Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1561645
MD5:92b22f14f1664cc7bb2f42daf6fd1799
SHA1:68a767dd4bcd60e310bafd7219749093bd013bc6
SHA256:85507d05a1da7659f9045ec2d969ddd0de20723fc7422b4985bd392411449fe8
Tags:exeuser-Bitsight
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
AI detected suspicious sample
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Hides threads from debuggers
Machine Learning detection for sample
Modifies windows update settings
PE file contains section with special chars
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Entry point lies outside standard sections
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 6280 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 92B22F14F1664CC7BB2F42DAF6FD1799)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: file.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005B6DDB CryptVerifySignatureA,0_2_005B6DDB
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: file.exe, 00000000.00000003.2131883440.0000000004D60000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmp

System Summary

barindex
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003E58930_2_003E5893
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003DDABA0_2_003DDABA
Source: C:\Users\user\Desktop\file.exeCode function: String function: 005B1DD0 appears 35 times
Source: file.exe, 00000000.00000002.2265864574.0000000001023000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
Source: file.exe, 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exeBinary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exeStatic PE information: Entrypont disasm: arithmetic instruction to all instruction ratio: 1.0 > 0.5 instr diversity: 0.5
Source: classification engineClassification label: mal100.evad.winEXE@1/1@0/0
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.logJump to behavior
Source: C:\Users\user\Desktop\file.exeMutant created: NULL
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeString found in binary or memory: 3The file %s is missing. Please, re-install this application
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: file.exeStatic file information: File size 2842624 > 1048576
Source: file.exeStatic PE information: Raw size of heclofms is bigger than: 0x100000 < 0x2b0000
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: file.exe, 00000000.00000003.2131883440.0000000004D60000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmp

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.3d0000.0.unpack :EW;.rsrc:W;.idata :W;heclofms:EW;owtxsouk:EW;.taggant:EW; vs :ER;.rsrc:W;
Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
Source: file.exeStatic PE information: real checksum: 0x2c27b6 should be: 0x2bdb73
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: file.exeStatic PE information: section name: heclofms
Source: file.exeStatic PE information: section name: owtxsouk
Source: file.exeStatic PE information: section name: .taggant
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0055B068 push eax; mov dword ptr [esp], 6B946661h0_2_0055B0C9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0055B068 push esi; mov dword ptr [esp], ecx0_2_0055B0E2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0055B068 push 17F36738h; mov dword ptr [esp], eax0_2_0055B13C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003E135D push ebx; mov dword ptr [esp], ecx0_2_003E3474
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003E135D push ebp; mov dword ptr [esp], eax0_2_003E4310
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005D404F push 75D3E45Bh; mov dword ptr [esp], ebx0_2_005D407B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005D404F push 299F4AD7h; mov dword ptr [esp], ebp0_2_005D40CC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003E200C push 3F8D8ECEh; mov dword ptr [esp], ebp0_2_003E2018
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00570061 push eax; ret 0_2_00570070
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0055B06F push eax; mov dword ptr [esp], 6B946661h0_2_0055B0C9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0055B06F push esi; mov dword ptr [esp], ecx0_2_0055B0E2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0055B06F push 17F36738h; mov dword ptr [esp], eax0_2_0055B13C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00568069 push 15ECE88Dh; mov dword ptr [esp], ebx0_2_0056BDE9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0056B019 push 13F0A79Ah; mov dword ptr [esp], edx0_2_0056B01E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0055F03D push esi; ret 0_2_0055F04C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0056B03F push 1B554E5Ch; mov dword ptr [esp], ebx0_2_0056B062
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005CA02A push ebx; mov dword ptr [esp], edx0_2_005CA04E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005CA02A push ebp; mov dword ptr [esp], esi0_2_005CA071
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0066901E push edx; mov dword ptr [esp], ecx0_2_00669028
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0066901E push ebx; mov dword ptr [esp], 4194FCA7h0_2_00669072
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0055D0E1 push ebp; mov dword ptr [esp], eax0_2_0055D110
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0056A0EC push 266E14DBh; mov dword ptr [esp], eax0_2_0056A0F1
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003DD0E8 push ebp; mov dword ptr [esp], ecx0_2_003DD6A7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003E20D3 push edi; mov dword ptr [esp], edx0_2_003E20E5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0055D0B8 push 32DDE68Ah; mov dword ptr [esp], eax0_2_0055D0BD
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00569145 push edi; mov dword ptr [esp], eax0_2_005693E2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003DD125 push 005B671Ah; mov dword ptr [esp], ebp0_2_003DD12A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003E2122 push edx; mov dword ptr [esp], 3A00952Fh0_2_003E1B5A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003E2122 push eax; mov dword ptr [esp], ebp0_2_003E3C53
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003E2122 push edx; mov dword ptr [esp], ecx0_2_003E3C97
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003E2122 push edi; mov dword ptr [esp], 00000000h0_2_003E3C9B
Source: file.exeStatic PE information: section name: entropy: 7.818185395285856

Boot Survival

barindex
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 3DE275 second address: 3DE294 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push edi 0x0000000a jmp 00007F3704EAC2C4h 0x0000000f pop edi 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 3DE294 second address: 3DE2AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F3704502855h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 3DE2AD second address: 3DE2B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 3DE2B1 second address: 3DDB5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 pushad 0x0000000a popad 0x0000000b push dword ptr [ebp+122D16E1h] 0x00000011 jmp 00007F3704502851h 0x00000016 call dword ptr [ebp+122D1D95h] 0x0000001c pushad 0x0000001d jmp 00007F3704502854h 0x00000022 xor eax, eax 0x00000024 sub dword ptr [ebp+122D1D76h], ebx 0x0000002a mov dword ptr [ebp+122D1D76h], esi 0x00000030 mov edx, dword ptr [esp+28h] 0x00000034 cld 0x00000035 cld 0x00000036 mov dword ptr [ebp+122D37E5h], eax 0x0000003c jno 00007F370450284Ch 0x00000042 mov esi, 0000003Ch 0x00000047 mov dword ptr [ebp+122D1E60h], edx 0x0000004d stc 0x0000004e add esi, dword ptr [esp+24h] 0x00000052 ja 00007F370450284Ch 0x00000058 lodsw 0x0000005a mov dword ptr [ebp+122D2673h], edi 0x00000060 jmp 00007F370450284Bh 0x00000065 add eax, dword ptr [esp+24h] 0x00000069 pushad 0x0000006a mov dx, si 0x0000006d sub dl, FFFFFFB8h 0x00000070 popad 0x00000071 mov ebx, dword ptr [esp+24h] 0x00000075 stc 0x00000076 pushad 0x00000077 mov ecx, dword ptr [ebp+122D38D9h] 0x0000007d push ebx 0x0000007e mov edi, dword ptr [ebp+122D37C9h] 0x00000084 pop eax 0x00000085 popad 0x00000086 nop 0x00000087 push eax 0x00000088 push edx 0x00000089 jmp 00007F370450284Ch 0x0000008e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55BCAA second address: 55BCAE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55BCAE second address: 55BCB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55AEEE second address: 55AF07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F3704EAC2B6h 0x0000000a pop esi 0x0000000b pushad 0x0000000c jnc 00007F3704EAC2B6h 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55AF07 second address: 55AF11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F3704502846h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55B179 second address: 55B184 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F3704EAC2B6h 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55B184 second address: 55B1AC instructions: 0x00000000 rdtsc 0x00000002 jns 00007F3704502848h 0x00000008 push edi 0x00000009 pop edi 0x0000000a jmp 00007F370450284Eh 0x0000000f pop edx 0x00000010 pop eax 0x00000011 ja 00007F3704502870h 0x00000017 push eax 0x00000018 push edx 0x00000019 ja 00007F3704502846h 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55B333 second address: 55B339 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55EFE1 second address: 55EFE7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55EFE7 second address: 55F008 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 mov ecx, dword ptr [ebp+122D3971h] 0x0000000f push 00000000h 0x00000011 xor dword ptr [ebp+122D270Bh], edi 0x00000017 push 83B8D22Ch 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55F008 second address: 55F00C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55F00C second address: 55F016 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55F016 second address: 55F0AF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3704502850h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a add dword ptr [esp], 7C472E54h 0x00000011 push 00000000h 0x00000013 push esi 0x00000014 call 00007F3704502848h 0x00000019 pop esi 0x0000001a mov dword ptr [esp+04h], esi 0x0000001e add dword ptr [esp+04h], 0000001Dh 0x00000026 inc esi 0x00000027 push esi 0x00000028 ret 0x00000029 pop esi 0x0000002a ret 0x0000002b jmp 00007F370450284Eh 0x00000030 push 00000003h 0x00000032 mov edx, dword ptr [ebp+122D34ACh] 0x00000038 push 00000000h 0x0000003a mov dword ptr [ebp+122D1DBDh], ebx 0x00000040 push 00000003h 0x00000042 jmp 00007F3704502859h 0x00000047 call 00007F3704502849h 0x0000004c jmp 00007F3704502850h 0x00000051 push eax 0x00000052 push ecx 0x00000053 push eax 0x00000054 push edx 0x00000055 push esi 0x00000056 pop esi 0x00000057 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55F0AF second address: 55F0E4 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F3704EAC2B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ecx 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f jmp 00007F3704EAC2BBh 0x00000014 mov eax, dword ptr [eax] 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F3704EAC2C7h 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55F0E4 second address: 55F0EA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55F0EA second address: 55F10F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3704EAC2C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jp 00007F3704EAC2BCh 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55F10F second address: 55F113 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55F113 second address: 55F11D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F3704EAC2B6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55F201 second address: 55F214 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 jo 00007F3704502846h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f pushad 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55F214 second address: 55F21A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55F21A second address: 55F222 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55F222 second