Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1561525
MD5:0a24c2e5e66d1e2c6b87bf2b0a1c6798
SHA1:84bb168706262c83de6f7cf3a2ab360cdcb0b573
SHA256:99d45b95b1e9ec69ff99b0b2a6a52065628a7a4cfb2c9e25c412f11d53895699
Tags:exeuser-Bitsight
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
AI detected suspicious sample
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Hides threads from debuggers
Machine Learning detection for sample
Modifies windows update settings
PE file contains section with special chars
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to detect virtual machines (SIDT)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Entry point lies outside standard sections
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 2804 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 0A24C2E5E66D1E2C6B87BF2B0A1C6798)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: file.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A4388B CryptVerifySignatureA,0_2_00A4388B
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: file.exe, 00000000.00000003.2053920630.0000000004BA0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmp

System Summary

barindex
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F609E0_2_009F609E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A032230_2_00A03223
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A036AE0_2_00A036AE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A036C50_2_00A036C5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F67410_2_009F6741
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAF8E00_2_00AAF8E0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A039210_2_00A03921
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0391C0_2_00A0391C
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00A3E880 appears 35 times
Source: file.exe, 00000000.00000002.2187817735.0000000000E0E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
Source: file.exe, 00000000.00000000.2044218336.0000000000866000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exeBinary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exeStatic PE information: Entrypont disasm: arithmetic instruction to all instruction ratio: 1.0 > 0.5 instr diversity: 0.5
Source: classification engineClassification label: mal100.evad.winEXE@1/1@0/0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04C515D0 ChangeServiceConfigA,0_2_04C515D0
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.logJump to behavior
Source: C:\Users\user\Desktop\file.exeMutant created: NULL
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: file.exeStatic file information: File size 2803712 > 1048576
Source: file.exeStatic PE information: Raw size of vbqisocr is bigger than: 0x100000 < 0x2a6800
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: file.exe, 00000000.00000003.2053920630.0000000004BA0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmp

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.860000.0.unpack :EW;.rsrc:W;.idata :W;vbqisocr:EW;fkbmxbkg:EW;.taggant:EW; vs :ER;.rsrc:W;
Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
Source: file.exeStatic PE information: real checksum: 0x2b59b2 should be: 0x2b858e
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: file.exeStatic PE information: section name: vbqisocr
Source: file.exeStatic PE information: section name: fkbmxbkg
Source: file.exeStatic PE information: section name: .taggant
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F8CC7 push 071896FDh; mov dword ptr [esp], edi0_2_009F8CCC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F8CC7 push 4F93A160h; mov dword ptr [esp], edi0_2_009F8CD5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F609E push ebp; mov dword ptr [esp], 53A327FBh0_2_009F615C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F609E push ecx; mov dword ptr [esp], 6609363Bh0_2_009F61AA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F609E push 539C1753h; mov dword ptr [esp], ebx0_2_009F634E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A010B6 push 288AA5BBh; mov dword ptr [esp], ebx0_2_00A010BB
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00870762 push 59ED1DCAh; mov dword ptr [esp], edx0_2_008728DF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0086C0B3 push 36273F1Fh; mov dword ptr [esp], eax0_2_0086C009
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009FA0A9 push 4E4A5300h; mov dword ptr [esp], eax0_2_009FA109
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009FA0A9 push 53538814h; mov dword ptr [esp], ebp0_2_009FB675
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008730C2 push eax; mov dword ptr [esp], 7A705E93h0_2_00874626
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008720EE push ecx; mov dword ptr [esp], edi0_2_00872105
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009FF0EE push edi; mov dword ptr [esp], 7FD5D4C7h0_2_009FFD19
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009FB0E9 push 5E2668C7h; mov dword ptr [esp], edi0_2_009FB0FE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0086C001 push 36273F1Fh; mov dword ptr [esp], eax0_2_0086C009
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0203D push edx; ret 0_2_00A0204C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00873019 push eax; mov dword ptr [esp], ebp0_2_00873020
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009FB001 push edi; mov dword ptr [esp], 402424D3h0_2_009FB00F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009FF035 push eax; mov dword ptr [esp], edx0_2_009FF4A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A02012 push edi; ret 0_2_00A02021
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A05014 push eax; mov dword ptr [esp], 6FFBA0A6h0_2_00A05024
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A05014 push 5253FC00h; mov dword ptr [esp], esi0_2_00A05030
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A05014 push ebp; mov dword ptr [esp], ebx0_2_00A0505B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A05014 push esi; mov dword ptr [esp], edx0_2_00A05084
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A05014 push ebx; mov dword ptr [esp], eax0_2_00A0509C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A01066 push 50A073D7h; mov dword ptr [esp], esp0_2_00A0106C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A7D07D push eax; mov dword ptr [esp], esi0_2_00A7D0B9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F907D push 63FBA0E1h; mov dword ptr [esp], eax0_2_009FB09D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009FC070 push 46BA7300h; mov dword ptr [esp], ebx0_2_009FC07F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009FC19F push edi; mov dword ptr [esp], 7D1F9764h0_2_009FC1A8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009FF19B push edi; mov dword ptr [esp], eax0_2_009FF1A3
Source: file.exeStatic PE information: section name: entropy: 7.777970352280691

