source File: 00000005.00000002.1427493343.0000000004FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FE0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_4fe0000_file.jbxd
    Similarity
    • API ID: ManagerOpen
    • String ID:
    • API String ID: 1889721586-0
    • Opcode ID: ccdc7ad418fcedf30902bfc64ec9447fe2acf425c2488406c088e4b9093d9517
    • Instruction ID: e494f910f1c9f5e964ab14bc2e16d4c89add6c32b1ffcd85a18a52845a8158b3
    • Opcode Fuzzy Hash: ccdc7ad418fcedf30902bfc64ec9447fe2acf425c2488406c088e4b9093d9517
    • Instruction Fuzzy Hash: 992129B5C012199FCB20CF9AD884BDEFBF4FB88310F14821AD818AB244DB74A545CFA5
    APIs
    • OpenSCManagerW.SECHOST(00000000,00000000,?), ref: 04FE0DCD
    Memory Dump Source
    • Source File: 00000005.00000002.1427493343.0000000004FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FE0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_4fe0000_file.jbxd
    Similarity
    • API ID: ManagerOpen
    • String ID:
    • API String ID: 1889721586-0
    • Opcode ID: 5bc561dbb4153614acfffd34840d3a00f193cf7ea221f74e6217bacbf832a6f1
    • Instruction ID: 8536104ba730f5e38e83182f819e7397aa3d02087a65617f5d294f1ead09b6a2
    • Opcode Fuzzy Hash: 5bc561dbb4153614acfffd34840d3a00f193cf7ea221f74e6217bacbf832a6f1
    • Instruction Fuzzy Hash: AF2138B6C002198FDB14CF99D4857DEFBF1FB88310F14822AD908AB244CB74A546CFA4
    APIs
    • ControlService.ADVAPI32(?,?,?), ref: 04FE1580
    Memory Dump Source
    • Source File: 00000005.00000002.1427493343.0000000004FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FE0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_4fe0000_file.jbxd
    Similarity
    • API ID: ControlService
    • String ID:
    • API String ID: 253159669-0
    • Opcode ID: 9fa3bb9b7a60e4bb48bed6c1798a08ac51cf4f1e4bab0e3860f8db30c7585399
    • Instruction ID: e880317727d255f1050576dba02ef9c8723fc808aeb5e2f3c06a51dce7345ece
    • Opcode Fuzzy Hash: 9fa3bb9b7a60e4bb48bed6c1798a08ac51cf4f1e4bab0e3860f8db30c7585399
    • Instruction Fuzzy Hash: AE1117B1D003498FDB20CF9AC584BDEFBF4EB48320F10802AE958A3250D378A545CFA5
    APIs
    • ControlService.ADVAPI32(?,?,?), ref: 04FE1580
    Memory Dump Source
    • Source File: 00000005.00000002.1427493343.0000000004FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FE0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_4fe0000_file.jbxd
    Similarity
    • API ID: ControlService
    • String ID:
    • API String ID: 253159669-0
    • Opcode ID: c7289bbdc40c678ad8a9cb62d04dd7be4177c2f0e4900ec60c5f856cca053de1
    • Instruction ID: 3bafb2db54219e7379510dbd7a714cf5ae1434d3458415abaa4f83b2122b69b1
    • Opcode Fuzzy Hash: c7289bbdc40c678ad8a9cb62d04dd7be4177c2f0e4900ec60c5f856cca053de1
    • Instruction Fuzzy Hash: 841103B5D003098FDB10CF9AC584BDEFBF0AB48321F10852AD969A3250C778A645CFA5
    APIs
    • ImpersonateLoggedOnUser.KERNELBASE ref: 04FE1367
    Memory Dump Source
    • Source File: 00000005.00000002.1427493343.0000000004FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FE0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_4fe0000_file.jbxd
    Similarity
    • API ID: ImpersonateLoggedUser
    • String ID:
    • API String ID: 2216092060-0
    • Opcode ID: d259541534dcf20324d059e73a1a8935adf27779164ecd0901edcaf73af40b37
    • Instruction ID: c55591597841cb7efed1e6e45e1ebbc223f1779edc44f3fcb59017b2cbc1956b
    • Opcode Fuzzy Hash: d259541534dcf20324d059e73a1a8935adf27779164ecd0901edcaf73af40b37
    • Instruction Fuzzy Hash: 461128B1800249CFDB20CFAAD585BEEBBF4EF48320F14842AD558A3250C778A545CFA1
    APIs
    • ImpersonateLoggedOnUser.KERNELBASE ref: 04FE1367
    Memory Dump Source
    • Source File: 00000005.00000002.1427493343.0000000004FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FE0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_4fe0000_file.jbxd
    Similarity
    • API ID: ImpersonateLoggedUser
    • String ID:
    • API String ID: 2216092060-0
    • Opcode ID: 1c5947ae18f8c63a1a306d7773fdbdfcc8fc22d92606c78559c32b99f103e35a
    • Instruction ID: 81b24e44112e605ebb6bc5508a27403c2b15a38e71dbb2681b70f242f5ee7648
    • Opcode Fuzzy Hash: 1c5947ae18f8c63a1a306d7773fdbdfcc8fc22d92606c78559c32b99f103e35a
    • Instruction Fuzzy Hash: A011F5B18003498FDB20DF9AD585BEEBBF4EB48320F14842AD558A3650D778A945CFA5