address: 55F29B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 nop 0x00000007 mov si, ax 0x0000000a push 00000000h 0x0000000c mov dword ptr [ebp+122D1DCAh], esi 0x00000012 mov dword ptr [ebp+122D284Ch], ebx 0x00000018 call 00007F3704EAC2B9h 0x0000001d je 00007F3704EAC2C2h 0x00000023 jp 00007F3704EAC2BCh 0x00000029 push eax 0x0000002a jns 00007F3704EAC2D7h 0x00000030 mov eax, dword ptr [esp+04h] 0x00000034 pushad 0x00000035 jbe 00007F3704EAC2BCh 0x0000003b jne 00007F3704EAC2B6h 0x00000041 push ebx 0x00000042 pushad 0x00000043 popad 0x00000044 pop ebx 0x00000045 popad 0x00000046 mov eax, dword ptr [eax] 0x00000048 push eax 0x00000049 push edx 0x0000004a push eax 0x0000004b push edx 0x0000004c push eax 0x0000004d push edx 0x0000004e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55F29B second address: 55F29F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55F29F second address: 55F2A5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55F2A5 second address: 55F339 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c jmp 00007F370450284Bh 0x00000011 pop eax 0x00000012 stc 0x00000013 push 00000003h 0x00000015 movzx esi, di 0x00000018 push 00000000h 0x0000001a jnl 00007F370450284Ch 0x00000020 push 00000003h 0x00000022 push 00000000h 0x00000024 push edi 0x00000025 call 00007F3704502848h 0x0000002a pop edi 0x0000002b mov dword ptr [esp+04h], edi 0x0000002f add dword ptr [esp+04h], 0000001Dh 0x00000037 inc edi 0x00000038 push edi 0x00000039 ret 0x0000003a pop edi 0x0000003b ret 0x0000003c mov di, 339Bh 0x00000040 push 8B8F3EF4h 0x00000045 jmp 00007F3704502858h 0x0000004a add dword ptr [esp], 3470C10Ch 0x00000051 xor dword ptr [ebp+122D294Eh], ebx 0x00000057 lea ebx, dword ptr [ebp+12454EE9h] 0x0000005d mov dword ptr [ebp+122D31E0h], edx 0x00000063 xchg eax, ebx 0x00000064 push edx 0x00000065 pushad 0x00000066 push ebx 0x00000067 pop ebx 0x00000068 push eax 0x00000069 push edx 0x0000006a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55F3AA second address: 55F415 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edi 0x00000008 nop 0x00000009 mov edx, dword ptr [ebp+122D1D7Bh] 0x0000000f sbb dx, 16B5h 0x00000014 push 00000000h 0x00000016 mov ecx, 3E70162Fh 0x0000001b push 2A153FA4h 0x00000020 jns 00007F3704EAC2C0h 0x00000026 xor dword ptr [esp], 2A153F24h 0x0000002d pushad 0x0000002e mov edx, dword ptr [ebp+122D1F74h] 0x00000034 push edx 0x00000035 mov eax, dword ptr [ebp+122D37B1h] 0x0000003b pop edx 0x0000003c popad 0x0000003d push 00000003h 0x0000003f mov edx, dword ptr [ebp+122D37F5h] 0x00000045 mov edi, dword ptr [ebp+122D38D1h] 0x0000004b push 00000000h 0x0000004d mov dh, D9h 0x0000004f push 00000003h 0x00000051 sub dword ptr [ebp+122D270Bh], edi 0x00000057 push B1C67D00h 0x0000005c pushad 0x0000005d push eax 0x0000005e push edx 0x0000005f push eax 0x00000060 push edx 0x00000061 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55F415 second address: 55F419 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 55F419 second address: 55F431 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3704EAC2C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 57E01D second address: 57E043 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop ebx 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a jnl 00007F3704502846h 0x00000010 jmp 00007F370450284Fh 0x00000015 jnp 00007F3704502846h 0x0000001b popad 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 57E043 second address: 57E048 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 57E1CA second address: 57E1CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 57E1CE second address: 57E1D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 57E507 second address: 57E50B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 57E50B second address: 57E50F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 57E6A5 second address: 57E6B5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F370450284Ah 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 57E6B5 second address: 57E6DE instructions: 0x00000000 rdtsc 0x00000002 jl 00007F3704EAC2B6h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F3704EAC2C9h 0x00000013 push edi 0x00000014 pop edi 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 57E895 second address: 57E8D7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3704502851h 0x00000007 jmp 00007F3704502858h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jmp 00007F3704502855h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 57EA36 second address: 57EA64 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3704EAC2C1h 0x00000007 jmp 00007F3704EAC2C9h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 57EBFB second address: 57EBFF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 57ED81 second address: 57ED85 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 57F2E8 second address: 57F2EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 57F2EC second address: 57F2F0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 553224 second address: 553228 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 553228 second address: 553244 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jnp 00007F3704EAC2BEh 0x0000000e jc 00007F3704EAC2B6h 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 553244 second address: 553257 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jmp 00007F370450284Ch 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 57F44F second address: 57F459 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F3704EAC2BCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 57FE83 second address: 57FE9D instructions: 0x00000000 rdtsc 0x00000002 js 00007F3704502846h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F370450284Eh 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58014D second address: 580153 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 580153 second address: 580180 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 jmp 00007F3704502859h 0x0000000b jc 00007F3704502846h 0x00000011 pop eax 0x00000012 pop esi 0x00000013 push eax 0x00000014 push edx 0x00000015 push edi 0x00000016 pushad 0x00000017 popad 0x00000018 pop edi 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 582820 second address: 582844 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 pushad 0x00000007 pushad 0x00000008 jmp 00007F3704EAC2C5h 0x0000000d push eax 0x0000000e pop eax 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 582844 second address: 58286D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3704502857h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 jng 00007F3704502846h 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 586D20 second address: 586D24 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 586D24 second address: 586D2A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58B2E0 second address: 58B2E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58B2E9 second address: 58B2EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58B2EF second address: 58B2F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58B2F3 second address: 58B308 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop esi 0x00000009 js 00007F370450286Eh 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 pop eax 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58A7BD second address: 58A7DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jmp 00007F3704EAC2C6h 0x0000000b popad 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58A7DA second address: 58A7E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jno 00007F3704502846h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58AA85 second address: 58AAC5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3704EAC2BCh 0x00000007 js 00007F3704EAC2BAh 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 pop edx 0x00000012 pop eax 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F3704EAC2C3h 0x0000001b jmp 00007F3704EAC2C0h 0x00000020 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58AAC5 second address: 58AACF instructions: 0x00000000 rdtsc 0x00000002 jne 00007F3704502846h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58AACF second address: 58AAEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007F3704EAC2C3h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58B018 second address: 58B01D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58B01D second address: 58B028 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jc 00007F3704EAC2B6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58B028 second address: 58B043 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 jmp 00007F370450284Eh 0x0000000b pop ebx 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push ecx 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58C08F second address: 58C0B2 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F3704EAC2B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b push eax 0x0000000c pushad 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F3704EAC2BEh 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58C10F second address: 58C115 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58CC6F second address: 58CC73 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58CC73 second address: 58CC79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58CC79 second address: 58CC7E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58CD29 second address: 58CD2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58CE1C second address: 58CE22 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58CE22 second address: 58CE26 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58CF70 second address: 58CF7E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F3704EAC2BAh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58D888 second address: 58D88F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58D88F second address: 58D894 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58D894 second address: 58D8A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58D8A2 second address: 58D8A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58D8A6 second address: 58D8B7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F370450284Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58E267 second address: 58E2D3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3704EAC2C6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a push eax 0x0000000b jmp 00007F3704EAC2BAh 0x00000010 nop 0x00000011 mov dword ptr [ebp+122D1CE2h], edi 0x00000017 push 00000000h 0x00000019 push 00000000h 0x0000001b push ebp 0x0000001c call 00007F3704EAC2B8h 0x00000021 pop ebp 0x00000022 mov dword ptr [esp+04h], ebp 0x00000026 add dword ptr [esp+04h], 0000001Bh 0x0000002e inc ebp 0x0000002f push ebp 0x00000030 ret 0x00000031 pop ebp 0x00000032 ret 0x00000033 cmc 0x00000034 push 00000000h 0x00000036 xchg eax, ebx 0x00000037 push eax 0x00000038 push edx 0x00000039 jnp 00007F3704EAC2C4h 0x0000003f jmp 00007F3704EAC2BEh 0x00000044 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58E2D3 second address: 58E2F7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jns 00007F3704502846h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f pushad 0x00000010 jmp 00007F370450284Ch 0x00000015 push eax 0x00000016 push edx 0x00000017 jg 00007F3704502846h 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58F343 second address: 58F347 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58EB85 second address: 58EB89 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58F347 second address: 58F34D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 58FE71 second address: 58FEFC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jc 00007F3704502846h 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edi 0x0000000e pushad 0x0000000f jc 00007F3704502846h 0x00000015 pushad 0x00000016 popad 0x00000017 popad 0x00000018 pop edi 0x00000019 nop 0x0000001a push 00000000h 0x0000001c push ebp 0x0000001d call 00007F3704502848h 0x00000022 pop ebp 0x00000023 mov dword ptr [esp+04h], ebp 0x00000027 add dword ptr [esp+04h], 00000019h 0x0000002f inc ebp 0x00000030 