Boot Survival

barindex
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9ED834 second address: 9ED83C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9ED83C second address: 9ED84B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9ED84B second address: 9ED84F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9ED84F second address: 9ED85D instructions: 0x00000000 rdtsc 0x00000002 jng 00007F3EA0D2C466h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9ED85D second address: 9ED863 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9ED863 second address: 9ED867 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9EC894 second address: 9EC8A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F3EA137BD1Ah 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9EC8A5 second address: 9EC8C0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3EA0D2C475h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9EC8C0 second address: 9EC8C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9EC8C8 second address: 9EC8CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9EC8CC second address: 9EC8D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9ECA08 second address: 9ECA0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9ECA0E second address: 9ECA12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9ECA12 second address: 9ECA16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9ECA16 second address: 9ECA1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9ECA1E second address: 9ECA2D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F3EA0D2C46Ah 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9ECD28 second address: 9ECD47 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F3EA137BD18h 0x00000008 pushad 0x00000009 popad 0x0000000a jnl 00007F3EA137BD1Eh 0x00000010 pop edx 0x00000011 pop eax 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9ECD47 second address: 9ECD5F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F3EA0D2C46Bh 0x0000000d pushad 0x0000000e push edi 0x0000000f pop edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9ECE9F second address: 9ECEAD instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ecx 0x00000006 jl 00007F3EA137BD1Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9ECEAD second address: 9ECECF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 jmp 00007F3EA0D2C477h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9ECECF second address: 9ECED4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9ECED4 second address: 9ECEDE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007F3EA0D2C466h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9EFF4A second address: 9EFF4E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9EFF4E second address: 9EFF58 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F3EA0D2C466h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9EFF58 second address: 9EFF5D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9F0085 second address: 9F00B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 add dword ptr [esp], 73CF756Bh 0x0000000f jnp 00007F3EA0D2C46Ch 0x00000015 mov edi, dword ptr [ebp+122D2D67h] 0x0000001b lea ebx, dword ptr [ebp+12455E72h] 0x00000021 or ecx, 586DC977h 0x00000027 push eax 0x00000028 push eax 0x00000029 push eax 0x0000002a push edx 0x0000002b push eax 0x0000002c push edx 0x0000002d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9F00B2 second address: 9F00B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9F01AE second address: 9F01C3 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e jnc 00007F3EA0D2C466h 0x00000014 popad 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9F01C3 second address: 9F01EE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3EA137BD20h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d pushad 0x0000000e jmp 00007F3EA137BD1Eh 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9F01EE second address: 9F01F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9F01F2 second address: 9F0225 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F3EA137BD16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov eax, dword ptr [eax] 0x0000000d jmp 00007F3EA137BD27h 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 pushad 0x00000017 pushad 0x00000018 push ecx 0x00000019 pop ecx 0x0000001a push ecx 0x0000001b pop ecx 0x0000001c popad 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9F0225 second address: 9F0229 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9F0330 second address: 9F038C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 jbe 00007F3EA137BD16h 0x0000000d popad 0x0000000e popad 0x0000000f mov dword ptr [esp], eax 0x00000012 jmp 00007F3EA137BD1Ah 0x00000017 mov dword ptr [ebp+122D253Fh], edx 0x0000001d push 00000000h 0x0000001f push 00000000h 0x00000021 push ecx 0x00000022 call 00007F3EA137BD18h 0x00000027 pop ecx 0x00000028 mov dword ptr [esp+04h], ecx 0x0000002c add dword ptr [esp+04h], 0000001Dh 0x00000034 inc ecx 0x00000035 push ecx 0x00000036 ret 0x00000037 pop ecx 0x00000038 ret 0x00000039 mov cx, BF00h 0x0000003d push 62A464A5h 0x00000042 push eax 0x00000043 push edx 0x00000044 jo 00007F3EA137BD18h 0x0000004a push eax 0x0000004b pop eax 0x0000004c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9F038C second address: 9F0392 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9F0392 second address: 9F03FC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xor dword ptr [esp], 62A46425h 0x0000000f mov cx, B5B1h 0x00000013 push 00000003h 0x00000015 mov ecx, dword ptr [ebp+122D2F37h] 0x0000001b xor esi, dword ptr [ebp+122D254Ah] 0x00000021 push 00000000h 0x00000023 push 00000003h 0x00000025 mov edi, dword ptr [ebp+122D2D33h] 0x0000002b push C88AC8DBh 0x00000030 jno 00007F3EA137BD1Ah 0x00000036 xor dword ptr [esp], 088AC8DBh 0x0000003d lea ebx, dword ptr [ebp+12455E86h] 0x00000043 call 00007F3EA137BD27h 0x00000048 add dword ptr [ebp+122D30A5h], edx 0x0000004e pop edx 0x0000004f xchg eax, ebx 0x00000050 pushad 0x00000051 push edx 0x00000052 push eax 0x00000053 push edx 0x00000054 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A10AB4 second address: A10AC8 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jnp 00007F3EA0D2C46Ch 0x0000000e jns 00007F3EA0D2C466h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0F4E4 second address: A0F4E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0F4E8 second address: A0F4F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0F4F3 second address: A0F4F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0F4F9 second address: A0F523 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3EA0D2C471h 0x00000009 jmp 00007F3EA0D2C470h 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0F523 second address: A0F527 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0F527 second address: A0F53B instructions: 0x00000000 rdtsc 0x00000002 jc 00007F3EA0D2C466h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c jp 00007F3EA0D2C46Eh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0F683 second address: A0F698 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3EA137BD21h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0F83A second address: A0F877 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3EA0D2C46Fh 0x00000007 jmp 00007F3EA0D2C476h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jmp 00007F3EA0D2C474h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D85E2 second address: 9D85F2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3EA137BD1Bh 0x00000007 push edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D85F2 second address: 9D8610 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3EA0D2C46Bh 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push edi 0x0000000f je 00007F3EA0D2C466h 0x00000015 push ecx 0x00000016 pop ecx 0x00000017 pop edi 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A105CD second address: A105D7 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F3EA137BD16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A12F85 second address: A12F8F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007F3EA0D2C466h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A16178 second address: A16195 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F3EA137BD16h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F3EA137BD1Fh 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9DD650 second address: 9DD656 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9DD656 second address: 9DD65C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9DD65C second address: 9DD660 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1B1EC second address: A1B1F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F3EA137BD16h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1B1F6 second address: A1B1FB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1A6AF second address: A1A6F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jnl 00007F3EA137BD18h 0x0000000b push eax 0x0000000c pop eax 0x0000000d pushad 0x0000000e jmp 00007F3EA137BD1Eh 0x00000013 jmp 00007F3EA137BD20h 0x00000018 jc 00007F3EA137BD16h 0x0000001e popad 0x0000001f popad 0x00000020 jnl 00007F3EA137BD43h 0x00000026 push eax 0x00000027 push edx 0x00000028 jnp 00007F3EA137BD16h 0x0000002e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1A842 second address: A1A848 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1A848 second address: A1A84E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1AB53 second address: A1AB58 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1AB58 second address: A1AB5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1B063 second address: A1B07E instructions: 0x00000000 rdtsc 0x00000002 jng 00007F3EA0D2C466h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jl 00007F3EA0D2C46Ch 0x00000010 push edx 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1DF39 second address: A1DF43 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F3EA137BD16h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1E47D second address: A1E481 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1E531 second address: A1E535 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1E535 second address: A1E543 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F3EA0D2C466h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d pop eax 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1E63A second address: A1E63E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1E63E second address: A1E650 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ecx 0x0000000b js 00007F3EA0D2C466h 0x00000011 pop ecx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1EAFD second address: A1EB16 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3EA137BD21h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edi 0x0000000c pop edi 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1EE4C second address: A1EE5C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F3EA0D2C46Ch 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1F0A3 second address: A1F0AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1F0AC second address: A1F0B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1F161 second address: A1F167 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1F711 second address: A1F71F instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 pushad 0x00000009 pushad 0x0000000a push eax 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A22034 second address: A22038 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A22038 second address: A22051 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F3EA0D2C471h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A22B27 second address: A22B2D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A22B2D second address: A22BDD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F3EA0D2C473h 0x00000008 jg 00007F3EA0D2C466h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 mov dword ptr [esp], eax 0x00000014 push 00000000h 0x00000016 push ebp 0x00000017 call 00007F3EA0D2C468h 0x0000001c pop ebp 0x0000001d mov dword ptr [esp+04h], ebp 0x00000021 add dword ptr [esp+04h], 0000001Bh 0x00000029 inc ebp 0x0000002a push ebp 0x0000002b ret 0x0000002c pop ebp 0x0000002d ret 0x0000002e mov dword ptr [ebp+122D2052h], edx 0x00000034 push edx 0x00000035 js 00007F3EA0D2C469h 0x0000003b mov di, dx 0x0000003e pop esi 0x0000003f push 00000000h 0x00000041 push 00000000h 0x00000043 push eax 0x00000044 call 00007F3EA0D2C468h 0x00000049 pop eax 0x0000004a mov dword ptr [esp+04h], eax 0x0000004e add dword ptr [esp+04h], 0000001Ah 0x00000056 inc eax 0x00000057 push eax 0x00000058 ret 0x00000059 pop eax 0x0000005a ret 0x0000005b clc 0x0000005c push 00000000h 0x0000005e jnl 00007F3EA0D2C477h 0x00000064 xchg eax, ebx 0x00000065 pushad 0x00000066 push eax 0x00000067 push edx 0x00000068 jmp 00007F3EA0D2C478h 0x0000006d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A24057 second address: A2405C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2405C second address: A240C9 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F3EA0D2C477h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b pushad 0x0000000c add eax, dword ptr [ebp+122D2F2Fh] 0x00000012 sbb edi, 59F8BC75h 0x00000018 popad 0x00000019 push 00000000h 0x0000001b push 00000000h 0x0000001d push esi 0x0000001e call 00007F3EA0D2C468h 0x00000023 pop esi 0x00000024 mov dword ptr [esp+04h], esi 0x00000028 add dword ptr [esp+04h], 0000001Bh 0x00000030 inc esi 0x00000031 push esi 0x00000032 ret 0x00000033 pop esi 0x00000034 ret 0x00000035 movsx esi, cx 0x00000038 push 00000000h 0x0000003a mov si, dx 0x0000003d push eax 0x0000003e push eax 0x0000003f push edx 0x00000040 jmp 00007F3EA0D2C473h 0x00000045 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A240C9 second address: A240D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007F3EA137BD16h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A24881 second address: A24890 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A24890 second address: A24895 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2A500 second address: A2A544 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F3EA0D2C477h 0x00000008 push esi 0x00000009 pop esi 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 jmp 00007F3EA0D2C46Ah 0x00000016 jmp 00007F3EA0D2C476h 0x0000001b popad 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2A544 second address: A2A55E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F3EA137BD25h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2A55E second address: A2A5BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push ebx 0x0000000b call 00007F3EA0D2C468h 0x00000010 pop ebx 0x00000011 mov dword ptr [esp+04h], ebx 0x00000015 add dword ptr [esp+04h], 0000001Dh 0x0000001d inc ebx 0x0000001e push ebx 0x0000001f ret 0x00000020 pop ebx 0x00000021 ret 0x00000022 push 00000000h 0x00000024 jmp 00007F3EA0D2C472h 0x00000029 push 00000000h 0x0000002b ja 00007F3EA0D2C46Ch 0x00000031 push eax 0x00000032 push eax 0x00000033 push edx 0x00000034 pushad 0x00000035 jno 00007F3EA0D2C466h 0x0000003b jc 00007F3EA0D2C466h 0x00000041 popad 0x00000042 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2B561 second address: A2B5CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push edx 0x00000006 pop edx 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 popad 0x0000000a popad 0x0000000b mov dword ptr [esp], eax 0x0000000e mov ebx, 751F11E5h 0x00000013 push 00000000h 0x00000015 push esi 0x00000016 mov ebx, edi 0x00000018 pop ebx 0x00000019 call 00007F3EA137BD1Fh 0x0000001e mov ebx, dword ptr [ebp+122D2D83h] 0x00000024 pop ebx 0x00000025 push 00000000h 0x00000027 push 00000000h 0x00000029 push edi 0x0000002a call 00007F3EA137BD18h 0x0000002f pop edi 0x00000030 mov dword ptr [esp+04h], edi 0x00000034 add dword ptr [esp+04h], 0000001Bh 0x0000003c inc edi 0x0000003d push edi 0x0000003e ret 0x0000003f pop edi 0x00000040 ret 0x00000041 movzx ebx, dx 0x00000044 mov dword ptr [ebp+122D2052h], edx 0x0000004a xchg eax, esi 0x0000004b push eax 0x0000004c push edx 0x0000004d jns 00007F3EA137BD1Ch 0x00000053 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2B5CD second address: A2B5F7 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F3EA0D2C47Fh 0x00000008 jmp 00007F3EA0D2C479h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push esi 0x00000014 pop esi 0x00000015 pop eax 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2C513 second address: A2C519 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2C519 second address: A2C51D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2C51D second address: A2C533 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F3EA137BD16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jo 00007F3EA137BD1Eh 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A266CE second address: A266D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A27783 second address: A27787 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2862D second address: A286CB instructions: 0x00000000 rdtsc 0x00000002 jns 00007F3EA0D2C466h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jne 00007F3EA0D2C466h 0x00000011 pop eax 0x00000012 popad 0x00000013 mov dword ptr [esp], eax 0x00000016 cmc 0x00000017 push dword ptr fs:[00000000h] 0x0000001e push 00000000h 0x00000020 push edx 0x00000021 call 00007F3EA0D2C468h 0x00000026 pop edx 0x00000027 mov dword ptr [esp+04h], edx 0x0000002b add dword ptr [esp+04h], 00000015h 0x00000033 inc edx 0x00000034 push edx 0x00000035 ret 0x00000036 pop edx 0x00000037 ret 0x00000038 mov bx, 3FEAh 0x0000003c mov dword ptr fs:[00000000h], esp 0x00000043 push 00000000h 0x00000045 push ebx 0x00000046 call 00007F3EA0D2C468h 0x0000004b pop ebx 0x0000004c mov dword ptr [esp+04h], ebx 0x00000050 add dword ptr [esp+04h], 0000001Ah 0x00000058 inc ebx 0x00000059 push ebx 0x0000005a ret 0x0000005b pop ebx 0x0000005c ret 0x0000005d mov ebx, dword ptr [ebp+122D2F53h] 0x00000063 mov eax, dword ptr [ebp+122D04ADh] 0x00000069 jl 00007F3EA0D2C469h 0x0000006f movsx edi, ax 0x00000072 push FFFFFFFFh 0x00000074 jmp 00007F3EA0D2C46Dh 0x00000079 add edi, dword ptr [ebp+122D2DD3h] 0x0000007f push eax 0x00000080 push eax 0x00000081 push edx 0x00000082 pushad 0x00000083 jnl 00007F3EA0D2C466h 0x00000089 push eax 0x0000008a push edx 0x0000008b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2A7C0 second address: A2A7CA instructions: 0x00000000 rdtsc 0x00000002 jl 00007F3EA137BD1Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2C70C second address: A2C75A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F3EA0D2C477h 0x0000000e popad 0x0000000f popad 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 jmp 00007F3EA0D2C475h 0x00000019 jmp 00007F3EA0D2C472h 0x0000001e popad 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A286CB second address: A286D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2E530 second address: A2E546 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3EA0D2C471h 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A286D0 second address: A286D6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A286D6 second address: A286DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A30AEE second address: A30B0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3EA137BD29h 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A30B0C second address: A30B11 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A32CAA second address: A32CAE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A32CAE second address: A32CCA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 jmp 00007F3EA0D2C470h 0x0000000c pop edi 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A353FD second address: A35403 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A36457 second address: A3645D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A3645D second address: A364B8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b sub dword ptr [ebp+1246014Dh], eax 0x00000011 push 00000000h 0x00000013 push 00000000h 0x00000015 push esi 0x00000016 call 00007F3EA137BD18h 0x0000001b pop esi 0x0000001c mov dword ptr [esp+04h], esi 0x00000020 add dword ptr [esp+04h], 00000014h 0x00000028 inc esi 0x00000029 push esi 0x0000002a ret 0x0000002b pop esi 0x0000002c ret 0x0000002d jmp 00007F3EA137BD21h 0x00000032 push 00000000h 0x00000034 and ebx, 3E2D0341h 0x0000003a xchg eax, esi 0x0000003b push eax 0x0000003c push edx 0x0000003d push esi 0x0000003e jmp 00007F3EA137BD1Eh 0x00000043 pop esi 0x00000044 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A364B8 second address: A364E3 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F3EA0D2C46Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e jmp 00007F3EA0D2C476h 0x00000013 pop eax 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A365E9 second address: A365EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A365EF second address: A365F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A376C0 second address: A376C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A376C4 second address: A376C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A37774 second address: A3777A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A3876B second address: A3876F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A3876F second address: A38773 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A38773 second address: A3877F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A3877F second address: A38785 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A38785 second address: A3878A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A3AD29 second address: A3AD33 instructions: 0x00000000 rdtsc 0x00000002 js 00007F3EA137BD16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A48448 second address: A4844E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A4844E second address: A48458 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F3EA137BD16h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A52B95 second address: A52B9F instructions: 0x00000000 rdtsc 0x00000002 jns 00007F3EA0D2C466h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A52B9F second address: A52BB5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F3EA137BD22h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A52CCE second address: A52CE3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F3EA0D2C471h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A52D6F second address: A52D96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 jne 00007F3EA137BD29h 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 push esi 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A52D96 second address: A52DA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop esi 0x00000006 mov eax, dword ptr [eax] 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A52DA3 second address: A52DCD instructions: 0x00000000 rdtsc 0x00000002 jg 00007F3EA137BD16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ebx 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F3EA137BD27h 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A52DCD second address: A52DD7 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F3EA0D2C466h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A57E12 second address: A57E16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A570DE second address: A570F3 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F3EA0D2C46Eh 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A570F3 second address: A57133 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3EA137BD1Dh 0x00000009 jc 00007F3EA137BD16h 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jg 00007F3EA137BD1Eh 0x0000001a pushad 0x0000001b popad 0x0000001c jnc 00007F3EA137BD16h 0x00000022 push eax 0x00000023 jmp 00007F3EA137BD22h 0x00000028 pushad 0x00000029 popad 0x0000002a pop eax 0x0000002b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A576E0 second address: A576F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F3EA0D2C472h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A576F6 second address: A57718 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F3EA137BD16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007F3EA137BD25h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A57718 second address: A5771E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A5C375 second address: A5C37F instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A5C37F second address: A5C385 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A5B2AB second address: A5B2B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 js 00007F3EA137BD1Ch 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1CEF9 second address: A1CF0C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F3EA0D2C46Fh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1CF0C second address: A1CF24 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F3EA137BD1Dh 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1CF24 second address: A1CF2A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1CF2A second address: A1CF2E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1CF2E second address: A1CF54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F3EA0D2C478h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1D18F second address: A1D1C7 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F3EA137BD29h 0x00000008 jmp 00007F3EA137BD23h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F3EA137BD25h 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1DAE9 second address: A078DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 mov dword ptr [esp], eax 0x00000008 push 00000000h 0x0000000a push ecx 0x0000000b call 00007F3EA0D2C468h 0x00000010 pop ecx 0x00000011 mov dword ptr [esp+04h], ecx 0x00000015 add dword ptr [esp+04h], 0000001Bh 0x0000001d inc ecx 0x0000001e push ecx 0x0000001f ret 0x00000020 pop ecx 0x00000021 ret 0x00000022 cld 0x00000023 lea eax, dword ptr [ebp+124826A4h] 0x00000029 push 00000000h 0x0000002b push eax 0x0000002c call 00007F3EA0D2C468h 0x00000031 pop eax 0x00000032 mov dword ptr [esp+04h], eax 0x00000036 add dword ptr [esp+04h], 0000001Ah 0x0000003e inc eax 0x0000003f push eax 0x00000040 ret 0x00000041 pop eax 0x00000042 ret 0x00000043 push eax 0x00000044 jmp 00007F3EA0D2C473h 0x00000049 mov dword ptr [esp], eax 0x0000004c push ebx 0x0000004d jmp 00007F3EA0D2C478h 0x00000052 pop ecx 0x00000053 call dword ptr [ebp+122D1DBEh] 0x00000059 push eax 0x0000005a push edx 0x0000005b pushad 0x0000005c jl 00007F3EA0D2C466h 0x00000062 jmp 00007F3EA0D2C478h 0x00000067 push eax 0x00000068 push edx 0x00000069 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A078DB second address: A078F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F3EA137BD29h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A5B6E9 second address: A5B708 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F3EA0D2C479h 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A5BF38 second address: A5BF3C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E2690 second address: 9E269A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop esi 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E269A second address: 9E26A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E26A2 second address: 9E26BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F3EA0D2C471h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E26BB second address: 9E26C2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A67CB2 second address: A67CCE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3EA0D2C478h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A67CCE second address: A67CE7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3EA137BD20h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A67CE7 second address: A67CEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A66A69 second address: A66A6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A66A6F second address: A66A73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A66A73 second address: A66A88 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F3EA137BD1Dh 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A66D11 second address: A66D1B instructions: 0x00000000 rdtsc 0x00000002 jl 00007F3EA0D2C46Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A67185 second address: A67189 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A67189 second address: A6718D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6718D second address: A67199 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A667D0 second address: A667D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A667D8 second address: A667DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6743D second address: A67441 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A67441 second address: A67458 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jng 00007F3EA137BD1Eh 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A67458 second address: A6745E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6745E second address: A67470 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 jnp 00007F3EA137BD2Bh 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A675AF second address: A675BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F3EA0D2C466h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A704B4 second address: A704E0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3EA137BD23h 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F3EA137BD1Fh 0x00000012 push ebx 0x00000013 pop ebx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A704E0 second address: A704E6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A704E6 second address: A704EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A704EC second address: A704F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D6B38 second address: 9D6B3C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D6B3C second address: 9D6B68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F3EA0D2C466h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F3EA0D2C472h 0x00000011 jnp 00007F3EA0D2C468h 0x00000017 push edi 0x00000018 pop edi 0x00000019 popad 0x0000001a push ecx 0x0000001b push eax 0x0000001c push edx 0x0000001d push edx 0x0000001e pop edx 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6ED39 second address: A6ED3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6ED3F second address: A6ED52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F3EA0D2C466h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jns 00007F3EA0D2C466h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6ED52 second address: A6ED58 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6ED58 second address: A6ED5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6EED4 second address: A6EEE0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 ja 00007F3EA137BD16h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6EEE0 second address: A6EEEE instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F3EA0D2C468h 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6EEEE second address: A6EEF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6EEF2 second address: A6EF0E instructions: 0x00000000 rdtsc 0x00000002 ja 00007F3EA0D2C466h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jc 00007F3EA0D2C48Dh 0x00000012 push eax 0x00000013 push edx 0x00000014 js 00007F3EA0D2C466h 0x0000001a push edi 0x0000001b pop edi 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6F21A second address: A6F221 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6F221 second address: A6F22D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F3EA0D2C466h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6F22D second address: A6F23C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6F23C second address: A6F243 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edi 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6F3CD second address: A6F3FF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F3EA137BD1Fh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007F3EA137BD22h 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jnc 00007F3EA137BD16h 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6F3FF second address: A6F40D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jo 00007F3EA0D2C466h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6F40D second address: A6F417 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F3EA137BD16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6F831 second address: A6F847 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007F3EA0D2C46Eh 0x00000008 pop ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6F847 second address: A6F84D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6F84D second address: A6F851 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6F9BF second address: A6F9C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6F9C3 second address: A6F9CB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6F9CB second address: A6F9DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 pop eax 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f pop eax 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A72C21 second address: A72C3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push eax 0x00000008 push esi 0x00000009 pop esi 0x0000000a jmp 00007F3EA0D2C46Fh 0x0000000f pop eax 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A72C3B second address: A72C40 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7281D second address: A72824 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A75AF2 second address: A75AFC instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F3EA137BD1Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A75AFC second address: A75B17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3EA0D2C471h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A75B17 second address: A75B24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A75B24 second address: A75B28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A75516 second address: A75530 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F3EA137BD16h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F3EA137BD1Dh 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A757D8 second address: A75801 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F3EA0D2C466h 0x0000000a pushad 0x0000000b jmp 00007F3EA0D2C476h 0x00000010 jc 00007F3EA0D2C466h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A75801 second address: A75829 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 jmp 00007F3EA137BD1Ah 0x0000000e jp 00007F3EA137BD16h 0x00000014 pop eax 0x00000015 jmp 00007F3EA137BD1Eh 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7A0FF second address: A7A113 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F3EA0D2C46Eh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7D6E6 second address: A7D6F8 instructions: 0x00000000 rdtsc 0x00000002 js 00007F3EA137BD16h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7D148 second address: A7D15F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3EA0D2C471h 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7D15F second address: A7D165 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A81972 second address: A81991 instructions: 0x00000000 rdtsc 0x00000002 js 00007F3EA0D2C466h 0x00000008 jmp 00007F3EA0D2C46Dh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jns 00007F3EA0D2C46Eh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A81991 second address: A8199D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A8199D second address: A819A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A81C91 second address: A81CBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop ebx 0x00000006 pushad 0x00000007 jmp 00007F3EA137BD1Eh 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f jnc 00007F3EA137BD16h 0x00000015 jo 00007F3EA137BD16h 0x0000001b push eax 0x0000001c pop eax 0x0000001d popad 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A81CBB second address: A81CC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A81F8D second address: A81F91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A82108 second address: A8210D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A847E9 second address: A8480C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 pushad 0x00000008 jmp 00007F3EA137BD29h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A8480C second address: A84812 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A84812 second address: A84845 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 ja 00007F3EA137BD47h 0x0000000c pushad 0x0000000d jns 00007F3EA137BD16h 0x00000013 jp 00007F3EA137BD16h 0x00000019 push ebx 0x0000001a pop ebx 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e jnl 00007F3EA137BD16h 0x00000024 jmp 00007F3EA137BD1Fh 0x00000029 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A8D78A second address: A8D7A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F3EA0D2C466h 0x0000000a pop ecx 0x0000000b jno 00007F3EA0D2C46Ch 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A8D7A5 second address: A8D7A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A8B72F second address: A8B73B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jbe 00007F3EA0D2C466h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A8B73B second address: A8B73F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A8C001 second address: A8C023 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pushad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 jmp 00007F3EA0D2C477h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A8C327 second address: A8C32D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A8C32D second address: A8C33A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jng 00007F3EA0D2C472h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A8C33A second address: A8C340 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A8D11A second address: A8D15B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3EA0D2C479h 0x00000009 popad 0x0000000a jnc 00007F3EA0D2C46Eh 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F3EA0D2C471h 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A8D15B second address: A8D15F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A8ED62 second address: A8ED77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F3EA0D2C466h 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A97513 second address: A97519 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A97519 second address: A9751D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9751D second address: A97526 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A97526 second address: A97533 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F3EA0D2C466h 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c popad 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A967E9 second address: A967F3 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F3EA137BD16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A967F3 second address: A967FA instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A967FA second address: A9682B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 js 00007F3EA137BD18h 0x0000000e pushad 0x0000000f popad 0x00000010 jmp 00007F3EA137BD27h 0x00000015 push eax 0x00000016 push edx 0x00000017 jo 00007F3EA137BD16h 0x0000001d pushad 0x0000001e popad 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A96956 second address: A96961 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A96961 second address: A96966 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A96B14 second address: A96B1E instructions: 0x00000000 rdtsc 0x00000002 jo 00007F3EA0D2C466h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A96E1E second address: A96E24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A96E24 second address: A96E28 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A97136 second address: A9713B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9713B second address: A97154 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F3EA0D2C474h 0x00000008 jmp 00007F3EA0D2C46Eh 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9FC5C second address: A9FC61 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9FC61 second address: A9FC76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3EA0D2C46Dh 0x00000009 popad 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9FC76 second address: A9FC7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9DFB3 second address: A9DFBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9DFBE second address: A9DFC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9E23E second address: A9E242 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9E931 second address: A9E937 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9E937 second address: A9E93C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9F1F1 second address: A9F20B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3EA137BD26h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9F20B second address: A9F22A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 js 00007F3EA0D2C466h 0x0000000f popad 0x00000010 pop esi 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F3EA0D2C46Ch 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9F22A second address: A9F249 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 jmp 00007F3EA137BD25h 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9F249 second address: A9F24F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9DA3C second address: A9DA4E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 je 00007F3EA137BD16h 0x00000009 push esi 0x0000000a pop esi 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9DA4E second address: A9DA69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3EA0D2C477h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9DA69 second address: A9DA6D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA63A3 second address: AA63A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA6585 second address: AA658D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA658D second address: AA6591 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA6591 second address: AA6597 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA80A0 second address: AA80CB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3EA0D2C477h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a jl 00007F3EA0D2C495h 0x00000010 pushad 0x00000011 je 00007F3EA0D2C466h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA80CB second address: AA80D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jne 00007F3EA137BD16h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA7EF8 second address: AA7F04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA7F04 second address: AA7F1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 jne 00007F3EA137BD16h 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e popad 0x0000000f ja 00007F3EA137BD18h 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA7F1B second address: AA7F26 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007F3EA0D2C466h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AAF4B0 second address: AAF4C9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3EA137BD1Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edi 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AAF4C9 second address: AAF4CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AB6B08 second address: AB6B3B instructions: 0x00000000 rdtsc 0x00000002 jp 00007F3EA137BD16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ecx 0x0000000b jmp 00007F3EA137BD27h 0x00000010 pop ecx 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 jmp 00007F3EA137BD1Bh 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: ABAF1D second address: ABAF25 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: ABE829 second address: ABE842 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3EA137BD1Eh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: ABE842 second address: ABE84B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AC71F0 second address: AC71F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AC92F7 second address: AC92FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AC92FD second address: AC9326 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 pop edx 0x00000009 pushad 0x0000000a jmp 00007F3EA137BD29h 0x0000000f pushad 0x00000010 popad 0x00000011 push edx 0x00000012 pop edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AC9326 second address: AC933A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 jnp 00007F3EA0D2C478h 0x0000000c js 00007F3EA0D2C472h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AD17C7 second address: AD1807 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jo 00007F3EA137BD2Dh 0x0000000d jmp 00007F3EA137BD27h 0x00000012 push eax 0x00000013 push edx 0x00000014 jns 00007F3EA137BD16h 0x0000001a jmp 00007F3EA137BD24h 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AD1C59 second address: AD1C61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AD7176 second address: AD7182 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jne 00007F3EA137BD16h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AD6C7F second address: AD6CA0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3EA0D2C478h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AD6CA0 second address: AD6CA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AD6DFF second address: AD6E08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AD6E08 second address: AD6E0C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: ADA36C second address: ADA370 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: ADA370 second address: ADA397 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F3EA137BD20h 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F3EA137BD1Fh 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: ADA397 second address: ADA3AF instructions: 0x00000000 rdtsc 0x00000002 jns 00007F3EA0D2C466h 0x00000008 jmp 00007F3EA0D2C46Ah 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: ADA3AF second address: ADA3B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AF03C8 second address: AF03D4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jns 00007F3EA0D2C466h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AF03D4 second address: AF041B instructions: 0x00000000 rdtsc 0x00000002 jno 00007F3EA137BD1Ch 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F3EA137BD26h 0x00000017 jp 00007F3EA137BD2Dh 0x0000001d jmp 00007F3EA137BD21h 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AF041B second address: AF041F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AF041F second address: AF0427 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AF0427 second address: AF042B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AF042B second address: AF042F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AF0241 second address: AF0269 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F3EA0D2C46Ch 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ebx 0x0000000c push esi 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F3EA0D2C472h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AF9F2F second address: AF9F35 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AF9F35 second address: AF9F44 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F3EA0D2C46Ah 0x00000008 pushad 0x00000009 popad 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AF9F44 second address: AF9F4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AF9695 second address: AF96A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 js 00007F3EA0D2C466h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AF9962 second address: AF9967 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AF9C7B second address: AF9C82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop eax 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AF9C82 second address: AF9C88 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AF9C88 second address: AF9C8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AF9C8E second address: AF9C92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AFD3EF second address: AFD415 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F3EA0D2C466h 0x0000000a pop ecx 0x0000000b push edi 0x0000000c jmp 00007F3EA0D2C478h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AFD415 second address: AFD42C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jmp 00007F3EA137BD1Fh 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: B05C64 second address: B05C6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F3EA0D2C466h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: B05C6E second address: B05C72 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: B057EE second address: B057F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: B057F2 second address: B05817 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 jmp 00007F3EA137BD1Dh 0x0000000c jmp 00007F3EA137BD20h 0x00000011 pop esi 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: B05817 second address: B05827 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007F3EA0D2C466h 0x0000000a jns 00007F3EA0D2C466h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: B05827 second address: B0582B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AFE423 second address: AFE42F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AFE42F second address: AFE433 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AFE433 second address: AFE44B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3EA0D2C474h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AFE44B second address: AFE453 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AFE453 second address: AFE457 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AFD272 second address: AFD285 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jmp 00007F3EA137BD1Eh 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AFD285 second address: AFD28A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AFD28A second address: AFD29E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F3EA137BD1Dh 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 86DD0C instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: A3AD8D instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: AA9907 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeMemory allocated: 4C50000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 4EE0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 6EE0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0086E007 rdtsc 0_2_0086E007
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0205F sidt fword ptr [esp-02h]0_2_00A0205F
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 4352Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: file.exe, file.exe, 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
Source: file.exe, 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: regmonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: gbdyllo
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: procmon_window_class
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: ollydbg
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: filemonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeFile opened: NTICE
Source: C:\Users\user\Desktop\file.exeFile opened: SICE
Source: C:\Users\user\Desktop\file.exeFile opened: SIWVID
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0086E007 rdtsc 0_2_0086E007
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A01F05 LdrInitializeThunk,0_2_00A01F05
Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior
Source: file.exe, 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: _FhProgram Manager
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A429CD GetSystemTime,GetFileTime,0_2_00A429CD