    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 9da4f3fb0daa0e9b791978b88fd508c756a7f3efb7ef87c15042f2e9f2d51b33
    • Instruction ID: da34564751e4dbdaaae879f64287d98aad47751e87bb230e3124d6d46310a3a1
    • Opcode Fuzzy Hash: 9da4f3fb0daa0e9b791978b88fd508c756a7f3efb7ef87c15042f2e9f2d51b33
    • Instruction Fuzzy Hash: ADF062F350E3727EF7125B306D51BBE6BA8DA92310F24859EF44086D86DA540949A226
    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID: lstrcmpi
    • String ID:
    • API String ID: 1586166983-0
    • Opcode ID: 7b2a88d5d3846d2e311eea74f7d56bd91fa5df29aca713758526b0cd1ffe6055
    • Instruction ID: 6d551dce79257e9fc7ce7b3294447aebf34846bea8fe73e029b7c604fad62d61
    • Opcode Fuzzy Hash: 7b2a88d5d3846d2e311eea74f7d56bd91fa5df29aca713758526b0cd1ffe6055
    • Instruction Fuzzy Hash: 3701E835A00909FFCF61AFA5DC05DDEBB76EF84754F104161F806A4060E7328A65DFA8
    APIs
    • VirtualAlloc.KERNELBASE(00000000,00001000,00001000,00000004,?,?,00C8A2AB,?,?,00C89FB1,?,?,00C89FB1,?,?,00C89FB1), ref: 00C8A2CF
    Memory Dump Source
    • Source File: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 7b3080a40b77e33dc9d78838818b2eda2c15e28a716c6ff7cb735357f5c530f8
    • Instruction ID: db5aeb4243ad999e2827f1cf46ccc386bbcb765926c10e98ac913e1fab8e5ad0
    • Opcode Fuzzy Hash: 7b3080a40b77e33dc9d78838818b2eda2c15e28a716c6ff7cb735357f5c530f8
    • Instruction Fuzzy Hash: C9F0A4B1904205EFE724AF44CD04B59BBE4FF89752F21806AF55A9F1A1E3B2D8C0CB94
    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 6a0becf420e4479771ff8779b04dca66b94b91c74ea34dfd2d72a9b09b6fc9f2
    • Instruction ID: 7e64e46125be03fb7f14ecf5eae7922d2d88353b55ee6668a152f7cc3d7f2516
    • Opcode Fuzzy Hash: 6a0becf420e4479771ff8779b04dca66b94b91c74ea34dfd2d72a9b09b6fc9f2
    • Instruction Fuzzy Hash: 4DE08C7410910EEB8B105F3880188AF7AB4EF4B320F210708B433D3AC0C3328C518A16
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID:
    • String ID: j{
    • API String ID: 0-1251682472
    • Opcode ID: c1bb822d8a1d0951bf8bc0b7c9bacaa58a056ce58de9baf5e84e28ad1b3044d4
    • Instruction ID: b167680cd1f26e73293ca806d47e3031a311157cd216fc1cef9713c4b96b55d1
    • Opcode Fuzzy Hash: c1bb822d8a1d0951bf8bc0b7c9bacaa58a056ce58de9baf5e84e28ad1b3044d4
    • Instruction Fuzzy Hash: 1FB126F3A082119FE7145E2CEC807ABB7E5EB94320F2A453EEAC4D3744E6754C458796
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID:
    • String ID: NTDL
    • API String ID: 0-3662016964
    • Opcode ID: 2689e83fe43e9f60be2234a7966b9b837886381a8c085b5e79f0702ad4143a11
    • Instruction ID: 7f0eb37d62ed4348dd8475c8566d5b4a46a3fa9e740aa2c610efae9827dcaa1d
    • Opcode Fuzzy Hash: 2689e83fe43e9f60be2234a7966b9b837886381a8c085b5e79f0702ad4143a11
    • Instruction Fuzzy Hash: C271237250821ECFDB05CF25C4412EF77B5EF57320F24822AE98287A82D7B20D55DB99
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID:
    • String ID: "Be+
    • API String ID: 0-3965159333
    • Opcode ID: 0e32b7cc0ccada385273afa6c1800c8eeb70e0b90133bdf8be9b2e66658fbdae
    • Instruction ID: 2c9f5f536b2d469035aad0d1c676f1dfc52d535d19448c2f19096a25341d5583
    • Opcode Fuzzy Hash: 0e32b7cc0ccada385273afa6c1800c8eeb70e0b90133bdf8be9b2e66658fbdae
    • Instruction Fuzzy Hash: D551F6B250C228EBE3046E16FC51A3AF7F4EB95B10F25493DD6C346B40E6716816E793
    Memory Dump Source
    • Source File: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0e383ff2a9404cf7ab6e27162060c4b96b6980e9c31b99a0b7c22c1f1af1654a
    • Instruction ID: 6dddfea39e7d0ad9fddf3d76ecf5fe42d78b44c5345225420cfdb0d9f63021a7
    • Opcode Fuzzy Hash: 0e383ff2a9404cf7ab6e27162060c4b96b6980e9c31b99a0b7c22c1f1af1654a
    • Instruction Fuzzy Hash: 3541F2F680CE10DFDB06AB16DC8967EB3A4EB54320F26462DEAD667740E635280097C3
    Memory Dump Source
    • Source File: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3c5d616a196fa671a6214671abd0b47719c031ce22762224e3b7efd34460393b
    • Instruction ID: 5455d02e4a8c4f094989a7f7362dafa960e5728b74598dc8f29e178b4eec2479
    • Opcode Fuzzy Hash: 3c5d616a196fa671a6214671abd0b47719c031ce22762224e3b7efd34460393b
    • Instruction Fuzzy Hash: 4351AEB201C610EFD3046F28E89167EF7E0EF64718F22582DD6C682214E234EC81EB67
    Memory Dump Source