push ebp 0x00000031 ret 0x00000032 pop ebp 0x00000033 ret 0x00000034 adc si, CDBBh 0x00000039 push 00000000h 0x0000003b pushad 0x0000003c mov edi, dword ptr [ebp+122D378Dh] 0x00000042 jno 00007F370450284Ch 0x00000048 mov edi, dword ptr [ebp+122D2C1Fh] 0x0000004e popad 0x0000004f push 00000000h 0x00000051 mov dword ptr [ebp+122D35DCh], esi 0x00000057 xchg eax, ebx 0x00000058 pushad 0x00000059 jc 00007F3704502854h 0x0000005f je 00007F370450284Ch 0x00000065 jno 00007F3704502846h 0x0000006b popad 0x0000006c push eax 0x0000006d push eax 0x0000006e push eax 0x0000006f push edx 0x00000070 jnc 00007F3704502846h 0x00000076 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 590990 second address: 590995 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 590995 second address: 5909BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F370450284Eh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F3704502851h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5909BE second address: 590A4D instructions: 0x00000000 rdtsc 0x00000002 jc 00007F3704EAC2BCh 0x00000008 jng 00007F3704EAC2B6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 nop 0x00000011 push 00000000h 0x00000013 push edx 0x00000014 call 00007F3704EAC2B8h 0x00000019 pop edx 0x0000001a mov dword ptr [esp+04h], edx 0x0000001e add dword ptr [esp+04h], 00000019h 0x00000026 inc edx 0x00000027 push edx 0x00000028 ret 0x00000029 pop edx 0x0000002a ret 0x0000002b push 00000000h 0x0000002d push 00000000h 0x0000002f push ebx 0x00000030 call 00007F3704EAC2B8h 0x00000035 pop ebx 0x00000036 mov dword ptr [esp+04h], ebx 0x0000003a add dword ptr [esp+04h], 00000014h 0x00000042 inc ebx 0x00000043 push ebx 0x00000044 ret 0x00000045 pop ebx 0x00000046 ret 0x00000047 mov si, bx 0x0000004a push 00000000h 0x0000004c push 00000000h 0x0000004e push edx 0x0000004f call 00007F3704EAC2B8h 0x00000054 pop edx 0x00000055 mov dword ptr [esp+04h], edx 0x00000059 add dword ptr [esp+04h], 00000018h 0x00000061 inc edx 0x00000062 push edx 0x00000063 ret 0x00000064 pop edx 0x00000065 ret 0x00000066 mov di, F3ECh 0x0000006a push eax 0x0000006b push eax 0x0000006c push edx 0x0000006d ja 00007F3704EAC2C3h 0x00000073 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 590A4D second address: 590A57 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnl 00007F3704502846h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5994CF second address: 5994D5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59A47C second address: 59A480 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59A523 second address: 59A534 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F3704EAC2BCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5984E9 second address: 5985AB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3704502850h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push dword ptr fs:[00000000h] 0x00000013 push 00000000h 0x00000015 push esi 0x00000016 call 00007F3704502848h 0x0000001b pop esi 0x0000001c mov dword ptr [esp+04h], esi 0x00000020 add dword ptr [esp+04h], 0000001Bh 0x00000028 inc esi 0x00000029 push esi 0x0000002a ret 0x0000002b pop esi 0x0000002c ret 0x0000002d adc di, 8AFAh 0x00000032 mov dword ptr fs:[00000000h], esp 0x00000039 ja 00007F370450284Ch 0x0000003f mov dword ptr [ebp+122D351Fh], ecx 0x00000045 mov eax, dword ptr [ebp+122D05B9h] 0x0000004b push 00000000h 0x0000004d push eax 0x0000004e call 00007F3704502848h 0x00000053 pop eax 0x00000054 mov dword ptr [esp+04h], eax 0x00000058 add dword ptr [esp+04h], 00000018h 0x00000060 inc eax 0x00000061 push eax 0x00000062 ret 0x00000063 pop eax 0x00000064 ret 0x00000065 mov bx, 7915h 0x00000069 push FFFFFFFFh 0x0000006b xor edi, 2E0F3D95h 0x00000071 nop 0x00000072 jnl 00007F3704502858h 0x00000078 push eax 0x00000079 push eax 0x0000007a push edx 0x0000007b push eax 0x0000007c push edx 0x0000007d jmp 00007F3704502859h 0x00000082 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5985AB second address: 5985B1 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5985B1 second address: 5985B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5985B7 second address: 5985BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 545C1B second address: 545C29 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F3704502846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59A663 second address: 59A6EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F3704EAC2B6h 0x0000000a popad 0x0000000b pop ecx 0x0000000c mov dword ptr [esp], eax 0x0000000f adc bx, 7827h 0x00000014 push dword ptr fs:[00000000h] 0x0000001b push 00000000h 0x0000001d push eax 0x0000001e call 00007F3704EAC2B8h 0x00000023 pop eax 0x00000024 mov dword ptr [esp+04h], eax 0x00000028 add dword ptr [esp+04h], 00000015h 0x00000030 inc eax 0x00000031 push eax 0x00000032 ret 0x00000033 pop eax 0x00000034 ret 0x00000035 add ebx, dword ptr [ebp+122D27BCh] 0x0000003b mov dword ptr fs:[00000000h], esp 0x00000042 cmc 0x00000043 mov eax, dword ptr [ebp+122D0325h] 0x00000049 push 00000000h 0x0000004b push edi 0x0000004c call 00007F3704EAC2B8h 0x00000051 pop edi 0x00000052 mov dword ptr [esp+04h], edi 0x00000056 add dword ptr [esp+04h], 00000016h 0x0000005e inc edi 0x0000005f push edi 0x00000060 ret 0x00000061 pop edi 0x00000062 ret 0x00000063 mov edi, dword ptr [ebp+122D27E0h] 0x00000069 push FFFFFFFFh 0x0000006b add ebx, 491DB538h 0x00000071 push eax 0x00000072 push eax 0x00000073 push edx 0x00000074 jmp 00007F3704EAC2C1h 0x00000079 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5985BB second address: 5985BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59A6EF second address: 59A6F4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59DB4E second address: 59DB58 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F3704502846h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59DB58 second address: 59DBC0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3704EAC2C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007F3704EAC2C2h 0x00000011 nop 0x00000012 clc 0x00000013 push 00000000h 0x00000015 or ebx, 284F1136h 0x0000001b push 00000000h 0x0000001d push 00000000h 0x0000001f push edi 0x00000020 call 00007F3704EAC2B8h 0x00000025 pop edi 0x00000026 mov dword ptr [esp+04h], edi 0x0000002a add dword ptr [esp+04h], 00000019h 0x00000032 inc edi 0x00000033 push edi 0x00000034 ret 0x00000035 pop edi 0x00000036 ret 0x00000037 add di, 9499h 0x0000003c mov dword ptr [ebp+122D3485h], ebx 0x00000042 push eax 0x00000043 pushad 0x00000044 push eax 0x00000045 push edx 0x00000046 pushad 0x00000047 popad 0x00000048 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59DBC0 second address: 59DBCA instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59DBCA second address: 59DBCE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59EB0A second address: 59EB10 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59EB10 second address: 59EB14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59DCB6 second address: 59DCBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59EB14 second address: 59EB36 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a push edi 0x0000000b jl 00007F3704EAC2B6h 0x00000011 pop edi 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F3704EAC2BEh 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59EB36 second address: 59EBA6 instructions: 0x00000000 rdtsc 0x00000002 js 00007F3704502846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b nop 0x0000000c stc 0x0000000d push 00000000h 0x0000000f push 00000000h 0x00000011 push eax 0x00000012 call 00007F3704502848h 0x00000017 pop eax 0x00000018 mov dword ptr [esp+04h], eax 0x0000001c add dword ptr [esp+04h], 00000015h 0x00000024 inc eax 0x00000025 push eax 0x00000026 ret 0x00000027 pop eax 0x00000028 ret 0x00000029 add ebx, dword ptr [ebp+122D2986h] 0x0000002f mov edi, dword ptr [ebp+122D359Bh] 0x00000035 push 00000000h 0x00000037 mov dword ptr [ebp+122D311Ah], esi 0x0000003d xchg eax, esi 0x0000003e je 00007F3704502850h 0x00000044 pushad 0x00000045 push edi 0x00000046 pop edi 0x00000047 jns 00007F3704502846h 0x0000004d popad 0x0000004e push eax 0x0000004f push eax 0x00000050 push edx 0x00000051 pushad 0x00000052 jmp 00007F3704502858h 0x00000057 pushad 0x00000058 popad 0x00000059 popad 0x0000005a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59DCBA second address: 59DD65 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F3704EAC2B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a je 00007F3704EAC2C5h 0x00000010 jmp 00007F3704EAC2BFh 0x00000015 popad 0x00000016 mov dword ptr [esp], eax 0x00000019 jmp 00007F3704EAC2BDh 0x0000001e push dword ptr fs:[00000000h] 0x00000025 mov dword ptr fs:[00000000h], esp 0x0000002c push 00000000h 0x0000002e push edx 0x0000002f call 00007F3704EAC2B8h 0x00000034 pop edx 0x00000035 mov dword ptr [esp+04h], edx 0x00000039 add dword ptr [esp+04h], 00000018h 0x00000041 inc edx 0x00000042 push edx 0x00000043 ret 0x00000044 pop edx 0x00000045 ret 0x00000046 push edi 0x00000047 pop ebx 0x00000048 add dword ptr [ebp+122D2E11h], eax 0x0000004e mov eax, dword ptr [ebp+122D0B35h] 0x00000054 push ebx 0x00000055 mov ebx, dword ptr [ebp+122D28E5h] 0x0000005b pop edi 0x0000005c mov edi, 3CF9B027h 0x00000061 push FFFFFFFFh 0x00000063 push 00000000h 0x00000065 push ebp 0x00000066 call 00007F3704EAC2B8h 0x0000006b pop ebp 0x0000006c mov dword ptr [esp+04h], ebp 0x00000070 add dword ptr [esp+04h], 0000001Ch 0x00000078 inc ebp 0x00000079 push ebp 0x0000007a ret 0x0000007b pop ebp 0x0000007c ret 0x0000007d mov ebx, dword ptr [ebp+122D1EDBh] 0x00000083 nop 0x00000084 push eax 0x00000085 push edx 0x00000086 push eax 0x00000087 push eax 0x00000088 push edx 0x00000089 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59EBA6 second address: 59EBAC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59DD65 second address: 59DD6A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59EBAC second address: 59EBB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59DD6A second address: 59DD74 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F3704EAC2B6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59DD74 second address: 59DD78 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59DD78 second address: 59DD86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59FD09 second address: 59FD0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A1AF7 second address: 5A1AFB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A1AFB second address: 5A1B1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F3704502856h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A1B1C second address: 5A1B20 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A1B20 second address: 5A1B29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A1B29 second address: 5A1B2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A1B2F second address: 5A1BAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 nop 0x00000007 jmp 00007F3704502852h 0x0000000c push 00000000h 0x0000000e push 00000000h 0x00000010 push ecx 0x00000011 call 00007F3704502848h 0x00000016 pop ecx 0x00000017 mov dword ptr [esp+04h], ecx 0x0000001b add dword ptr [esp+04h], 0000001Dh 0x00000023 inc ecx 0x00000024 push ecx 0x00000025 ret 0x00000026 pop ecx 0x00000027 ret 0x00000028 push 00000000h 0x0000002a push 00000000h 0x0000002c push ebp 0x0000002d call 00007F3704502848h 0x00000032 pop ebp 0x00000033 mov dword ptr [esp+04h], ebp 0x00000037 add dword ptr [esp+04h], 0000001Bh 0x0000003f inc ebp 0x00000040 push ebp 0x00000041 ret 0x00000042 pop ebp 0x00000043 ret 0x00000044 xchg eax, esi 0x00000045 push eax 0x00000046 push eax 0x00000047 push edx 0x00000048 jmp 00007F3704502857h 0x0000004d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A2A88 second address: 5A2AEA instructions: 0x00000000 rdtsc 0x00000002 jc 00007F3704EAC2C1h 0x00000008 jmp 00007F3704EAC2BBh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 jmp 00007F3704EAC2C7h 0x00000015 nop 0x00000016 sub dword ptr [ebp+122D35A2h], edx 0x0000001c mov edi, 5DB7B3B1h 0x00000021 push 00000000h 0x00000023 and ebx, dword ptr [ebp+122D1DA1h] 0x00000029 push 00000000h 0x0000002b jmp 00007F3704EAC2C8h 0x00000030 