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\Desktop\file.exeRegistry key value created / modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications DisableNotifications 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableIOAVProtection 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableRealtimeMonitoring 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\NotificationsRegistry value created: DisableNotifications 1Jump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry value created: TamperProtection 0Jump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AUOptionsJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AutoInstallMinorUpdatesJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate DoNotConnectToWindowsUpdateInternetLocationsJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Service Execution
1
Windows Service
1
Windows Service
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
Process Injection
41
Disable or Modify Tools
LSASS Memory641
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
271
Virtualization/Sandbox Evasion
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
Bypass User Account Control
1
Process Injection
NTDS271
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets23
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
Software Packing
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
Bypass User Account Control
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1561525
Start date and time:2024-11-23 16:28:07 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 25s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal100.evad.winEXE@1/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): otelrules.azureedge.net
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • VT rate limit hit for: file.exe
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\file.exe
File Type:CSV text
Category:dropped
Size (bytes):226
Entropy (8bit):5.360398796477698
Encrypted:false
SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
MD5:3A8957C6382192B71471BD14359D0B12
SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
Malicious:true
Reputation:high, very likely benign file
Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.469047630272562
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:file.exe
File size:2'803'712 bytes
MD5:0a24c2e5e66d1e2c6b87bf2b0a1c6798
SHA1:84bb168706262c83de6f7cf3a2ab360cdcb0b573
SHA256:99d45b95b1e9ec69ff99b0b2a6a52065628a7a4cfb2c9e25c412f11d53895699
SHA512:19edf3a436a9e392e302a2a152affdd2156810ce26e247aa8b27314b2afc5b3cba6e5611a2da5b4f144275aeaa987c92186615fc2e17de9ade2fa3f326f9dc77
SSDEEP:49152:rslMo7AYz59L9zvs+71OOmkVsxrtyqEvyHVTMIGw3p:wlMo7A659L9zvN2c/w3
TLSH:23D52BB1F60976CBD49B26789427CE82695F43F9471108E3EC6874BABE73CC126B5C24
File Content Preview:MZ......................@...........z...................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P(,e.........."...0..$...........@+.. ...`....@.. ........................+......Y+...`................................
Icon Hash:00928e8e8686b000
Entrypoint:0x6b4000
Entrypoint Section:.taggant
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE
Time Stamp:0x652C2850 [Sun Oct 15 17:58:40 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:2eabe9054cad5152567f0699947a2c5b
Instruction
jmp 00007F3EA127402Ah
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x80550x69.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000x59c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x81f80x8.idata
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
0x20000x40000x12000d84dd34394594e8a3045a6928f00515False0.9325086805555556data7.777970352280691IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x60000x59c0x600aae15e30898a02f09cc86ed48aa06b09False0.4140625data4.036947054771808IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata 0x80000x20000x200ec9cb51e8cb4ea49a56ee3cf434fb69eFalse0.1484375data0.9342685949460681IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
vbqisocr0xa0000x2a80000x2a68000c124bb97df8d5c89c70003d3d736059unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
fkbmxbkg0x2b20000x20000x4009ddf52b528bc30a02d4fa022531b7710False0.7802734375data6.184280159069747IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.taggant0x2b40000x40000x2200371fba8f9748738c2cea92a463a21168False0.05480238970588235DOS executable (COM)0.6140319122512601IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x60900x30cdata0.42948717948717946
RT_MANIFEST0x63ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
DLLImport
kernel32.dlllstrcpy
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:10:28:57
Start date:23/11/2024
Path:C:\Users\user\Desktop\file.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\file.exe"
Imagebase:0x860000
File size:2'803'712 bytes
MD5 hash:0A24C2E5E66D1E2C6B87BF2B0A1C6798
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:4.6%
    Dynamic/Decrypted Code Coverage:6%
    Signature Coverage:1.2%
    Total number of Nodes:252
    Total number of Limit Nodes:12
    execution_graph 8279 a43b07 8284 a3e880 GetCurrentThreadId 8279->8284 8281 a43b13 8282 a43b7b MapViewOfFileEx 8281->8282 8283 a43b2c 8281->8283 8282->8283 8286 a3e898 8284->8286 8285 a3e8df 8285->8281 8286->8285 8287 a3e8ce Sleep 8286->8287 8287->8286 8288 a40542 8289 a3e880 2 API calls 8288->8289 8290 a4054e 8289->8290 8291 a4056c 8290->8291 8295 a3ef92 8290->8295 8293 a4059d GetModuleHandleExA 8291->8293 8294 a40574 8291->8294 8293->8294 8296 a3efe0 8295->8296 8297 a3efa3 8295->8297 8296->8291 8297->8296 8299 a3ee33 8297->8299 8300 a3ee60 8299->8300 8301 a3eea9 8300->8301 8302 a3ee8e PathAddExtensionA 8300->8302 8308 a3ef66 8300->8308 8304 a3eecb 8301->8304 8311 a3ead4 8301->8311 8302->8301 8305 a3ead4 lstrcmpiA 8304->8305 8304->8308 8309 a3ef14 8304->8309 8305->8309 8306 a3ead4 lstrcmpiA 8307 a3ef3d 8306->8307 8307->8308 8310 a3ead4 lstrcmpiA 8307->8310 8308->8297 8309->8306 8309->8307 8309->8308 8310->8308 8312 a3eaf2 8311->8312 8313 a3eb09 8312->8313 8315 a3ea51 8312->8315 8313->8304 8316 a3ea7c 8315->8316 8317 a3eaae lstrcmpiA 8316->8317 8318 a3eac4 8316->8318 8317->8318 8318->8313 8319 a401ad 8321 a401b6 8319->8321 8322 a401c5 8321->8322 8323 a401cd 8322->8323 8325 a3e880 2 API calls 8322->8325 8324 a401fa GetProcAddress 8323->8324 8330 a401f0 8324->8330 8326 a401d7 8325->8326 8327 a401f5 8326->8327 8328 a401e7 8326->8328 8327->8324 8331 a3fc0e 8328->8331 8332 a3fcfa 8331->8332 8333 a3fc2d 8331->8333 8332->8330 8333->8332 8334 a3fc6a lstrcmpiA 8333->8334 8335 a3fc94 8333->8335 8334->8333 8334->8335 8335->8332 8337 a3fb57 8335->8337 8339 a3fb68 8337->8339 8338 a3fbf3 8338->8332 8339->8338 8340 a3fb98 lstrcpyn 8339->8340 8340->8338 8341 a3fbb4 8340->8341 8341->8338 8345 a3f09c 8341->8345 8355 a3fedf 8345->8355 8360 a3ff46 8355->8360 8362 a3ff53 8360->8362 8363 a3ff69 8362->8363 8364 a3e880 2 API calls 8363->8364 8373 a3ff71 8363->8373 8369 a3ff93 8364->8369 8365 a40051 8367 a4006f LoadLibraryExA 8365->8367 8368 a4005b LoadLibraryExW 8365->8368 8366 a4003e 8393 a3fd7e 8366->8393 8371 a40015 8367->8371 8368->8371 8372 a3ef92 2 API calls 8369->8372 8374 a3ffa4 8372->8374 8373->8365 8373->8366 8374->8373 8375 a3ffd2 8374->8375 8377 a3f8be 8375->8377 8378 a3f8e4 8377->8378 8379 a3f8da 8377->8379 8397 a3f111 8378->8397 8379->8371 8384 a400d0 3 API calls 8384->8379 8386 a3f934 8387 a3f961 8386->8387 8392 a3f999 8386->8392 8407 a3f2ef 8386->8407 8411 a3f58a 8387->8411 8390 a3f96c 8390->8392 8416 a3f501 8390->8416 8392->8379 8392->8384 8394 a3fd89 8393->8394 8395 a3fdaa LoadLibraryExA 8394->8395 8396 a3fd99 8394->8396 8395->8396 8396->8371 8398 a3f186 8397->8398 8399 a3f12d 8397->8399 8398->8379 8401 a3f1b7 VirtualAlloc 8398->8401 8399->8398 8400 a3f15d VirtualAlloc 8399->8400 8400->8398 8402 a3f1fc 8401->8402 8402->8392 8403 a3f234 8402->8403 8406 a3f25c 8403->8406 8404 a3f275 VirtualAlloc 8405 a3f2d3 8404->8405 8404->8406 8405->8386 8406->8404 8406->8405 8408 a3f30a 8407->8408 8410 a3f30f 8407->8410 8408->8387 8409 a3f342 lstrcmpiA 8409->8408 8409->8410 8410->8408 8410->8409 8413 a3f696 8411->8413 8414 a3f5b7 8411->8414 8412 a3f09c 16 API calls 8412->8414 8413->8390 8414->8412 8414->8413 8415 a401ad 16 API calls 8414->8415 8415->8414 8417 a3f52a 8416->8417 8418 a3f56b 8417->8418 8419 a3f542 VirtualProtect 8417->8419 8418->8392 8419->8417 8419->8418 8440 a403ef 8442 a403fb 8440->8442 8443 a4040f 8442->8443 8445 a40437 8443->8445 8446 a40450 8443->8446 8448 a40459 8446->8448 8449 a40468 8448->8449 8450 a3e880 2 API calls 8449->8450 8457 a40470 8449->8457 8453 a4047a 8450->8453 8451 a40521 GetModuleHandleA 8454 a404a8 8451->8454 8452 a40513 GetModuleHandleW 8452->8454 8455 a3ef92 2 API calls 8453->8455 8456 a40495 8453->8456 8455->8456 8456->8454 8456->8457 8457->8451 8457->8452 8458 4c50d48 8459 4c50d93 OpenSCManagerW 8458->8459 8461 4c50ddc 8459->8461 8462 a439a9 8464 a439b5 8462->8464 8465 a439cd 8464->8465 8467 a439f7 8465->8467 8468 a438e3 8465->8468 8470 a438ef 8468->8470 8471 a3e880 2 API calls 8470->8471 8472 a43902 8471->8472 8473 a43940 8472->8473 8474 a4397b 8472->8474 8477 a4391c 8472->8477 8473->8477 8478 a40fba 8473->8478 8475 a43980 CreateFileMappingA 8474->8475 8475->8477 8479 a40fd1 8478->8479 8480 a4103a CreateFileA 8479->8480 8481 a410ce 8479->8481 8482 a4107f 8480->8482 8481->8477 8482->8481 8484 a40699 CloseHandle 8482->8484 8485 a406ad 8484->8485 8485->8481 8486 4c51308 8487 4c51349 ImpersonateLoggedOnUser 8486->8487 8488 4c51376 8487->8488 8489 a431ca 8491 a431d3 8489->8491 8492 a3e880 2 API calls 8491->8492 8493 a431df 8492->8493 8494 a4322f ReadFile 8493->8494 8495 a431f8 8493->8495 8494->8495 8496 a430b7 8498 a430c3 8496->8498 8499 a3e880 2 API calls 8498->8499 8500 a430cf 8499->8500 8502 a430ef 8500->8502 8503 a42fc3 8500->8503 8505 a42fcf 8503->8505 8506 a42fe3 8505->8506 8507 a3e880 2 API calls 8506->8507 8508 a42ffb 8507->8508 8509 a43010 8508->8509 8529 a42edc 8508->8529 8513 a43018 8509->8513 8521 a42f81 IsBadWritePtr 8509->8521 8516 a4308c CreateFileA 8513->8516 8517 a43069 CreateFileW 8513->8517 8514 a3ef92 2 API calls 8515 a4304b 8514->8515 8515->8513 8518 a43053 8515->8518 8520 a43059 8516->8520 8517->8520 8523 a407d6 8518->8523 8522 a42fa3 8521->8522 8522->8513 8522->8514 8526 a407e3 8523->8526 8524 a408de 8524->8520 8525 a4081c CreateFileA 8527 a40868 8525->8527 8526->8524 8526->8525 8527->8524 8528 a40699 CloseHandle 8527->8528 8528->8524 8531 a42eeb GetWindowsDirectoryA 8529->8531 8532 a42f15 8531->8532 8533 a40097 8534 a3fedf 16 API calls 8533->8534 8535 a400aa 8534->8535 8536 a42e50 8538 a42e5c 8536->8538 8539 a3e880 2 API calls 8538->8539 8540 a42e68 8539->8540 8542 a42e88 8540->8542 8543 a42da7 8540->8543 8545 a42db3 8543->8545 8546 a42dc7 8545->8546 8547 a3e880 2 API calls 8546->8547 8548 a42ddf 8547->8548 8556 a3efe4 8548->8556 8551 a3ef92 2 API calls 8552 a42e02 8551->8552 8553 a42e0a 8552->8553 8554 a42e26 GetFileAttributesW 8552->8554 8555 a42e37 GetFileAttributesA 8552->8555 8554->8553 8555->8553 8557 a3f098 8556->8557 8558 a3eff8 8556->8558 8557->8551 8557->8553 8558->8557 8559 a3ee33 2 API calls 8558->8559 8559->8558 8560 4c515d0 8562 4c5164e ChangeServiceConfigA 8560->8562 8563 4c518da 8562->8563 8564 4c510f0 8565 4c51131 8564->8565 8568 a415d4 8565->8568 8566 4c51151 8569 a3e880 2 API calls 8568->8569 8570 a415e0 8569->8570 8571 a41609 8570->8571 8572 a415f9 8570->8572 8574 a4160e CloseHandle 8571->8574 8576 a406c0 8572->8576 8575 a415ff 8574->8575 8575->8566 8579 a3e72b 8576->8579 8580 a3e741 8579->8580 8582 a3e75b 8580->8582 8583 a3e70f 8580->8583 8582->8575 8584 a40699 CloseHandle 8583->8584 8585 a3e71f 8584->8585 8585->8582 8586 4c51510 8587 4c51558 ControlService 8586->8587 8588 4c5158f 8587->8588 8589 9fc7c7 8590 9fc7f6 8589->8590 8591 9fc82c RegOpenKeyA 8590->8591 8592 9fc805 RegOpenKeyA 8590->8592 8594 9fc849 8591->8594 8592->8591 8593 9fc822 8592->8593 8593->8591 8595 9fc88d GetNativeSystemInfo 8594->8595 8596 9fc3cb 8594->8596 8595->8596 8597 a400b8 8600 a3fef8 8597->8600 8602 a3ff04 8600->8602 8603 a3ff19 8602->8603 8604 a3ff37 8603->8604 8605 a3ff46 16 API calls 8603->8605 8605->8604 8606 a4293b 8607 a3e880 2 API calls 8606->8607 8608 a42947 GetCurrentProcess 8607->8608 8609 a42993 8608->8609 8610 a42957 8608->8610 8611 a42998 DuplicateHandle 8609->8611 8610->8609 8612 a42982 8610->8612 8614 a4298e 8611->8614 8615 a406d8 8612->8615 8617 a40702 8615->8617 8616 a40795 8616->8614 8617->8616 8618 a406c0 CloseHandle 8617->8618 8618->8616