    • Source File: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ff0eb06ed1cb5bc8aa60edccecbb67cc2222837ed9ee92923e930395b0359125
    • Instruction ID: f9ac2869a7f50359992f4ad64e5ab0f64a7fd80f78a4dec3dc2611e0535a54ee
    • Opcode Fuzzy Hash: ff0eb06ed1cb5bc8aa60edccecbb67cc2222837ed9ee92923e930395b0359125
    • Instruction Fuzzy Hash: A74127B201C600EFE7466F15E882ABEFBE5EF94761F120D2DE6C186610E73144858B57
    Memory Dump Source
    • Source File: 00000005.00000002.1424807408.0000000000C23000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AA0000, based on PE: true
    • Associated: 00000005.00000002.1422719008.0000000000AA0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423378183.0000000000AA2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423579711.0000000000AA6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1423752398.0000000000AAA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424083452.0000000000AB4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424156688.0000000000AB5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424179470.0000000000AB6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424770264.0000000000C0C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424785992.0000000000C0E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424807408.0000000000C2E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424842328.0000000000C35000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424912204.0000000000C37000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424943829.0000000000C39000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424960674.0000000000C3A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424977447.0000000000C45000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1424993124.0000000000C4A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425013659.0000000000C60000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425082039.0000000000C74000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425102879.0000000000C82000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425124540.0000000000C88000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425145441.0000000000C97000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425170512.0000000000C9D000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425190276.0000000000CAB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425205713.0000000000CAE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425222269.0000000000CAF000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425239162.0000000000CB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425260070.0000000000CBA000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425278000.0000000000CBC000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425300740.0000000000CBD000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425317134.0000000000CC0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425335505.0000000000CC7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425353869.0000000000CCA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425373044.0000000000CD2000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425390716.0000000000CD4000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425406829.0000000000CD5000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425424830.0000000000CDE000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425452120.0000000000CFE000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425469516.0000000000CFF000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D38000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425504394.0000000000D40000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425542250.0000000000D4E000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1425559435.0000000000D50000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_aa0000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7f83a815d54fa00ff356c9db5a52541bff6127eb4582b36121a7877a441314ea
    • Instruction ID: dadf52cd408621693918ee04f156d3d43c85d2b942b5b5c10cfbf001d2dde24e
    • Opcode Fuzzy Hash: 7f83a815d54fa00ff356c9db5a52541bff6127eb4582b36121a7877a441314ea
    • Instruction Fuzzy Hash: 564146B241C604EFE74A6F18D8826BEFBE5EF58361F160D2DE6C186210E3314881CB5B