xchg eax, esi 0x00000031 push eax 0x00000032 push edx 0x00000033 push eax 0x00000034 push edx 0x00000035 push esi 0x00000036 pop esi 0x00000037 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A2AEA second address: 5A2AEE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A2AEE second address: 5A2AF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A6959 second address: 5A6967 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edi 0x0000000c pop edi 0x0000000d pop eax 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A6967 second address: 5A696C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A5BCA second address: 5A5BDE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F3704502850h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A5BDE second address: 5A5C6F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b call 00007F3704EAC2C2h 0x00000010 mov ebx, edx 0x00000012 pop edi 0x00000013 push dword ptr fs:[00000000h] 0x0000001a mov dword ptr fs:[00000000h], esp 0x00000021 jbe 00007F3704EAC2B8h 0x00000027 mov bh, al 0x00000029 mov eax, dword ptr [ebp+122D110Dh] 0x0000002f push 00000000h 0x00000031 push ebp 0x00000032 call 00007F3704EAC2B8h 0x00000037 pop ebp 0x00000038 mov dword ptr [esp+04h], ebp 0x0000003c add dword ptr [esp+04h], 00000019h 0x00000044 inc ebp 0x00000045 push ebp 0x00000046 ret 0x00000047 pop ebp 0x00000048 ret 0x00000049 mov ebx, dword ptr [ebp+12465D84h] 0x0000004f mov edi, esi 0x00000051 push FFFFFFFFh 0x00000053 sub ebx, 47FE0AEEh 0x00000059 nop 0x0000005a push eax 0x0000005b push edx 0x0000005c pushad 0x0000005d jmp 00007F3704EAC2C9h 0x00000062 jc 00007F3704EAC2B6h 0x00000068 popad 0x00000069 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A5C6F second address: 5A5C8F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3704502856h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A5C8F second address: 5A5C93 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5A5C93 second address: 5A5C9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5AFC11 second address: 5AFC33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F3704EAC2C8h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5AFC33 second address: 5AFC48 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F370450284Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5AFC48 second address: 5AFC4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5BA0DF second address: 5BA0E3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5BA0E3 second address: 5BA0F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 jo 00007F3704EAC2B6h 0x0000000f pop ecx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C3876 second address: 5C3880 instructions: 0x00000000 rdtsc 0x00000002 je 00007F3704502846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C3880 second address: 5C3886 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C98D9 second address: 5C98DE instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C98DE second address: 5C98F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 jmp 00007F3704EAC2BCh 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C871E second address: 5C8723 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C8723 second address: 5C8731 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F3704EAC2B8h 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b pop edi 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C8D29 second address: 5C8D42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F370450284Eh 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C8D42 second address: 5C8D46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C8D46 second address: 5C8D4C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5C8EC6 second address: 5C8ED4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jns 00007F3704EAC2B6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CDAD7 second address: 5CDADF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push esi 0x00000007 pop esi 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CDADF second address: 5CDAE5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CDAE5 second address: 5CDB02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnc 00007F3704502848h 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jns 00007F370450284Ch 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CDB02 second address: 5CDB33 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F3704EAC2C9h 0x00000008 push edx 0x00000009 pop edx 0x0000000a jmp 00007F3704EAC2BDh 0x0000000f popad 0x00000010 push eax 0x00000011 push esi 0x00000012 pop esi 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59545A second address: 59545E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59545E second address: 595468 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F3704EAC2B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 595468 second address: 595477 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F370450284Bh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 595477 second address: 575FE1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3704EAC2C0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e movsx edx, ax 0x00000011 call dword ptr [ebp+122D1DABh] 0x00000017 jno 00007F3704EAC2D6h 0x0000001d pushad 0x0000001e jmp 00007F3704EAC2C6h 0x00000023 push eax 0x00000024 push edx 0x00000025 pushad 0x00000026 popad 0x00000027 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59594A second address: 595950 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 595950 second address: 3DDB5C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 mov cl, 25h 0x0000000b push dword ptr [ebp+122D16E1h] 0x00000011 movsx edx, di 0x00000014 call dword ptr [ebp+122D1D95h] 0x0000001a pushad 0x0000001b jmp 00007F3704EAC2C4h 0x00000020 xor eax, eax 0x00000022 sub dword ptr [ebp+122D1D76h], ebx 0x00000028 mov dword ptr [ebp+122D1D76h], esi 0x0000002e mov edx, dword ptr [esp+28h] 0x00000032 cld 0x00000033 cld 0x00000034 mov dword ptr [ebp+122D37E5h], eax 0x0000003a jno 00007F3704EAC2BCh 0x00000040 mov esi, 0000003Ch 0x00000045 mov dword ptr [ebp+122D1E60h], edx 0x0000004b stc 0x0000004c add esi, dword ptr [esp+24h] 0x00000050 ja 00007F3704EAC2BCh 0x00000056 lodsw 0x00000058 mov dword ptr [ebp+122D2673h], edi 0x0000005e jmp 00007F3704EAC2BBh 0x00000063 add eax, dword ptr [esp+24h] 0x00000067 pushad 0x00000068 mov dx, si 0x0000006b sub dl, FFFFFFB8h 0x0000006e popad 0x0000006f mov ebx, dword ptr [esp+24h] 0x00000073 stc 0x00000074 pushad 0x00000075 mov ecx, dword ptr [ebp+122D38D9h] 0x0000007b push ebx 0x0000007c mov edi, dword ptr [ebp+122D37C9h] 0x00000082 pop eax 0x00000083 popad 0x00000084 nop 0x00000085 push eax 0x00000086 push edx 0x00000087 jmp 00007F3704EAC2BCh 0x0000008c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 595A3B second address: 595A4C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jng 00007F3704502846h 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e push esi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 595AEC second address: 595AF3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 595AF3 second address: 595B12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xor dword ptr [esp], 5B1418FBh 0x0000000e or edx, dword ptr [ebp+122D267Ah] 0x00000014 push 5F55FAF3h 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push esi 0x0000001d pop esi 0x0000001e pop eax 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 595D54 second address: 595D58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 595D58 second address: 595D66 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F3704502846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 595D66 second address: 595D6A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 595E78 second address: 595F07 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push ecx 0x0000000d call 00007F3704502848h 0x00000012 pop ecx 0x00000013 mov dword ptr [esp+04h], ecx 0x00000017 add dword ptr [esp+04h], 0000001Dh 0x0000001f inc ecx 0x00000020 push ecx 0x00000021 ret 0x00000022 pop ecx 0x00000023 ret 0x00000024 sub dword ptr [ebp+122D577Dh], ebx 0x0000002a jmp 00007F3704502850h 0x0000002f push 00000004h 0x00000031 push 00000000h 0x00000033 push edi 0x00000034 call 00007F3704502848h 0x00000039 pop edi 0x0000003a mov dword ptr [esp+04h], edi 0x0000003e add dword ptr [esp+04h], 00000019h 0x00000046 inc edi 0x00000047 push edi 0x00000048 ret 0x00000049 pop edi 0x0000004a ret 0x0000004b or edi, dword ptr [ebp+122D3729h] 0x00000051 mov dword ptr [ebp+122D28E5h], esi 0x00000057 je 00007F3704502849h 0x0000005d mov cx, dx 0x00000060 nop 0x00000061 pushad 0x00000062 jl 00007F3704502848h 0x00000068 push eax 0x00000069 pop eax 0x0000006a push eax 0x0000006b push edx 0x0000006c jp 00007F3704502846h 0x00000072 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5962A6 second address: 5962AC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5962AC second address: 5962C3 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jo 00007F3704502846h 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jne 00007F3704502846h 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5962C3 second address: 5962CD instructions: 0x00000000 rdtsc 0x00000002 ja 00007F3704EAC2B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59674E second address: 596760 instructions: 0x00000000 rdtsc 0x00000002 js 00007F3704502846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jp 00007F3704502846h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CE081 second address: 5CE097 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jmp 00007F3704EAC2C0h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CE097 second address: 5CE09C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CE4A2 second address: 5CE4A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 54FC2E second address: 54FC33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D42E8 second address: 5D42F5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D460B second address: 5D4611 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D4611 second address: 5D461A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D4799 second address: 5D479F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D479F second address: 5D47A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D47A5 second address: 5D47A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D4CCF second address: 5D4CD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D4E4A second address: 5D4E59 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F3704502846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D4FD6 second address: 5D4FDE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D4FDE second address: 5D4FF4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jg 00007F3704502846h 0x00000009 pushad 0x0000000a popad 0x0000000b push edi 0x0000000c pop edi 0x0000000d popad 0x0000000e js 00007F3704502859h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DB352 second address: 5DB366 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F3704EAC2B6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jc 00007F3704EAC2BCh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D9F65 second address: 5D9F6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D9F6B second address: 5D9F6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DA0C1 second address: 5DA0C7 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DA0C7 second address: 5DA0CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DA0CD second address: 5DA0FD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F370450284Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jns 00007F3704502846h 0x00000012 jmp 00007F3704502854h 0x00000017 popad 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DA2A4 second address: 5DA2A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DA2A8 second address: 5DA2C9 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F3704502846h 0x00000008 jmp 00007F370450284Dh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jp 00007F370450284Ah 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DA529 second address: 