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 240 4c515d0-4c5165a 242 4c51693-4c516b5 240->242 243 4c5165c-4c51666 240->243 250 4c516b7-4c516c4 242->250 251 4c516f1-4c51712 242->251 243->242 244 4c51668-4c5166a 243->244 245 4c5168d-4c51690 244->245 246 4c5166c-4c51676 244->246 245->242 248 4c51678 246->248 249 4c5167a-4c51689 246->249 248->249 249->249 252 4c5168b 249->252 250->251 253 4c516c6-4c516c8 250->253 259 4c51714-4c5171e 251->259 260 4c5174b-4c5176d 251->260 252->245 254 4c516eb-4c516ee 253->254 255 4c516ca-4c516d4 253->255 254->251 257 4c516d6 255->257 258 4c516d8-4c516e7 255->258 257->258 258->258 261 4c516e9 258->261 259->260 262 4c51720-4c51722 259->262 266 4c5176f-4c5177c 260->266 267 4c517a9-4c517ca 260->267 261->254 264 4c51745-4c51748 262->264 265 4c51724-4c5172e 262->265 264->260 268 4c51730 265->268 269 4c51732-4c51741 265->269 266->267 270 4c5177e-4c51780 266->270 277 4c51803-4c51825 267->277 278 4c517cc-4c517d6 267->278 268->269 269->269 271 4c51743 269->271 272 4c517a3-4c517a6 270->272 273 4c51782-4c5178c 270->273 271->264 272->267 275 4c51790-4c5179f 273->275 276 4c5178e 273->276 275->275 279 4c517a1 275->279 276->275 284 4c51827-4c51834 277->284 285 4c51861-4c518d8 ChangeServiceConfigA 277->285 278->277 280 4c517d8-4c517da 278->280 279->272 282 4c517fd-4c51800 280->282 283 4c517dc-4c517e6 280->283 282->277 286 4c517e8 283->286 287 4c517ea-4c517f9 283->287 284->285 289 4c51836-4c51838 284->289 293 4c518e1-4c51920 285->293 294 4c518da-4c518e0 285->294 286->287 287->287 288 4c517fb 287->288 288->282 290 4c5185b-4c5185e 289->290 291 4c5183a-4c51844 289->291 290->285 295 4c51846 291->295 296 4c51848-4c51857 291->296 300 4c51930-4c51934 293->300 301 4c51922-4c51926 293->301 294->293 295->296 296->296 298 4c51859 296->298 298->290 303 4c51944-4c51948 300->303 304 4c51936-4c5193a 300->304 301->300 302 4c51928-4c5192b call 4c5013c 301->302 302->300 307 4c51958-4c5195c 303->307 308 4c5194a-4c5194e 303->308 304->303 306 4c5193c-4c5193f call 4c5013c 304->306 306->303 309 4c5196c-4c51970 307->309 310 4c5195e-4c51962 307->310 308->307 312 4c51950-4c51953 call 4c5013c 308->312 314 4c51980-4c51984 309->314 315 4c51972-4c51976 309->315 310->309 313 4c51964-4c51967 call 4c5013c 310->313 312->307 313->309 319 4c51994 314->319 320 4c51986-4c5198a 314->320 315->314 318 4c51978-4c5197b call 4c5013c 315->318 318->314 324 4c51995 319->324 320->319 322 4c5198c-4c5198f call 4c5013c 320->322 322->319 324->324
    APIs
    • ChangeServiceConfigA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?), ref: 04C518C8
    Memory Dump Source
    • Source File: 00000000.00000002.2188943801.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4c50000_file.jbxd
    Similarity
    • API ID: ChangeConfigService
    • String ID:
    • API String ID: 3849694230-0
    • Opcode ID: 78b558b8f576ed2af3ae7efede490ffc4a5f248ff71331ee9c3d33ea7804a416
    • Instruction ID: a56e839b22fc721e69241aa6c54fe990b57d529bd76c064ee9a3f62c1f9fcf0a
    • Opcode Fuzzy Hash: 78b558b8f576ed2af3ae7efede490ffc4a5f248ff71331ee9c3d33ea7804a416
    • Instruction Fuzzy Hash: 50C17C70D002599FDB10CFA9C8897AEBBF2FF45314F188629EC54E7264DB74A981CB85