5DA52D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DA52D second address: 5DA531 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DA531 second address: 5DA53A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DA53A second address: 5DA554 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3704502854h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DA554 second address: 5DA594 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 je 00007F3704EAC2D4h 0x0000000e jmp 00007F3704EAC2C4h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DA594 second address: 5DA59D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DA59D second address: 5DA5A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DA730 second address: 5DA74C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F370450284Ch 0x00000009 jmp 00007F370450284Bh 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DA74C second address: 5DA77B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3704EAC2C4h 0x00000007 jo 00007F3704EAC2CDh 0x0000000d jmp 00007F3704EAC2C1h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DAB81 second address: 5DAB94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 jnp 00007F3704502846h 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DAB94 second address: 5DAB9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DAB9A second address: 5DAB9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DAD20 second address: 5DAD44 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3704EAC2BEh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ebx 0x0000000c jmp 00007F3704EAC2BCh 0x00000011 push esi 0x00000012 pop esi 0x00000013 pop ebx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DB06D second address: 5DB07B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push edi 0x00000007 ja 00007F3704502846h 0x0000000d pop edi 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DE6BD second address: 5DE6C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DE6C1 second address: 5DE6C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5DE6C5 second address: 5DE6CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E426A second address: 5E427E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F370450284Eh 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E427E second address: 5E4283 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E44F2 second address: 5E44F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E5E86 second address: 5E5E8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E7EB7 second address: 5E7EDC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F370450284Ch 0x00000007 jg 00007F3704502850h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E7EDC second address: 5E7F0E instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jno 00007F3704EAC2B6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ebx 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007F3704EAC2C0h 0x00000014 pop ebx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F3704EAC2C0h 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E7F0E second address: 5E7F12 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EA53A second address: 5EA55A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F3704EAC2C1h 0x00000008 jmp 00007F3704EAC2BAh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EEFF0 second address: 5EEFF6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 540AC3 second address: 540ACB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EE3CC second address: 5EE402 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3704502858h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F370450284Ah 0x0000000f pushad 0x00000010 jmp 00007F370450284Dh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EE826 second address: 5EE82B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EE82B second address: 5EE831 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5F1A95 second address: 5F1A9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5F7DF8 second address: 5F7DFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 596097 second address: 59610B instructions: 0x00000000 rdtsc 0x00000002 jl 00007F3704EAC2B8h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f jmp 00007F3704EAC2C7h 0x00000014 mov ebx, dword ptr [ebp+1248B1C0h] 0x0000001a sub ecx, dword ptr [ebp+12452EC9h] 0x00000020 add eax, ebx 0x00000022 mov dword ptr [ebp+122D2212h], ecx 0x00000028 jmp 00007F3704EAC2C6h 0x0000002d push eax 0x0000002e push ecx 0x0000002f jns 00007F3704EAC2BCh 0x00000035 pop ecx 0x00000036 mov dword ptr [esp], eax 0x00000039 push 00000004h 0x0000003b sub dword ptr [ebp+122D1E1Bh], ebx 0x00000041 nop 0x00000042 jg 00007F3704EAC2CBh 0x00000048 pushad 0x00000049 push eax 0x0000004a push edx 0x0000004b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 59610B second address: 596124 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F370450284Dh 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 596124 second address: 596128 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 596128 second address: 59612E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5F7A6B second address: 5F7AA2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3704EAC2C0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F3704EAC2C9h 0x0000000e push eax 0x0000000f push edx 0x00000010 ja 00007F3704EAC2B6h 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 600203 second address: 600207 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 600207 second address: 60020D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5FE185 second address: 5FE193 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5FE193 second address: 5FE197 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5FE197 second address: 5FE1A5 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5FE1A5 second address: 5FE1A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5FE2FF second address: 5FE305 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5FE305 second address: 5FE30A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5FE30A second address: 5FE30F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5FF285 second address: 5FF2B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3704EAC2C8h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007F3704EAC2BBh 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5FF2B1 second address: 5FF2CB instructions: 0x00000000 rdtsc 0x00000002 jo 00007F3704502846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F370450284Ch 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5FF2CB second address: 5FF2CF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 604C95 second address: 604C99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 608C8C second address: 608C90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 608C90 second address: 608C9A instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F3704502846h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 607DE2 second address: 607DE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 607F40 second address: 607F44 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 607F44 second address: 607F4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60808E second address: 608092 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 608092 second address: 6080A3 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F3704EAC2B6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6081E3 second address: 6081EE instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6081EE second address: 6081F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6081F5 second address: 608200 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jg 00007F3704502846h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60863F second address: 60868B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F3704EAC2BEh 0x00000008 push eax 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e pushad 0x0000000f popad 0x00000010 pop eax 0x00000011 pop edx 0x00000012 pop eax 0x00000013 pushad 0x00000014 ja 00007F3704EAC2D1h 0x0000001a push eax 0x0000001b push edx 0x0000001c jc 00007F3704EAC2B6h 0x00000022 jno 00007F3704EAC2B6h 0x00000028 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 608847 second address: 60884B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 608997 second address: 6089A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jc 00007F3704EAC2B6h 0x0000000c jnl 00007F3704EAC2B6h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6089A9 second address: 6089D8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F3704502850h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop eax 0x0000000c pushad 0x0000000d ja 00007F370450284Eh 0x00000013 pushad 0x00000014 jc 00007F3704502846h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6089D8 second address: 6089DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6089DE second address: 6089E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 611276 second address: 611285 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F3704EAC2B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 611285 second address: 6112A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jnp 00007F370450284Eh 0x0000000b jnc 00007F3704502846h 0x00000011 push edi 0x00000012 pop edi 0x00000013 popad 0x00000014 push ebx 0x00000015 ja 00007F370450284Ah 0x0000001b pushad 0x0000001c popad 0x0000001d pushad 0x0000001e popad 0x0000001f push eax 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6112A8 second address: 6112B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F3704EAC2B6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6116C9 second address: 6116CE instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6116CE second address: 611737 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop ecx 0x00000007 pushad 0x00000008 jmp 00007F3704EAC2C7h 0x0000000d jnl 00007F3704EAC2B6h 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 push ecx 0x00000019 pushad 0x0000001a push ecx 0x0000001b pop ecx 0x0000001c jp 00007F3704EAC2B6h 0x00000022 jmp 00007F3704EAC2C9h 0x00000027 jmp 00007F3704EAC2C1h 0x0000002c popad 0x0000002d push eax 0x0000002e push edx 0x0000002f ja 00007F3704EAC2B6h 0x00000035 push eax 0x00000036 push edx 0x00000037 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 611737 second address: 61173B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61173B second address: 611749 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3704EAC2BAh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6118CE second address: 6118E4 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jp 00007F3704502848h 0x0000000c jnp 00007F3704502852h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6118E4 second address: 6118EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 611C60 second address: 611C66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 611F47 second address: 611F4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 611F4D second address: 611F51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6120AA second address: 6120C3 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007F3704EAC2C3h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61226C second address: 612273 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6196CC second address: 6196FD instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F3704EAC2D5h 0x00000008 push eax 0x00000009 push edx 0x0000000a js 00007F3704EAC2B6h 0x00000010 push edi 0x00000011 pop edi 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 626A41 second address: 626A5A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F370450284Fh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 626A5A second address: 626A5E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 626581 second address: 626587 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 626587 second address: 6265A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 jmp 00007F3704EAC2C1h 0x0000000b je 00007F3704EAC2B6h 0x00000011 popad 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6265A5 second address: 6265AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6265AB second address: 6265AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6265AF second address: 6265C7 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F3704502846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 jns 00007F3704502846h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6265C7 second address: 6265D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6265D2 second address: 6265D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6265D6 second address: 6265DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 626736 second address: 626758 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 ja 00007F3704502846h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jnp 00007F3704502853h 0x00000012 push edi 0x00000013 pop edi 0x00000014 jmp 00007F370450284Bh 0x00000019 push ecx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6295CD second address: 6295D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6295D6 second address: 6295DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6295DA second address: 6295ED instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F3704EAC2B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b jnp 00007F3704EAC2B6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6295ED second address: 629602 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F370450284Ch 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62F8B1 second address: 62F8C0 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jc 00007F3704EAC2B6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62F8C0 second address: 62F8C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 63373F second address: 633758 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3704EAC2C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a pushad 0x0000000b popad 0x0000000c pop ecx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 633758 second address: 63377A instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007F370450284Ah 0x00000008 pop edx 0x00000009 pushad 0x0000000a jmp 00007F3704502851h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 63377A second address: 6337B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 jl 00007F3704EAC2CBh 0x0000000e jmp 00007F3704EAC2C5h 0x00000013 jmp 00007F3704EAC2C1h 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6337B2 second address: 6337B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6337B8 second address: 6337BE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6484A4 second address: 6484A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6484A9 second address: 6484B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F3704EAC2BAh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6484B7 second address: 6484D5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F370450284Eh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push edx 0x00000010 push eax 0x00000011 pop eax 0x00000012 push eax 0x00000013 pop eax 0x00000014 pop edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5517C7 second address: 5517D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5517D0 second address: 5517D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6470C1 second address: 6470F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3704EAC2C9h 0x00000009 push edx 0x0000000a pop edx 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F3704EAC2C3h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6470F6 second address: 647102 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 647102 second address: 647106 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 647106 second address: 647121 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F3704502853h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 647121 second address: 647125 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 647125 second address: 647142 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F3704502854h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 647142 second address: 647148 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 647148 second address: 647152 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F3704502846h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 647152 second address: 647156 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 647294 second address: 6472A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jnl 00007F3704502846h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6472A0 second address: 6472A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6472A4 second address: 6472D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 jmp 00007F3704502857h 0x0000000e pop edx 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 jo 00007F370450284Ch 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6472D1 second address: 6472D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6472D5 second address: 6472DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6472DB second address: 6472DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 647596 second address: 6475AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3704502853h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6475AF second address: 6475B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6475B7 second address: 6475BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6475BC second address: 6475D2 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jne 00007F3704EAC2B6h 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jl 00007F3704EAC2DFh 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6475D2 second address: 6475D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 647890 second address: 6478B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F3704EAC2B8h 0x0000000a jmp 00007F3704EAC2C5h 0x0000000f push ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64D6C7 second address: 64D6FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3704502852h 0x00000009 popad 0x0000000a pushad 0x0000000b jmp 00007F3704502853h 0x00000010 push edx 0x00000011 pop edx 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 pop eax 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64D6FB second address: 64D6FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64D20C second address: 64D210 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64D210 second address: 64D214 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64D214 second address: 64D231 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3704502852h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64D39B second address: 64D3B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F3704EAC2C3h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64D3B7 second address: 64D3BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64D3BF second address: 64D3C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 66910E second address: 669131 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F370450284Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a jo 00007F3704502848h 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 jbe 00007F370450284Ch 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 668FA7 second address: 668FAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 668FAB second address: 668FC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F370450284Dh 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 668FC1 second address: 668FC6 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 66AD47 second address: 66AD57 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F3704502846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 66AEC2 second address: 66AEF6 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F3704EAC2D9h 0x00000008 pushad 0x00000009 jc 00007F3704EAC2B6h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 66AEF6 second address: 66AF42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F370450284Ch 0x00000009 jmp 00007F3704502850h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 pushad 0x00000012 pushad 0x00000013 jmp 00007F370450284Ch 0x00000018 push edx 0x00000019 pop edx 0x0000001a push eax 0x0000001b pop eax 0x0000001c popad 0x0000001d jmp 00007F3704502852h 0x00000022 push eax 0x00000023 push edx 0x00000024 push ebx 0x00000025 pop ebx 0x00000026 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6737AC second address: 6737BB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F3704EAC2BAh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6737BB second address: 6737D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3704502850h 0x00000009 popad 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6737D3 second address: 6737D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 672ABB second address: 672AC1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 672AC1 second address: 672AD6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F3704EAC2BFh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 672AD6 second address: 672ADA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 672C49 second address: 672C4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 672C4F second address: 672C53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 672F2E second address: 672F50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 je 00007F3704EAC2C9h 0x0000000c jmp 00007F3704EAC2C3h 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 672F50 second address: 672F5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 jne 00007F3704502846h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 672F5E second address: 672F66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 676DAE second address: 676DE1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3704502859h 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007F370450284Ah 0x00000010 pop ebx 0x00000011 push edx 0x00000012 push ecx 0x00000013 push edx 0x00000014 pop edx 0x00000015 pop ecx 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 pop eax 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 676DE1 second address: 676DE5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 676DE5 second address: 676DEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 67674C second address: 67675B instructions: 0x00000000 rdtsc 0x00000002 jns 00007F3704EAC2B6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 67675B second address: 676784 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F3704502846h 0x0000000a jmp 00007F3704502851h 0x0000000f jmp 00007F370450284Dh 0x00000014 popad 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 676784 second address: 67678E instructions: 0x00000000 rdtsc 0x00000002 jo 00007F3704EAC2BCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 67D3F8 second address: 67D40A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F370450284Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 67F3F1 second address: 67F3F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 67F3F5 second address: 67F419 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jmp 00007F3704502854h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push edx 0x0000000d pop edx 0x0000000e js 00007F3704502846h 0x00000014 popad 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 67F419 second address: 67F41F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 67F41F second address: 67F450 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F3704502846h 0x00000008 jmp 00007F3704502852h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 jo 00007F370450284Eh 0x00000018 jne 00007F3704502846h 0x0000001e pushad 0x0000001f popad 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 67F450 second address: 67F454 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 67F013 second address: 67F024 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F370450284Dh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 67F024 second address: 67F028 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 677D0C second address: 677D38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3704502855h 0x00000009 pop eax 0x0000000a pushad 0x0000000b push edi 0x0000000c pop edi 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 je 00007F3704502852h 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b pop eax 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 676C19 second address: 676C3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F3704EAC2C8h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 676C3A second address: 676C4E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3704502850h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 676C4E second address: 676C53 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 676C53 second address: 676C7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F3704502853h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d jmp 00007F370450284Fh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 677BC5 second address: 677BC9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 677BC9 second address: 677BD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 3DDAF1 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 3DDB8A instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 5826C0 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 5AB66A instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 5955C7 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeMemory allocated: 4F70000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 50C0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 70C0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003DE19E rdtsc 0_2_003DE19E