    Control-flow Graph

    APIs
    • LoadLibraryExW.KERNEL32(?,?,?), ref: 00A40064
    • LoadLibraryExA.KERNELBASE(00000000,?,?), ref: 00A40078
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID: .dll$.exe$1002
    • API String ID: 1029625771-847511843
    • Opcode ID: 149ad5914b96a1eb2b9d75d4e90688d25fd491a12f7c4243be29a61fc8451c66
    • Instruction ID: ddb1a0a78849298c574ad4282f8140daaf65db22a3580c405024aa713e428710
    • Opcode Fuzzy Hash: 149ad5914b96a1eb2b9d75d4e90688d25fd491a12f7c4243be29a61fc8451c66
    • Instruction Fuzzy Hash: 05319C36810109EFDF25AF50EA04BAD7F76FF88340F108129F90296461D7719DA0EB91

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 37 9f8cc7-9fb49f 42 9fc70e-9fc803 37->42 43 9fc3cb-9fc3d3 37->43 46 9fc82c-9fc847 RegOpenKeyA 42->46 47 9fc805-9fc820 RegOpenKeyA 42->47 49 9fc85f-9fc88b 46->49 50 9fc849-9fc853 46->50 47->46 48 9fc822 47->48 48->46 53 9fc88d-9fc896 GetNativeSystemInfo 49->53 54 9fc898-9fc8a2 49->54 50->49 53->54 55 9fc8ae-9fc8bc 54->55 56 9fc8a4 54->56 58 9fc8be 55->58 59 9fc8c8-9fc8cf 55->59 56->55 58->59 60 9fc8d5-9fc8dc 59->60 61 9fc8e2 59->61 60->61 62 9fce98-9fce9f 60->62 61->61 62->43 63 9fcea5-9fceb5 62->63
    APIs
    • RegOpenKeyA.ADVAPI32(80000001,?,?), ref: 009FC818
    • RegOpenKeyA.ADVAPI32(80000002,?,?), ref: 009FC83F
    • GetNativeSystemInfo.KERNELBASE(?), ref: 009FC896
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: Open$InfoNativeSystem
    • String ID: ya1t
    • API String ID: 1247124224-4015203210
    • Opcode ID: 42a34c6bdc7bb4a452a59386f20c4fdfd8549caccb2765a0dd0a9c8ec99774fb
    • Instruction ID: 54468f5535e85b571989eac349654c79d8491eb6fdd442e39aed6fa0f789e23c
    • Opcode Fuzzy Hash: 42a34c6bdc7bb4a452a59386f20c4fdfd8549caccb2765a0dd0a9c8ec99774fb
    • Instruction Fuzzy Hash: 9A417CB250410EDFDF25DE10C948ABF37A9EF09350F10892AEA8286951DB765CA4DF19

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 64 a40459-a4046a call a3fdbd 67 a40475-a4047e call a3e880 64->67 68 a40470 64->68 75 a40484-a40490 call a3ef92 67->75 76 a404b2-a404b9 67->76 69 a40509-a4050d 68->69 71 a40521-a40524 GetModuleHandleA 69->71 72 a40513-a4051c GetModuleHandleW 69->72 74 a4052a 71->74 72->74 80 a40534-a40536 74->80 83 a40495-a40497 75->83 77 a40504 call a3e92b 76->77 78 a404bf-a404c6 76->78 77->69 78->77 81 a404cc-a404d3 78->81 81->77 84 a404d9-a404e0 81->84 83->77 85 a4049d-a404a2 83->85 84->77 86 a404e6-a404fa 84->86 85->77 87 a404a8-a4052f call a3e92b 85->87 86->77 87->80
    APIs
    • GetModuleHandleW.KERNEL32(?,?,?,?,00A403EB,?,00000000,00000000), ref: 00A40516
    • GetModuleHandleA.KERNEL32(00000000,?,?,?,00A403EB,?,00000000,00000000), ref: 00A40524
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: HandleModule
    • String ID: .dll
    • API String ID: 4139908857-2738580789
    • Opcode ID: b9c4d7f4b2a3d7fd361779015a8bad9a671e400d0860a2121e0e0e668e07587a
    • Instruction ID: 9c1b0af76988361f6be9984635674daa681e58e862785196e81a3d4e1294f57c
    • Opcode Fuzzy Hash: b9c4d7f4b2a3d7fd361779015a8bad9a671e400d0860a2121e0e0e668e07587a
    • Instruction Fuzzy Hash: 5B11FAB4105609EFEB34AF54C909B9D7AB0FF90745F04C225BA02444E2D7B5AED4EE93

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 91 a42db3-a42dc1 92 a42dc7-a42dce 91->92 93 a42dd3 91->93 94 a42dda-a42df0 call a3e880 call a3efe4 92->94 93->94 99 a42df6-a42e04 call a3ef92 94->99 100 a42e0f 94->100 105 a42e0a 99->105 106 a42e1b-a42e20 99->106 102 a42e13-a42e16 100->102 104 a42e46-a42e4d call a3e92b 102->104 105->102 108 a42e26-a42e32 GetFileAttributesW 106->108 109 a42e37-a42e3a GetFileAttributesA 106->109 111 a42e40-a42e41 108->111 109->111 111->104
    APIs
    • GetFileAttributesW.KERNELBASE(00E3A54C,-11A65FEC), ref: 00A42E2C
    • GetFileAttributesA.KERNEL32(00000000,-11A65FEC), ref: 00A42E3A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: AttributesFile
    • String ID: @
    • API String ID: 3188754299-2726393805
    • Opcode ID: a79cd1bb3ec872b1b0d752c9466a7b9b937f3e891b4edd73b0e13f02e6661bfe
    • Instruction ID: 93d5916de2f70648602e41ffcf2b92a74bcae2e5c047c74491da9bfc06ebc1c9
    • Opcode Fuzzy Hash: a79cd1bb3ec872b1b0d752c9466a7b9b937f3e891b4edd73b0e13f02e6661bfe
    • Instruction Fuzzy Hash: C6013C34904608FAEB21DF54C90A7ADBE71AF80344F608065F502690E1D7B4AAD5EB80

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 112 9fc7c7-9fc803 114 9fc82c-9fc847 RegOpenKeyA 112->114 115 9fc805-9fc820 RegOpenKeyA 112->115 117 9fc85f-9fc88b 114->117 118 9fc849-9fc853 114->118 115->114 116 9fc822 115->116 116->114 121 9fc88d-9fc896 GetNativeSystemInfo 117->121 122 9fc898-9fc8a2 117->122 118->117 121->122 123 9fc8ae-9fc8bc 122->123 124 9fc8a4 122->124 126 9fc8be 123->126 127 9fc8c8-9fc8cf 123->127 124->123 126->127 128 9fc8d5-9fc8dc 127->128 129 9fc8e2 127->129 128->129 130 9fce98-9fce9f 128->130 129->129 131 9fc3cb-9fc3d3 130->131 132 9fcea5-9fceb5 130->132
    APIs
    • RegOpenKeyA.ADVAPI32(80000001,?,?), ref: 009FC818
    • RegOpenKeyA.ADVAPI32(80000002,?,?), ref: 009FC83F
    • GetNativeSystemInfo.KERNELBASE(?), ref: 009FC896
    Memory Dump Source
    • Source File: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: Open$InfoNativeSystem
    • String ID:
    • API String ID: 1247124224-0
    • Opcode ID: 0adba6ff9cdb4e582aa4ee3d04b9ff539d5004a47f10b99e098940f27b702dfa
    • Instruction ID: f261d14ae57f3586b52df20ce743fdc58186a9b100b0e1068da71a5b1c9e5404
    • Opcode Fuzzy Hash: 0adba6ff9cdb4e582aa4ee3d04b9ff539d5004a47f10b99e098940f27b702dfa
    • Instruction Fuzzy Hash: 7221397151010E9FEF21DF60CA487EF37A8EF0A350F008916EA8181952D7769CB4DF58

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 133 a3ee33-a3ee63 135 a3ee69-a3ee7e 133->135 136 a3ef8e-a3ef8f 133->136 135->136 138 a3ee84-a3ee88 135->138 139 a3eeaa-a3eeb1 138->139 140 a3ee8e-a3eea0 PathAddExtensionA 138->140 141 a3eed3-a3eeda 139->141 142 a3eeb7-a3eec6 call a3ead4 139->142 145 a3eea9 140->145 143 a3eee0-a3eee7 141->143 144 a3ef1c-a3ef23 141->144 147 a3eecb-a3eecd 142->147 148 a3ef00-a3ef0f call a3ead4 143->148 149 a3eeed-a3eef6 143->149 150 a3ef45-a3ef4c 144->150 151 a3ef29-a3ef3f call a3ead4 144->151 145->139 147->136 147->141 158 a3ef14-a3ef16 148->158 149->148 152 a3eefc 149->152 155 a3ef52-a3ef68 call a3ead4 150->155 156 a3ef6e-a3ef75 150->156 151->136 151->150 152->148 155->136 155->156 156->136 157 a3ef7b-a3ef88 call a3eb0d 156->157 157->136 158->136 158->144
    APIs
    • PathAddExtensionA.KERNELBASE(?,00000000), ref: 00A3EE95
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: ExtensionPath
    • String ID: \\?\
    • API String ID: 158807944-4282027825
    • Opcode ID: e353bc17e1bdd58b1aa2a4a2032e57da8d637ab152b960b01ae03d9e264cf482
    • Instruction ID: 15c8559579864380f9c1735bf996828fb362f0408eb8c6c0fa6a9e90f38dacfd
    • Opcode Fuzzy Hash: e353bc17e1bdd58b1aa2a4a2032e57da8d637ab152b960b01ae03d9e264cf482
    • Instruction Fuzzy Hash: 3A310636A0020ABFDF21DF94CD09B9EBBB6FF04749F000165F901A50A0E7B29AA5DB51

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 164 a40542-a40555 call a3e880 167 a40598-a405ac call a3e92b GetModuleHandleExA 164->167 168 a4055b-a40567 call a3ef92 164->168 174 a405b6-a405b8 167->174 171 a4056c-a4056e 168->171 171->167 173 a40574-a4057b 171->173 175 a40584-a405b1 call a3e92b 173->175 176 a40581 173->176 175->174 176->175
    APIs
      • Part of subcall function 00A3E880: GetCurrentThreadId.KERNEL32 ref: 00A3E88F
      • Part of subcall function 00A3E880: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 00A3E8D2
    • GetModuleHandleExA.KERNELBASE(?,?,?), ref: 00A405A6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: CurrentHandleModuleSleepThread
    • String ID: .dll
    • API String ID: 683542999-2738580789
    • Opcode ID: 1af393d0502de4ebf86174fc85d0fe46740f818e7e25eb516a975a7ba4e8b5b1
    • Instruction ID: 6f2c23e8283bd7b74efa2a7397314e1d66048911da8b72c414334753578a30d2
    • Opcode Fuzzy Hash: 1af393d0502de4ebf86174fc85d0fe46740f818e7e25eb516a975a7ba4e8b5b1
    • Instruction Fuzzy Hash: 94F0F9B6100205ABDF50EF64D945B697BB4FF98350F108411FE0689092D771D960AE12

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 179 a42fcf-a42fdd 180 a42fe3-a42fea 179->180 181 a42fef 179->181 182 a42ff6-a43002 call a3e880 180->182 181->182 185 a4301d-a4302d call a42f81 182->185 186 a43008-a43012 call a42edc 182->186 192 a43033-a4303a 185->192 193 a4303f-a4304d call a3ef92 185->193 186->185 191 a43018 186->191 194 a4305e-a43063 191->194 192->194 193->194 199 a43053-a43054 call a407d6 193->199 197 a4308c-a430a1 CreateFileA 194->197 198 a43069-a43087 CreateFileW 194->198 200 a430a7-a430a8 197->200 198->200 204 a43059 199->204 202 a430ad-a430b4 call a3e92b 200->202 204->202
    APIs
    • CreateFileW.KERNELBASE(00E3A54C,?,?,-11A65FEC,?,?,?,-11A65FEC,?), ref: 00A43081
      • Part of subcall function 00A42F81: IsBadWritePtr.KERNEL32(?,00000004), ref: 00A42F8F
    • CreateFileA.KERNEL32(?,?,?,-11A65FEC,?,?,?,-11A65FEC,?), ref: 00A430A1
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: CreateFile$Write
    • String ID:
    • API String ID: 1125675974-0
    • Opcode ID: 9fa878208eb6e81202d46ecb96bdc6ef3421241e4ccfcb3ea910c72edd6d475d
    • Instruction ID: ebe54bf41026abcf84c0a018293c75ac9a2f4065e17c0cb316ecc89f1c947776
    • Opcode Fuzzy Hash: 9fa878208eb6e81202d46ecb96bdc6ef3421241e4ccfcb3ea910c72edd6d475d
    • Instruction Fuzzy Hash: 4411073610514AFBDF22AF94DE09BAE7E72BF94344F104215FA02640A1C7B68AB5FB51

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 206 a4293b-a42951 call a3e880 GetCurrentProcess 209 a42957-a4295a 206->209 210 a42993-a429b5 call a3e92b DuplicateHandle 206->210 209->210 212 a42960-a42963 209->212 215 a429bf-a429c1 210->215 212->210 214 a42969-a4297c call a3e6da 212->214 214->210 218 a42982-a429ba call a406d8 call a3e92b 214->218 218->215
    APIs
      • Part of subcall function 00A3E880: GetCurrentThreadId.KERNEL32 ref: 00A3E88F
      • Part of subcall function 00A3E880: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 00A3E8D2
    • GetCurrentProcess.KERNEL32(-11A65FEC), ref: 00A42948
    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00A429AE
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: Current$DuplicateHandleProcessSleepThread
    • String ID:
    • API String ID: 2846201637-0
    • Opcode ID: d6ddc5fc9f6699fb36410dddd240c3c70bf80b69b9c23785e3b5d5de5d899ccb
    • Instruction ID: 5c2f891efd8525855c393d2a1d84049dce8dcd014e364c2d0cdbc4ddb50f6374
    • Opcode Fuzzy Hash: d6ddc5fc9f6699fb36410dddd240c3c70bf80b69b9c23785e3b5d5de5d899ccb
    • Instruction Fuzzy Hash: DA01463610014AFB8F12AFA4DD49E9E7F79FF88350F004521F90690061D771D0A2EB21

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 223 a3e880-a3e896 GetCurrentThreadId 224 a3e898-a3e8a4 223->224 225 a3e8aa-a3e8ac 224->225 226 a3e8df-a3e8ec 224->226 225->226 227 a3e8b2-a3e8b9 225->227 228 a3e8bf-a3e8c6 227->228 229 a3e8ce-a3e8da Sleep 227->229 228->229 231 a3e8cc 228->231 229->224 231->229
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 00A3E88F
    • Sleep.KERNELBASE(00000005,00050000,00000000), ref: 00A3E8D2
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: CurrentSleepThread
    • String ID:
    • API String ID: 1164918020-0
    • Opcode ID: d7bf324cc4d9dcbfd062ecc2019a4b057462a0544b75e0f71c8f02669db8b46f
    • Instruction ID: 0122fac3afeb66ebda215e295c18a2ee0ac20f4dc1b6ebb658cc80c2dc26f5a8
    • Opcode Fuzzy Hash: d7bf324cc4d9dcbfd062ecc2019a4b057462a0544b75e0f71c8f02669db8b46f
    • Instruction Fuzzy Hash: 77F09032901209EFDB21CF94C84476EB7B4EF41319F600139F10291481DBB02D85D781

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 325 4c515c4-4c5165a 327 4c51693-4c516b5 325->327 328 4c5165c-4c51666 325->328 335 4c516b7-4c516c4 327->335 336 4c516f1-4c51712 327->336 328->327 329 4c51668-4c5166a 328->329 330 4c5168d-4c51690 329->330 331 4c5166c-4c51676 329->331 330->327 333 4c51678 331->333 334 4c5167a-4c51689 331->334 333->334 334->334 337 4c5168b 334->337 335->336 338 4c516c6-4c516c8 335->338 344 4c51714-4c5171e 336->344 345 4c5174b-4c5176d 336->345 337->330 339 4c516eb-4c516ee 338->339 340 4c516ca-4c516d4 338->340 339->336 342 4c516d6 340->342 343 4c516d8-4c516e7 340->343 342->343 343->343 346 4c516e9 343->346 344->345 347 4c51720-4c51722 344->347 351 4c5176f-4c5177c 345->351 352 4c517a9-4c517ca 345->352 346->339 349 4c51745-4c51748 347->349 350 4c51724-4c5172e 347->350 349->345 353 4c51730 350->353 354 4c51732-4c51741 350->354 351->352 355 4c5177e-4c51780 351->355 362 4c51803-4c51825 352->362 363 4c517cc-4c517d6 352->363 353->354 354->354 356 4c51743 354->356 357 4c517a3-4c517a6 355->357 358 4c51782-4c5178c 355->358 356->349 357->352 360 4c51790-4c5179f 358->360 361 4c5178e 358->361 360->360 364 4c517a1 360->364 361->360 369 4c51827-4c51834 362->369 370 4c51861-4c51867 362->370 363->362 365 4c517d8-4c517da 363->365 364->357 367 4c517fd-4c51800 365->367 368 4c517dc-4c517e6 365->368 367->362 371 4c517e8 368->371 372 4c517ea-4c517f9 368->372 369->370 374 4c51836-4c51838 369->374 377 4c51871-4c518d8 ChangeServiceConfigA 370->377 371->372 372->372 373 4c517fb 372->373 373->367 375 4c5185b-4c5185e 374->375 376 4c5183a-4c51844 374->376 375->370 380 4c51846 376->380 381 4c51848-4c51857 376->381 378 4c518e1-4c51920 377->378 379 4c518da-4c518e0 377->379 385 4c51930-4c51934 378->385 386 4c51922-4c51926 378->386 379->378 380->381 381->381 383 4c51859 381->383 383->375 388 4c51944-4c51948 385->388 389 4c51936-4c5193a 385->389 386->385 387 4c51928-4c5192b call 4c5013c 386->387 387->385 392 4c51958-4c5195c 388->392 393 4c5194a-4c5194e 388->393 389->388 391 4c5193c-4c5193f call 4c5013c 389->391 391->388 394 4c5196c-4c51970 392->394 395 4c5195e-4c51962 392->395 393->392 397 4c51950-4c51953 call 4c5013c 393->397 399 4c51980-4c51984 394->399 400 4c51972-4c51976 394->400 395->394 398 4c51964-4c51967 call 4c5013c 395->398 397->392 398->394 404 4c51994 399->404 405 4c51986-4c5198a 399->405 400->399 403 4c51978-4c5197b call 4c5013c 400->403 403->399 409 4c51995 404->409 405->404 407 4c5198c-4c5198f call 4c5013c 405->407 407->404 409->409
    APIs
    • ChangeServiceConfigA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?), ref: 04C518C8
    Memory Dump Source
    • Source File: 00000000.00000002.2188943801.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4c50000_file.jbxd
    Similarity
    • API ID: ChangeConfigService
    • String ID:
    • API String ID: 3849694230-0
    • Opcode ID: 16de1a06711580ca40e97fdb37b3e243144144e9f8918ff1a5790ad7b8145623
    • Instruction ID: 56dd1293e9d16d7c6a4a1c23791aa5fe3ddcc93962a20d0d65dd1d2ddb37bbf1
    • Opcode Fuzzy Hash: 16de1a06711580ca40e97fdb37b3e243144144e9f8918ff1a5790ad7b8145623
    • Instruction Fuzzy Hash: A4C16D70D006599FEB10CFA8C8497ADBBF2FF45314F188529EC54E7264DB74A981CB85