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 2012Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005BEFF3 GetSystemInfo,VirtualAlloc,0_2_005BEFF3
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: file.exe, file.exe, 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
Source: file.exe, 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: regmonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: gbdyllo
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: procmon_window_class
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: ollydbg
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: filemonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeFile opened: NTICE
Source: C:\Users\user\Desktop\file.exeFile opened: SICE
Source: C:\Users\user\Desktop\file.exeFile opened: SIWVID
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003DE19E rdtsc 0_2_003DE19E
Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior
Source: file.exe, 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: $kProgram Manager
Source: file.exeBinary or memory string: $kProgram Manager
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005B5F1D GetSystemTime,GetFileTime,0_2_005B5F1D

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\Desktop\file.exeRegistry key value created / modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications DisableNotifications 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableIOAVProtection 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableRealtimeMonitoring 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\NotificationsRegistry value created: DisableNotifications 1Jump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry value created: TamperProtection 0Jump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AUOptionsJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AutoInstallMinorUpdatesJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate DoNotConnectToWindowsUpdateInternetLocationsJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
41
Disable or Modify Tools
LSASS Memory641
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
Bypass User Account Control
261
Virtualization/Sandbox Evasion
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS261
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets24
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
Software Packing
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
Bypass User Account Control
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1561645
Start date and time:2024-11-24 03:04:09 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 15s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal100.evad.winEXE@1/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\file.exe
File Type:CSV text
Category:dropped
Size (bytes):226
Entropy (8bit):5.360398796477698
Encrypted:false
SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
MD5:3A8957C6382192B71471BD14359D0B12
SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
Malicious:true
Reputation:high, very likely benign file
Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.492192557625596
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:file.exe
File size:2'842'624 bytes
MD5:92b22f14f1664cc7bb2f42daf6fd1799
SHA1:68a767dd4bcd60e310bafd7219749093bd013bc6
SHA256:85507d05a1da7659f9045ec2d969ddd0de20723fc7422b4985bd392411449fe8
SHA512:c4b30103cc0b0dff93b5deb61f7301f45b24054239592f4c2778c179312193dce01b06043885d5ff260424ad7c49bf8d18d48a9523deb1e7d7e12601745d513a
SSDEEP:49152:u7fzzBeGCIB62HytmIQe5O43lLT25dsn3Gy:u77zwGCs62d3ex3lU2j
TLSH:A8D529A2FA0671CFD48E17788527CE826D5E03F94B1144C7A9ADE4BA7DB3CC111B6D28
File Content Preview:MZ......................@...........z...................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P(,e.........."...0..$............+.. ...`....@.. ........................,......',...`................................
Icon Hash:00928e8e8686b000
Entrypoint:0x6bc000
Entrypoint Section:.taggant
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE
Time Stamp:0x652C2850 [Sun Oct 15 17:58:40 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:2eabe9054cad5152567f0699947a2c5b
Instruction
jmp 00007F3704C57E0Ah
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x80550x69.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000x59c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x81f80x8.idata
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
0x20000x40000x12006a9dbe092e8f771b5bdfc61473fc97bbFalse0.9348958333333334OpenPGP Public Key7.818185395285856IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x60000x59c0x600aae15e30898a02f09cc86ed48aa06b09False0.4140625data4.036947054771808IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata 0x80000x20000x200ec9cb51e8cb4ea49a56ee3cf434fb69eFalse0.1484375data0.9342685949460681IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
heclofms0xa0000x2b00000x2b000084bfe49248c65008320c33e539ce9e76unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
owtxsouk0x2ba0000x20000x4004ab0216d6685a812e503b6483aa369d2False0.7939453125data6.2332592158725095IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.taggant0x2bc0000x40000x2200cc084bace80fd5d8b25949ad395fdcbaFalse0.05572150735294118DOS executable (COM)0.6439714064202419IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x60900x30cdata0.42948717948717946
RT_MANIFEST0x63ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
DLLImport
kernel32.dlllstrcpy
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:21:05:00
Start date:23/11/2024
Path:C:\Users\user\Desktop\file.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\file.exe"
Imagebase:0x3d0000
File size:2'842'624 bytes
MD5 hash:92B22F14F1664CC7BB2F42DAF6FD1799
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:5.9%
    Dynamic/Decrypted Code Coverage:3.5%
    Signature Coverage:4.1%
    Total number of Nodes:340
    Total number of Limit Nodes:23
    execution_graph 8714 5b671a 8716 5b6723 8714->8716 8721 5b1dd0 GetCurrentThreadId 8716->8721 8718 5b672f 8719 5b677f ReadFile 8718->8719 8720 5b6748 8718->8720 8719->8720 8722 5b1de8 8721->8722 8723 5b1e2f 8722->8723 8724 5b1e1e Sleep 8722->8724 8723->8718 8724->8722 8983 5b6ef9 8985 5b6f05 8983->8985 8986 5b6f1d 8985->8986 8988 5b6f47 8986->8988 8989 5b6e33 8986->8989 8991 5b6e3f 8989->8991 8992 5b1dd0 2 API calls 8991->8992 8993 5b6e52 8992->8993 8994 5b6ecb 8993->8994 8995 5b6e90 8993->8995 8998 5b6e6c 8993->8998 8996 5b6ed0 CreateFileMappingA 8994->8996 8995->8998 8999 5b450a 8995->8999 8996->8998 9002 5b4521 8999->9002 9000 5b461e 9000->8998 9001 5b458a CreateFileA 9003 5b45cf 9001->9003 9002->9000 9002->9001 9003->9000 9004 5b3be9 CloseHandle 9003->9004 9004->9000 9005 5685b4 9006 568c33 9005->9006 9007 568eb1 RegOpenKeyA 9006->9007 9008 568ed8 RegOpenKeyA 9006->9008 9007->9008 9009 568ece 9007->9009 9010 568ef5 9008->9010 9009->9008 9011 568f39 GetNativeSystemInfo 9010->9011 9012 56859b 9010->9012 9011->9012 9013 3e135d 9015 3e2e6d 9013->9015 9014 3e3460 9015->9014 9017 5bf194 9015->9017 9020 5bf1a2 9017->9020 9019 5bf1c2 9019->9014 9020->9019 9021 5bf464 9020->9021 9022 5bf474 9021->9022 9024 5bf497 9021->9024 9023 5bf85e 3 API calls 9022->9023 9022->9024 9023->9024 9024->9020 9025 5b393f 9027 5b394b 9025->9027 9028 5b395f 9027->9028 9030 5b3987 9028->9030 9031 5b39a0 9028->9031 9033 5b39a9 9031->9033 9034 5b39b8 9033->9034 9035 5b1dd0 2 API calls 9034->9035 9041 5b39c0 9034->9041 9036 5b39ca 9035->9036 9039 5b39e5 9036->9039 9040 5b24e2 2 API calls 9036->9040 9037 5b3a63 GetModuleHandleW 9042 5b39f8 9037->9042 9038 5b3a71 GetModuleHandleA 9038->9042 9039->9041 9039->9042 9040->9039 9041->9037 9041->9038 9043 5beff3 GetSystemInfo 9044 5bf013 9043->9044 9045 5bf051 VirtualAlloc 9043->9045 9044->9045 9058 5bf33f 9045->9058 9047 5bf098 9048 5bf33f VirtualAlloc GetModuleFileNameA GetModuleHandleA VirtualProtect 9047->9048 9056 5bf16d 9047->9056 9050 5bf0c2 9048->9050 9049 5bf189 GetModuleFileNameA GetModuleHandleA VirtualProtect 9057 5bf131 9049->9057 9051 5bf33f VirtualAlloc GetModuleFileNameA GetModuleHandleA VirtualProtect 9050->9051 9050->9056 9052 5bf0ec 9051->9052 9053 5bf33f VirtualAlloc GetModuleFileNameA GetModuleHandleA VirtualProtect 9052->9053 9052->9056 9054 5bf116 9053->9054 9055 5bf33f VirtualAlloc GetModuleFileNameA GetModuleHandleA VirtualProtect 9054->9055 9054->9056 9054->9057 9055->9056 9056->9049 9056->9057 9060 5bf347 9058->9060 9061 5bf35b 9060->9061 9062 5bf373 9060->9062 9068 5bf20b 9061->9068 9064 5bf20b 3 API calls 9062->9064 9065 5bf384 9064->9065 9070 5bf396 9065->9070 9073 5bf213 9068->9073 9071 5bf3a7 VirtualAlloc 9070->9071 9072 5bf392 9070->9072 9071->9072 9074 5bf226 9073->9074 9075 5bf269 9074->9075 9076 5bf85e 3 API calls 9074->9076 9076->9075 8725 5b3a92 8726 5b1dd0 2 API calls 8725->8726 8727 5b3a9e 8726->8727 8728 5b3abc 8727->8728 8732 5b24e2 8727->8732 8730 5b3aed GetModuleHandleExA 8728->8730 8731 5b3ac4 8728->8731 8730->8731 8733 5b24f3 8732->8733 8734 5b2530 8732->8734 8733->8734 8736 5b2383 8733->8736 8734->8728 8738 5b23b0 8736->8738 8737 5b24b6 8737->8733 8738->8737 8739 5b23f9 8738->8739 8740 5b23de PathAddExtensionA 8738->8740 8744 5b241b 8739->8744 8748 5b2024 8739->8748 8740->8739 8741 5b2464 8741->8737 8743 5b248d 8741->8743 8746 5b2024 lstrcmpiA 8741->8746 8743->8737 8747 5b2024 lstrcmpiA 8743->8747 8744->8737 8744->8741 8745 5b2024 lstrcmpiA 8744->8745 8745->8741 8746->8743 8747->8737 8749 5b2042 8748->8749 8750 5b2059 8749->8750 8752 5b1fa1 8749->8752 8750->8744 8753 5b1fcc 8752->8753 8754 5b1ffe lstrcmpiA 8753->8754 8755 5b2014 8753->8755 8754->8755 8755->8750 8756 5b7057 8757 5b1dd0 2 API calls 8756->8757 8758 5b7063 8757->8758 8759 5b70cb MapViewOfFileEx 8758->8759 8760 5b707c 8758->8760 8759->8760 9077 5bfff7 9079 5c0003 9077->9079 9080 5c0015 9079->9080 9081 5b342f 19 API calls 9080->9081 9082 5c0024 9081->9082 9083 5c003d 9082->9083 9084 5bfbb4 3 API calls 9082->9084 9084->9083 9085 7261308 9086 7261349 ImpersonateLoggedOnUser 9085->9086 9087 7261376 9086->9087 9088 7260d48 9089 7260d93 OpenSCManagerW 9088->9089 9091 7260ddc 9089->9091 8761 5b5e8b 8762 5b1dd0 2 API calls 8761->8762 8763 5b5e97 GetCurrentProcess 8762->8763 8764 5b5ee3 8763->8764 8765 5b5ea7 8763->8765 8766 5b5ee8 DuplicateHandle 8764->8766 8765->8764 8767 5b5ed2 8765->8767 8769 5b5ede 8766->8769 8770 5b3c28 8767->8770 8771 5b3c52 8770->8771 8772 5b3ce5 8771->8772 8774 5b3c10 8771->8774 8772->8769 8777 5b1c7b 8774->8777 8778 5b1c91 8777->8778 8779 5b1cab 8778->8779 8781 5b1c5f 8778->8781 8779->8772 8784 5b3be9 CloseHandle 8781->8784 8783 5b1c6f 8783->8779 8785 5b3bfd 8784->8785 8785->8783 8786 5c008f 8788 