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 410 a40fba-a40fcb 411 a40fd1-a40fe5 call a3e95e 410->411 412 a40ffa-a41003 call a3e95e 410->412 422 a410e8 411->422 423 a40feb-a40ff9 411->423 417 a410e0-a410e3 call a3e983 412->417 418 a41009-a4101a call a4079c 412->418 417->422 426 a41020-a41024 418->426 427 a4103a-a41079 CreateFileA 418->427 425 a410ef-a410f3 422->425 423->412 431 a41037 426->431 432 a4102a-a41036 426->432 428 a4109d-a410a0 427->428 429 a4107f-a4109c 427->429 433 a410a6-a410bd call a3e6a0 428->433 434 a410d3-a410db call a4062b 428->434 429->428 431->427 432->431 433->425 441 a410c3-a410ce call a40699 433->441 434->422 441->422
    APIs
    • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,?,00000000,00000010), ref: 00A4106F
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 1961be8daa4406fc3bf1689a9540453874eb730857a2e06c6ed4f8dfcab6dcf9
    • Instruction ID: 2c300530802ec0e5fe5205b14c4296d785cc483f0518ea633f9b29db160b69c5
    • Opcode Fuzzy Hash: 1961be8daa4406fc3bf1689a9540453874eb730857a2e06c6ed4f8dfcab6dcf9
    • Instruction Fuzzy Hash: C3318D75A00209BFEB209F65DC45F9DBBB8EB84714F20822AF505AA1D1D7B29A91DB10

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 444 a407d6-a407e5 call a3e95e 447 a408eb 444->447 448 a407eb-a407fc call a4079c 444->448 449 a408f2-a408f6 447->449 452 a40802-a40806 448->452 453 a4081c-a40862 CreateFileA 448->453 456 a4080c-a40818 452->456 457 a40819 452->457 454 a408ad-a408b0 453->454 455 a40868-a40889 453->455 458 a408b6-a408cd call a3e6a0 454->458 459 a408e3-a408e6 call a4062b 454->459 455->454 464 a4088f-a408ac 455->464 456->457 457->453 458->449 466 a408d3-a408de call a40699 458->466 459->447 464->454 466->447
    APIs
    • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,?,00000000), ref: 00A40858
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: f48c53bdc80ce0b87c82bcb09d0d5642cc3b53de919954e8466fac5361613c71
    • Instruction ID: d1bc4cfe7555f82c4cb13e5aa18bbd3dbff36bb1487554045f21008e6dccc700
    • Opcode Fuzzy Hash: f48c53bdc80ce0b87c82bcb09d0d5642cc3b53de919954e8466fac5361613c71
    • Instruction Fuzzy Hash: 3631C375A00204BEEB209F64DD45F99BBB8EF80724F208365F712EE0D1D3B1A952DB94
    APIs
    • OpenSCManagerW.SECHOST(00000000,00000000,?), ref: 04C50DCD
    Memory Dump Source
    • Source File: 00000000.00000002.2188943801.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4c50000_file.jbxd
    Similarity
    • API ID: ManagerOpen
    • String ID:
    • API String ID: 1889721586-0
    • Opcode ID: 097dcca0657b66a82e9f7177732e0c9ebe551d63332186ca1c406011455e8cfb
    • Instruction ID: 54d5133a8bc31a3d9ae7c2162876eb593d05703cb47fb0de9f170da09ce75326
    • Opcode Fuzzy Hash: 097dcca0657b66a82e9f7177732e0c9ebe551d63332186ca1c406011455e8cfb
    • Instruction Fuzzy Hash: 762144B6C002089FCB50CF9AD885ADEFBF5FF88310F14821AD808AB204C734A640CBA4
    APIs
    • OpenSCManagerW.SECHOST(00000000,00000000,?), ref: 04C50DCD
    Memory Dump Source
    • Source File: 00000000.00000002.2188943801.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4c50000_file.jbxd
    Similarity
    • API ID: ManagerOpen
    • String ID:
    • API String ID: 1889721586-0
    • Opcode ID: 0473f8d3ac451cfe08db9c00e75f062daec90d3a2d6190d90cc9dcfd9441f7a6
    • Instruction ID: ecf41da300ae27d76b41b977cbbc6fb01b7f268dbfb336c48e781903ea0534bb
    • Opcode Fuzzy Hash: 0473f8d3ac451cfe08db9c00e75f062daec90d3a2d6190d90cc9dcfd9441f7a6
    • Instruction Fuzzy Hash: C22137B6D002098FDB40CF99D485ADEFBF1EB88310F14855AD908EB254C738A641CBA4
    APIs
    • ControlService.ADVAPI32(?,?,?), ref: 04C51580
    Memory Dump Source
    • Source File: 00000000.00000002.2188943801.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4c50000_file.jbxd
    Similarity
    • API ID: ControlService
    • String ID:
    • API String ID: 253159669-0
    • Opcode ID: fe9886faa16e5490baf9099d1d04ddde9899c2b9cdc15691fff45b8adc87152d
    • Instruction ID: a149ff2de067034991172f0b3f700a9a5b846798aab3008d520b63a8a88fc930
    • Opcode Fuzzy Hash: fe9886faa16e5490baf9099d1d04ddde9899c2b9cdc15691fff45b8adc87152d
    • Instruction Fuzzy Hash: 9711E4B1D002499FDB10DF9AC584BDEFBF4EB49320F54802AE959A3250D778A644CFA5
    APIs
    • ControlService.ADVAPI32(?,?,?), ref: 04C51580
    Memory Dump Source
    • Source File: 00000000.00000002.2188943801.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4c50000_file.jbxd
    Similarity
    • API ID: ControlService
    • String ID:
    • API String ID: 253159669-0
    • Opcode ID: 3a6ec046417acf1ed765b3c1e6a88834007c8a54a14ccade171a48d1e9dd239b
    • Instruction ID: ad7aadb26c39e5fc62e8d2afa587e45eee3d048faff6c83cc6c51b9eaa0846e0
    • Opcode Fuzzy Hash: 3a6ec046417acf1ed765b3c1e6a88834007c8a54a14ccade171a48d1e9dd239b
    • Instruction Fuzzy Hash: A92114B5D00249CFDB10CF9AC544BDEFBF5EB48310F14802AD958A3250C778A644CFA5
    APIs
      • Part of subcall function 00A3E880: GetCurrentThreadId.KERNEL32 ref: 00A3E88F
      • Part of subcall function 00A3E880: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 00A3E8D2
    • MapViewOfFileEx.KERNELBASE(?,?,?,?,?,?,-11A65FEC), ref: 00A43B8E
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: CurrentFileSleepThreadView
    • String ID:
    • API String ID: 2270672837-0
    • Opcode ID: 58cd0f554f395332f02efb05bbec72beb1cf71db352b17b66e7adf04c1c6fd78
    • Instruction ID: 04d77fbe673b7a3d920e848ba80a8e0518ae1b52d65d40f7f89e40247a4012af
    • Opcode Fuzzy Hash: 58cd0f554f395332f02efb05bbec72beb1cf71db352b17b66e7adf04c1c6fd78
    • Instruction Fuzzy Hash: 4111E23710014AFFCF12AFA4DE09E9A3B66EF98380B004525FA0255061D77696B2EB61
    APIs
    • ImpersonateLoggedOnUser.KERNELBASE ref: 04C51367
    Memory Dump Source
    • Source File: 00000000.00000002.2188943801.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4c50000_file.jbxd
    Similarity
    • API ID: ImpersonateLoggedUser
    • String ID:
    • API String ID: 2216092060-0
    • Opcode ID: cabe513a220e689c6d556ef76771b1d7aa5ddd1b5ca081e5c1f39874de86073f
    • Instruction ID: 4d9676a21531e8fb9009d0f989282bb5d54d7120eb2c746169cbd48a7e99e2f4
    • Opcode Fuzzy Hash: cabe513a220e689c6d556ef76771b1d7aa5ddd1b5ca081e5c1f39874de86073f
    • Instruction Fuzzy Hash: 3B1166B1800249CFDB10CFAAC585BEEFBF4EF49320F14846AD528A3250D778A581CFA5
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: CurrentSleepThread
    • String ID:
    • API String ID: 1164918020-0
    • Opcode ID: a2878cb4ce5608ae1ed73aa4f96851f8af042ca66ccecdd1e9621f0a59880886
    • Instruction ID: cb62d7861dd022e5f4f6e2988625f7d1f3500ca5759e76168a775dfbc1877eef
    • Opcode Fuzzy Hash: a2878cb4ce5608ae1ed73aa4f96851f8af042ca66ccecdd1e9621f0a59880886
    • Instruction Fuzzy Hash: E3116D3B10024AEBCF12AFA4CA19FAE7BB5FF84345F108410F912560A2C7B5CA61EB50
    APIs
    • ImpersonateLoggedOnUser.KERNELBASE ref: 04C51367
    Memory Dump Source
    • Source File: 00000000.00000002.2188943801.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4c50000_file.jbxd
    Similarity
    • API ID: ImpersonateLoggedUser
    • String ID:
    • API String ID: 2216092060-0
    • Opcode ID: b5771a1c732fd6c84658c8b2b0f0e3e6aeefa7a4981ca8db2020cfb342aca8e7
    • Instruction ID: b85c4c525522bb1e2a75bfacc4aaeeec582ccdfb1d5cf62d9b057d414c4ad179
    • Opcode Fuzzy Hash: b5771a1c732fd6c84658c8b2b0f0e3e6aeefa7a4981ca8db2020cfb342aca8e7
    • Instruction Fuzzy Hash: 481106B1800249CFDB10DF9AC545BDEFBF8EF49320F14846AD558A3650D778A584CFA5
    APIs
      • Part of subcall function 00A3E880: GetCurrentThreadId.KERNEL32 ref: 00A3E88F
      • Part of subcall function 00A3E880: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 00A3E8D2
    • ReadFile.KERNELBASE(?,00000000,?,00000400,?,-11A65FEC,?,?,00A40F02,?,?,00000400,?,00000000,?,00000000), ref: 00A4323F
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: CurrentFileReadSleepThread
    • String ID:
    • API String ID: 1253362762-0
    • Opcode ID: 8ef87873bc6067b4607d2fe13a0ea4fdd85b14200c2d6e4176345a0b04f0f726
    • Instruction ID: 455386e0095261ce5374528d2c5e745861b9d526da7228dec1551d8c5e2dc070
    • Opcode Fuzzy Hash: 8ef87873bc6067b4607d2fe13a0ea4fdd85b14200c2d6e4176345a0b04f0f726
    • Instruction Fuzzy Hash: 32F0C937100149FBDF12AF95DD09E9A3F76FFA9740F008521FA0149061D772D5A1EB61
    APIs
    • GetProcAddress.KERNEL32(00A3F96C,00A3F96C), ref: 00A40201
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: AddressProc
    • String ID:
    • API String ID: 190572456-0
    • Opcode ID: 4defd7698b9eef1f6e73d02fbe1de185bcc538389be1f76d4fd29e224f60e356
    • Instruction ID: 0ab0534c7ec7bc6e003c130acc5d2d5404c90c9cbae05625e85d6023349ca856
    • Opcode Fuzzy Hash: 4defd7698b9eef1f6e73d02fbe1de185bcc538389be1f76d4fd29e224f60e356
    • Instruction Fuzzy Hash: 31E06D35540109AACF013B79CA09E8E7E66AEE0340F008232BE02980A6EB34C862F620
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: lstrcmpi
    • String ID:
    • API String ID: 1586166983-0
    • Opcode ID: 7127575fc6c6319c90395e427e2f30c60223fef1b73c430044f0a411bae471ec
    • Instruction ID: ce1e34555eb57c4139a4cd478ab7e4fe83c9b863c5d7359222a2bbc301a18598
    • Opcode Fuzzy Hash: 7127575fc6c6319c90395e427e2f30c60223fef1b73c430044f0a411bae471ec
    • Instruction Fuzzy Hash: A4019636A00509BFCF21DFA5DC05EDEBF76FF48781F004565B402A44A1E7729661EB64
    APIs
      • Part of subcall function 00A3E880: GetCurrentThreadId.KERNEL32 ref: 00A3E88F
      • Part of subcall function 00A3E880: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 00A3E8D2
    • CloseHandle.KERNELBASE(00A40F97,-11A65FEC,?,?,00A40F97,?), ref: 00A41612
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: CloseCurrentHandleSleepThread
    • String ID:
    • API String ID: 4003616898-0
    • Opcode ID: cc1b2c822dbdfdc5f4717b8748f24e5ec8cb534237eddc4417f719a862d2da0e
    • Instruction ID: d37f940cfae2437c230dde50b8c49e854b276e56d0fd81cefc0832f080b6dafa
    • Opcode Fuzzy Hash: cc1b2c822dbdfdc5f4717b8748f24e5ec8cb534237eddc4417f719a862d2da0e
    • Instruction Fuzzy Hash: 64E04F76204105E6DE10BB79DA09F4EAEA8EFD0780F024532F50785491EB65E592D661
    APIs
    • CloseHandle.KERNELBASE(?,?,00A3E71F,?,?), ref: 00A4069F
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: CloseHandle
    • String ID:
    • API String ID: 2962429428-0
    • Opcode ID: eb85472ca837eb5baf34e5796c8a60973784075c62659ef3474dcfb4b16ca3c9
    • Instruction ID: 80a49541cac7fe3155b3afd1033cc7c39c873af5a8175c5ef7b991f74de2e30c
    • Opcode Fuzzy Hash: eb85472ca837eb5baf34e5796c8a60973784075c62659ef3474dcfb4b16ca3c9
    • Instruction Fuzzy Hash: CBB09231000119BBCF01BF51DD06C4EFF69FF95799B518121BA07444619BB6E970AB90
    APIs
      • Part of subcall function 00A3E880: GetCurrentThreadId.KERNEL32 ref: 00A3E88F
      • Part of subcall function 00A3E880: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 00A3E8D2
    • GetSystemTime.KERNEL32(?,-11A65FEC), ref: 00A42A02
    • GetFileTime.KERNEL32(?,?,?,?,-11A65FEC), ref: 00A42A45
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: Time$CurrentFileSleepSystemThread
    • String ID:
    • API String ID: 3818558864-0
    • Opcode ID: 60b964c9c825ec3155f3c7c3039c4d6d05ba2c9046b9073fc9e75a0a7000c575
    • Instruction ID: 999b56d42621026559a94f0be5f50cfeb883ef80e802e1c6d23a7d91ae717aae
    • Opcode Fuzzy Hash: 60b964c9c825ec3155f3c7c3039c4d6d05ba2c9046b9073fc9e75a0a7000c575
    • Instruction Fuzzy Hash: 5501D23620418AFBCF21AF59E90DE9A7F75FFC5791B404121F802854A0DB71E9A2EB61
    APIs
    • CryptVerifySignatureA.ADVAPI32(?,?,?,?,?,?), ref: 00A438D2
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: CryptSignatureVerify
    • String ID:
    • API String ID: 1015439381-0
    • Opcode ID: 5f8eb33d69dfa695b72a2fca1f08afa79e7bd8303f91faf9e24b560897cda0a7
    • Instruction ID: 74e71b6393914762c92384fed6e39b7995ad5c6f310de23ef7e005020914058e
    • Opcode Fuzzy Hash: 5f8eb33d69dfa695b72a2fca1f08afa79e7bd8303f91faf9e24b560897cda0a7
    • Instruction Fuzzy Hash: F1F0F83760124AEFCF01CFA4C94498D7BB2FF44344B108529F90696261D376D660EF40
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID:
    • String ID: c&c?
    • API String ID: 0-3433146618
    • Opcode ID: 88128ca5909ae20a51c0dda4eecee336f9ab921d0267b780b1bfd5e44b32f873
    • Instruction ID: 168ae888a545f9724897ea7be390563a499f21d42a0a49d12cb5675821497508
    • Opcode Fuzzy Hash: 88128ca5909ae20a51c0dda4eecee336f9ab921d0267b780b1bfd5e44b32f873
    • Instruction Fuzzy Hash: 6B41BFB250C200EFE308AE59DC8173AB7F5EB99710F25483DE6C6C3394E73558509A87
    Memory Dump Source
    • Source File: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3d3a5f988fd41932772787a78c265135763ac300ff6c93538350615054d3d02d
    • Instruction ID: c189e8cc704780e19f17a0d39fb475da1e01cd1889b4fd1d2a12ccab5d5b0db8
    • Opcode Fuzzy Hash: 3d3a5f988fd41932772787a78c265135763ac300ff6c93538350615054d3d02d
    • Instruction Fuzzy Hash: 1D61E0B240C3519FD7029F6898916AAFBF4FF16310F0688AEE9C5CB252E3344814CB63
    Memory Dump Source
    • Source File: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 82f21adf44e9a46deac4e536eeecc8ae46fd928cab13c533af028ef6bb89c052
    • Instruction ID: b9a0b66deaf7d46cf3d9567339f8c3e6fcf0da6a1dab17aa775291f9171d7ba4
    • Opcode Fuzzy Hash: 82f21adf44e9a46deac4e536eeecc8ae46fd928cab13c533af028ef6bb89c052
    • Instruction Fuzzy Hash: FC41D6F3A0C308DFD3006A29ED9163ABBE5AB14350F360D3EE786C7201EA395855A757
    Memory Dump Source
    • Source File: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: eb8e05205d1f6c05032e0b975bc5558c6eedd92f81074f3d3b83bc3a133f06ea
    • Instruction ID: 085d96012002b1ae93db877351ccf00150fbe77d1f0a3b8c46e5127ddad7c6fd
    • Opcode Fuzzy Hash: eb8e05205d1f6c05032e0b975bc5558c6eedd92f81074f3d3b83bc3a133f06ea
    • Instruction Fuzzy Hash: B741D3B290C6009FE71ABF69D84267EFBE1FF98710F16482DE6C586220E7355490CB97
    Memory Dump Source
    • Source File: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 38f2775ad733b7e7c800c8e95a7a9bbd2765f9342f9e4ab6889947cad4c80200
    • Instruction ID: 32cfdac2dfc279e1b609aa48213e63db4d025ad2ddaef48e5767bbf0a07ccd64
    • Opcode Fuzzy Hash: 38f2775ad733b7e7c800c8e95a7a9bbd2765f9342f9e4ab6889947cad4c80200
    • Instruction Fuzzy Hash: C2316ABA00410EDECB09DF54C6554EF7B60FB47332F26442AE842C7543D2B11D11BB5A
    Memory Dump Source
    • Source File: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 946a716a17c6805fb0e946b3238cbaf2570cf65a1d23cbbf4ee0b9e4d69b7b99
    • Instruction ID: 35df728204d05cb6960fcddff9e14a8be1ebb9aa7ef5ed5478378111492d4b07
    • Opcode Fuzzy Hash: 946a716a17c6805fb0e946b3238cbaf2570cf65a1d23cbbf4ee0b9e4d69b7b99
    • Instruction Fuzzy Hash: ED314DF260C600AFE705AF29DC85A6EFBE5EF99360F16092DE6C4D3710D33154518A57
    Memory Dump Source
    • Source File: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 097abda890f6a6cbb57fde59906503897b15f4554e091e7dd10a6910d6db8ee9
    • Instruction ID: a423102c08b6bc805de493ded898fcc97adc2944e2a52f4d1002fb9f8342172f
    • Opcode Fuzzy Hash: 097abda890f6a6cbb57fde59906503897b15f4554e091e7dd10a6910d6db8ee9
    • Instruction Fuzzy Hash: 1E314DB260C600AFE305AF2AD88566EFBE5FF98320F16092DE6C5C3710D33154518A93
    Memory Dump Source
    • Source File: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 159bcd179439b21ce358e55c940aa16e6be1d38786ebbe5c5cf6add4c0494cfc
    • Instruction ID: c3666439fc0be95258d7ba26025263a596c3f647e19cf0898b0a1cfdf36cb63c
    • Opcode Fuzzy Hash: 159bcd179439b21ce358e55c940aa16e6be1d38786ebbe5c5cf6add4c0494cfc
    • Instruction Fuzzy Hash: E83124B250C704AFE70ABF68D88267EFBE4FF58350F12492DE6D582610E6355890CA87
    Memory Dump Source
    • Source File: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5d182c9779935aa45843794a5de5e691cc7cf775198b56941ab8cc579237bb53
    • Instruction ID: 9fa2be753e3ce2d6cee5ec538b82b77d93ceefedba72f8835266a28ffdfa3914
    • Opcode Fuzzy Hash: 5d182c9779935aa45843794a5de5e691cc7cf775198b56941ab8cc579237bb53
    • Instruction Fuzzy Hash: E631DEB250C610DFE709BF69D88267EFBE1FF98710F12482DE2C586220DB7454808B97
    Memory Dump Source
    • Source File: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 384a8d73664a53ecfea07dd7af1e41d5d3bc6093680b18e3231768c65b3062dd
    • Instruction ID: ebd2a13f40cf3fd72e51babaf4c38097c957603761e23366eaeb78f35a55d35c
    • Opcode Fuzzy Hash: 384a8d73664a53ecfea07dd7af1e41d5d3bc6093680b18e3231768c65b3062dd
    • Instruction Fuzzy Hash: 960124B254020ADBEB10CF04C108A9BB774FF49360F1686A8D8015BA51D3746C98CF48
    Memory Dump Source
    • Source File: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e1ea9b35c855acffdbaca9fb175a79af996371d84bc5f70d6684c1328b74e994
    • Instruction ID: 63aec5c30f0e6935ff03d52d1695c7be84a696fbc324feada67ceb2c25d9b109
    • Opcode Fuzzy Hash: e1ea9b35c855acffdbaca9fb175a79af996371d84bc5f70d6684c1328b74e994
    • Instruction Fuzzy Hash: B0D012703083904FCB80CF25C0C4BA677E6BB80220F0844F9EC48CE116DB248848CB31
    APIs
      • Part of subcall function 00A3E880: GetCurrentThreadId.KERNEL32 ref: 00A3E88F
      • Part of subcall function 00A3E880: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 00A3E8D2
      • Part of subcall function 00A42F81: IsBadWritePtr.KERNEL32(?,00000004), ref: 00A42F8F
    • wsprintfA.USER32 ref: 00A41F49
    • LoadImageA.USER32(?,?,?,?,?,?), ref: 00A4200D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: CurrentImageLoadSleepThreadWritewsprintf
    • String ID: %8x$%8x
    • API String ID: 2375920415-2046107164
    • Opcode ID: eef25aca547b01507bc7abe621b63a9f7768a343979ea0bd97fb277c320a8ac1
    • Instruction ID: d6bf9646c719a8c21d8268a0039fb5bc7b69c1f9628c434b4454d07a6215ec2b
    • Opcode Fuzzy Hash: eef25aca547b01507bc7abe621b63a9f7768a343979ea0bd97fb277c320a8ac1
    • Instruction Fuzzy Hash: FC31133590010AFBCF11DF94DD49EAEBFB9FF88710F108126F912A61A1D7719A61DBA0
    APIs
    • GetFileAttributesExW.KERNEL32(00E3A54C,00004020,00000000,-11A65FEC), ref: 00A42BC1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2187284568.0000000000A39000.00000040.00000001.01000000.00000003.sdmp, Offset: 00860000, based on PE: true
    • Associated: 00000000.00000002.2187035190.0000000000860000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187049348.0000000000862000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187062858.0000000000866000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187075545.000000000086A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187090881.0000000000876000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187184243.00000000009D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187196310.00000000009D4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187213041.00000000009F4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187248448.0000000000A25000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187261619.0000000000A33000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187273389.0000000000A34000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187296302.0000000000A44000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187307727.0000000000A45000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187318530.0000000000A46000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187330245.0000000000A4A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187343058.0000000000A59000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187355063.0000000000A60000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187368685.0000000000A69000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187381450.0000000000A6B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187392833.0000000000A6C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187404683.0000000000A73000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187416039.0000000000A74000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187427635.0000000000A76000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187440396.0000000000A7F000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187455728.0000000000A83000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187468757.0000000000A84000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187482368.0000000000A85000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187496505.0000000000A8D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187509443.0000000000A8E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187521765.0000000000A90000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187535358.0000000000A94000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187547799.0000000000A95000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187560840.0000000000A98000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187575229.0000000000AA0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187587911.0000000000AA1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187607936.0000000000AC0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187620987.0000000000AC1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187638907.0000000000AD2000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187655088.0000000000AD3000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000AFB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187677092.0000000000B03000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187704763.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2187716976.0000000000B14000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_860000_file.jbxd
    Similarity
    • API ID: AttributesFile
    • String ID: @
    • API String ID: 3188754299-2726393805
    • Opcode ID: 5d9337cea5568dcb2ab868f481f8839b3ccb624679cf34cd2c2eb48e20e10a24
    • Instruction ID: 5c9ad6f5cf46d983ed8f17dbc6a074a4b8b648edbfb7829bb6781e301781b4d1
    • Opcode Fuzzy Hash: 5d9337cea5568dcb2ab868f481f8839b3ccb624679cf34cd2c2eb48e20e10a24
    • Instruction Fuzzy Hash: ED316B75504705EFDB25CF44C884B8EBFB0FF44300F508529F95667691C3B4AAA5DB90