5c009b 8786->8788 8789 5c00b8 8788->8789 8792 5b36fd 8789->8792 8794 5b3706 8792->8794 8795 5b3715 8794->8795 8796 5b371d 8795->8796 8798 5b1dd0 2 API calls 8795->8798 8797 5b374a GetProcAddress 8796->8797 8799 5b3740 8797->8799 8800 5b3727 8798->8800 8801 5b3737 8800->8801 8803 5b3745 8800->8803 8804 5b315e 8801->8804 8803->8797 8805 5b324a 8804->8805 8806 5b317d 8804->8806 8805->8799 8806->8805 8807 5b31ba lstrcmpiA 8806->8807 8808 5b31e4 8806->8808 8807->8806 8807->8808 8808->8805 8810 5b30a7 8808->8810 8811 5b30b8 8810->8811 8812 5b30e8 lstrcpyn 8811->8812 8817 5b3143 8811->8817 8815 5b3104 8812->8815 8812->8817 8815->8817 8818 5b25ec 8815->8818 8816 5b36fd 18 API calls 8816->8817 8817->8805 8826 5b342f 8818->8826 8820 5b2645 8820->8816 8820->8817 8821 5b25ff 8821->8820 8822 5b2651 8821->8822 8824 5b2628 8821->8824 8823 5b3620 3 API calls 8822->8823 8823->8820 8824->8820 8829 5b3620 8824->8829 8831 5b3496 8826->8831 8828 5b3444 8828->8821 8876 5b362c 8829->8876 8833 5b34a3 8831->8833 8835 5b34b9 8833->8835 8834 5b34de 8837 5b1dd0 2 API calls 8834->8837 8835->8834 8846 5b34c1 8835->8846 8850 5c0266 8835->8850 8842 5b34e3 8837->8842 8838 5b358e 8872 5b32ce 8838->8872 8839 5b35a1 8840 5b35ab LoadLibraryExW 8839->8840 8841 5b35bf LoadLibraryExA 8839->8841 8844 5b3565 8840->8844 8841->8844 8845 5b24e2 2 API calls 8842->8845 8847 5b34f4 8845->8847 8846->8838 8846->8839 8847->8846 8848 5b3522 8847->8848 8852 5b2e0e 8848->8852 8851 5c0275 GetCurrentThreadId Sleep lstrcmpiA PathAddExtensionA 8850->8851 8853 5b2e2a 8852->8853 8854 5b2e34 8852->8854 8853->8844 8855 5b2661 VirtualAlloc 8854->8855 8856 5b2e54 8855->8856 8856->8853 8857 5b2707 VirtualAlloc 8856->8857 8858 5b2e74 8857->8858 8859 5b2f2e 8858->8859 8861 5b2784 VirtualAlloc 8858->8861 8859->8853 8860 5b3620 GetCurrentThreadId Sleep FreeLibrary 8859->8860 8860->8853 8862 5b2e84 8861->8862 8862->8859 8864 5b283f lstrcmpiA 8862->8864 8865 5b2eb1 8862->8865 8863 5b2ada 19 API calls 8866 5b2ebc 8863->8866 8864->8865 8865->8863 8866->8859 8867 5b2a51 VirtualProtect 8866->8867 8868 5b2ee9 8867->8868 8868->8859 8869 5b2f11 8868->8869 8870 5bfebb GetModuleHandleA VirtualProtect 8868->8870 8869->8859 8871 5bfbb4 GetModuleFileNameA GetModuleHandleA VirtualProtect 8869->8871 8870->8869 8871->8859 8873 5b32d9 8872->8873 8874 5b32fa LoadLibraryExA 8873->8874 8875 5b32e9 8873->8875 8874->8875 8875->8844 8877 5b363b 8876->8877 8879 5b1dd0 2 API calls 8877->8879 8882 5b3643 8877->8882 8878 5b3691 FreeLibrary 8884 5b3678 8878->8884 8880 5b364d 8879->8880 8881 5b365d 8880->8881 8880->8882 8885 5b300e 8881->8885 8882->8878 8886 5b3031 8885->8886 8888 5b3071 8885->8888 8886->8888 8889 5b1bca 8886->8889 8888->8884 8890 5b1bd3 8889->8890 8891 5b1beb 8890->8891 8892 5b1bb1 GetCurrentThreadId Sleep FreeLibrary 8890->8892 8891->8888 8892->8890 8893 72610f0 8894 7261131 8893->8894 8897 5b4b24 8894->8897 8895 7261151 8898 5b1dd0 2 API calls 8897->8898 8899 5b4b30 8898->8899 8900 5b4b59 8899->8900 8901 5b4b49 8899->8901 8904 5b4b5e CloseHandle 8900->8904 8902 5b3c10 CloseHandle 8901->8902 8903 5b4b4f 8902->8903 8903->8895 8904->8903 8905 5bff8d 8907 5bff99 8905->8907 8908 5bffab 8907->8908 8911 5bfbb4 8908->8911 8913 5bfc48 8911->8913 8915 5bfbc5 8911->8915 8914 5bfa1f GetModuleHandleA VirtualProtect 8914->8915 8915->8913 8915->8914 8916 5bf85e 8915->8916 8920 5bf865 8916->8920 8918 5bf8af 8918->8915 8920->8918 8921 5bf76c 8920->8921 8925 5bfa1f 8920->8925 8922 5bf781 8921->8922 8923 5bf80b GetModuleFileNameA 8922->8923 8924 5bf841 8922->8924 8923->8922 8924->8920 8926 5bfa33 GetModuleHandleA 8925->8926 8928 5bfa50 8925->8928 8927 5bfa4b 8926->8927 8926->8928 8927->8920 8928->8927 8929 5bfb6e VirtualProtect 8928->8929 8929->8928 9092 7261510 9093 7261558 ControlService 9092->9093 9094 726158f 9093->9094 9095 5b63a0 9097 5b63ac 9095->9097 9098 5b1dd0 2 API calls 9097->9098 9099 5b63b8 9098->9099 9101 5b63d8 9099->9101 9102 5b62f7 9099->9102 9104 5b6303 9102->9104 9105 5b6317 9104->9105 9106 5b1dd0 2 API calls 9105->9106 9107 5b632f 9106->9107 9115 5b2534 9107->9115 9110 5b24e2 2 API calls 9111 5b6352 9110->9111 9112 5b635a 9111->9112 9113 5b6387 GetFileAttributesA 9111->9113 9114 5b6376 GetFileAttributesW 9111->9114 9113->9112 9114->9112 9116 5b25e8 9115->9116 9117 5b2548 9115->9117 9116->9110 9116->9112 9117->9116 9118 5b2383 2 API calls 9117->9118 9118->9117 8932 5b6607 8934 5b6613 8932->8934 8935 5b1dd0 2 API calls 8934->8935 8936 5b661f 8935->8936 8938 5b663f 8936->8938 8939 5b6513 8936->8939 8941 5b651f 8939->8941 8942 5b6533 8941->8942 8943 5b1dd0 2 API calls 8942->8943 8944 5b654b 8943->8944 8945 5b6560 8944->8945 8965 5b642c 8944->8965 8949 5b6568 8945->8949 8957 5b64d1 IsBadWritePtr 8945->8957 8952 5b65b9 CreateFileW 8949->8952 8953 5b65dc CreateFileA 8949->8953 8950 5b24e2 2 API calls 8951 5b659b 8950->8951 8951->8949 8954 5b65a3 8951->8954 8956 5b65a9 8952->8956 8953->8956 8959 5b3d26 8954->8959 8958 5b64f3 8957->8958 8958->8949 8958->8950 8961 5b3d33 8959->8961 8960 5b3d6c CreateFileA 8962 5b3db8 8960->8962 8961->8960 8964 5b3e2e 8961->8964 8963 5b3be9 CloseHandle 8962->8963 8962->8964 8963->8964 8964->8956 8967 5b643b GetWindowsDirectoryA 8965->8967 8968 5b6465 8967->8968 9119 3de601 VirtualAlloc 9120 3de644 9119->9120 9121 5b35e7 9122 5b342f 19 API calls 9121->9122 9123 5b35fa 9122->9123 9124 55b068 LoadLibraryA 9125 55b078 9124->9125 8969 5c0043 8971 5c004f 8969->8971 8972 5c0061 8971->8972 8977 5b3448 8972->8977 8974 5c0070 8975 5c0089 8974->8975 8976 5bfbb4 GetModuleFileNameA GetModuleHandleA VirtualProtect 8974->8976 8976->8975 8979 5b3454 8977->8979 8980 5b3469 8979->8980 8981 5b3496 19 API calls 8980->8981 8982 5b3487 8980->8982 8981->8982

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 195 5beff3-5bf00d GetSystemInfo 196 5bf013-5bf04b 195->196 197 5bf051-5bf09a VirtualAlloc call 5bf33f 195->197 196->197 201 5bf180-5bf185 call 5bf189 197->201 202 5bf0a0-5bf0c4 call 5bf33f 197->202 209 5bf187-5bf188 201->209 202->201 208 5bf0ca-5bf0ee call 5bf33f 202->208 208->201 212 5bf0f4-5bf118 call 5bf33f 208->212 212->201 215 5bf11e-5bf12b 212->215 216 5bf151-5bf168 call 5bf33f 215->216 217 5bf131-5bf14c 215->217 220 5bf16d-5bf16f 216->220 221 5bf17b 217->221 220->201 222 5bf175 220->222 221->209 222->221
    APIs
    • GetSystemInfo.KERNELBASE(?,-11EF5FEC), ref: 005BEFFF
    • VirtualAlloc.KERNELBASE(00000000,00004000,00001000,00000004), ref: 005BF060
    Memory Dump Source
    • Source File: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: AllocInfoSystemVirtual
    • String ID:
    • API String ID: 3440192736-0
    • Opcode ID: 315fcc1f902cf5d485d83efa03a3578069be2d3a29571deed73201d286f622da
    • Instruction ID: 1e354da62f31b97f00d7105ca58ef16d15741748ad6ad548930521f01e773534
    • Opcode Fuzzy Hash: 315fcc1f902cf5d485d83efa03a3578069be2d3a29571deed73201d286f622da
    • Instruction Fuzzy Hash: D041F171940246ABE729DF74DD55FE6BBECFF4C740F000466A206D9482E671A5D08BE0

    Control-flow Graph

    APIs
    • LoadLibraryExW.KERNEL32(?,?,?), ref: 005B35B4
    • LoadLibraryExA.KERNELBASE(00000000,?,?), ref: 005B35C8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID: .dll$.exe$1002
    • API String ID: 1029625771-847511843
    • Opcode ID: 541354a570b376206c2126b08cc9ba37700832945230e4b1507dcf3216277f33
    • Instruction ID: 4139a3992fab52ecdedbd0e83d39370eb085be65c9582ef4213a04940c0b2713
    • Opcode Fuzzy Hash: 541354a570b376206c2126b08cc9ba37700832945230e4b1507dcf3216277f33
    • Instruction Fuzzy Hash: AB31457540420AEFDF26AF54D909AEE7FB9BF44310F104565F802A65A0C731BBA0EBA1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 38 5bfa1f-5bfa2d 39 5bfa33-5bfa45 GetModuleHandleA 38->39 40 5bfa50-5bfa5a call 5bf8b4 38->40 39->40 41 5bfa4b 39->41 45 5bfa60 40->45 46 5bfa65-5bfa6e 40->46 43 5bfbaf-5bfbb1 41->43 45->43 47 5bfa86-5bfa8d 46->47 48 5bfa74-5bfa7b 46->48 50 5bfa98-5bfaa8 47->50 51 5bfa93 47->51 48->47 49 5bfa81 48->49 49->43 50->43 52 5bfaae-5bfaba call 5bf989 50->52 51->43 55 5bfabd-5bfac1 52->55 55->43 56 5bfac7-5bfad1 55->56 57 5bfaf8-5bfafb 56->57 58 5bfad7-5bfaea 56->58 59 5bfafe-5bfb01 57->59 58->57 65 5bfaf0-5bfaf2 58->65 61 5bfba7-5bfbaa 59->61 62 5bfb07-5bfb0e 59->62 61->55 63 5bfb3c-5bfb55 62->63 64 5bfb14-5bfb1a 62->64 71 5bfb5b-5bfb69 63->71 72 5bfb6e-5bfb76 VirtualProtect 63->72 66 5bfb20-5bfb25 64->66 67 5bfb37 64->67 65->57 65->61 66->67 68 5bfb2b-5bfb31 66->68 69 5bfb9f-5bfba2 67->69 68->63 68->67 69->59 73 5bfb7c-5bfb7f 71->73 72->73 73->69 75 5bfb85-5bfb9e 73->75 75->69
    APIs
    • GetModuleHandleA.KERNELBASE(?,?,6578652E,?,00000001,00000000,?), ref: 005BFA3B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: HandleModule
    • String ID: .exe$.exe
    • API String ID: 4139908857-1392631246
    • Opcode ID: fc278cc00826d57386187a9d0b7a393cca0dcccaf13105182ddd15ce5f838053
    • Instruction ID: eaf3003d93e15f09ebc2c0ef71da166686084776da37a49f132b456083fbcf69
    • Opcode Fuzzy Hash: fc278cc00826d57386187a9d0b7a393cca0dcccaf13105182ddd15ce5f838053
    • Instruction Fuzzy Hash: 93415B7190020AAFEB25CF54CD54BEABFB1FF04310F2484A4E906AA582C771BC90DB61

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 77 5b39a9-5b39ba call 5b330d 80 5b39c0 77->80 81 5b39c5-5b39ce call 5b1dd0 77->81 83 5b3a59-5b3a5d 80->83 87 5b3a02-5b3a09 81->87 88 5b39d4-5b39e0 call 5b24e2 81->88 85 5b3a63-5b3a6c GetModuleHandleW 83->85 86 5b3a71-5b3a74 GetModuleHandleA 83->86 89 5b3a7a 85->89 86->89 92 5b3a0f-5b3a16 87->92 93 5b3a54 call 5b1e7b 87->93 94 5b39e5-5b39e7 88->94 91 5b3a84-5b3a86 89->91 92->93 95 5b3a1c-5b3a23 92->95 93->83 94->93 97 5b39ed-5b39f2 94->97 95->93 98 5b3a29-5b3a30 95->98 97->93 99 5b39f8-5b3a7f call 5b1e7b 97->99 98->93 100 5b3a36-5b3a4a 98->100 99->91 100->93
    APIs
    • GetModuleHandleW.KERNEL32(?,?,?,?,005B393B,?,00000000,00000000), ref: 005B3A66
    • GetModuleHandleA.KERNEL32(00000000,?,?,?,005B393B,?,00000000,00000000), ref: 005B3A74
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: HandleModule
    • String ID: .dll
    • API String ID: 4139908857-2738580789
    • Opcode ID: 539f964d23037577c653f31b145d7c945b165a6266f44e170822f95348de4465
    • Instruction ID: 27918173a30243daaed847846d2a2cfcdcb71584a5354b804653f952228a8eba
    • Opcode Fuzzy Hash: 539f964d23037577c653f31b145d7c945b165a6266f44e170822f95348de4465
    • Instruction Fuzzy Hash: 58118E30144606EBEF34DF24C80EBEDBEB8BF40344F644615E846684E0C771BAE8DA81

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 104 5b6303-5b6311 105 5b6323 104->105 106 5b6317-5b631e 104->106 107 5b632a-5b6340 call 5b1dd0 call 5b2534 105->107 106->107 112 5b635f 107->112 113 5b6346-5b6354 call 5b24e2 107->113 115 5b6363-5b6366 112->115 118 5b636b-5b6370 113->118 119 5b635a 113->119 117 5b6396-5b639d call 5b1e7b 115->117 122 5b6387-5b638a GetFileAttributesA 118->122 123 5b6376-5b6382 GetFileAttributesW 118->123 119->115 124 5b6390-5b6391 122->124 123->124 124->117
    APIs
    • GetFileAttributesW.KERNELBASE(010416F4,-11EF5FEC), ref: 005B637C
    • GetFileAttributesA.KERNEL32(00000000,-11EF5FEC), ref: 005B638A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: AttributesFile
    • String ID: @
    • API String ID: 3188754299-2726393805
    • Opcode ID: 57ef39310523941d8658ce9306f4317ea88c597db20959a528edd982d7f602ed
    • Instruction ID: f15fd0d220a20fd828d2651c84cb19f0da3f0dc456d7b4ece70999bf2df677db
    • Opcode Fuzzy Hash: 57ef39310523941d8658ce9306f4317ea88c597db20959a528edd982d7f602ed
    • Instruction Fuzzy Hash: 2B018C71508209FAEB35DF64D90D7DCBFB0BF40384F208865E4036A0A1C7B8BA91EB44

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 125 5685b4-568eaf 129 568eb1-568ecc RegOpenKeyA 125->129 130 568ed8-568ef3 RegOpenKeyA 125->130 129->130 131 568ece 129->131 132 568ef5-568eff 130->132 133 568f0b-568f37 130->133 131->130 132->133 136 568f44-568f4e 133->136 137 568f39-568f42 GetNativeSystemInfo 133->137 138 568f50 136->138 139 568f5a-568f68 136->139 137->136 138->139 141 568f74-568f7b 139->141 142 568f6a 139->142 143 568f81-568f88 141->143 144 568f8e 141->144 142->141 143->144 145 56859b-5685a2 143->145 146 569c06-569c11 144->146 147 56a5e2-56a5f1 145->147 148 5685a8-5685af 145->148 146->147 148->146
    APIs
    • RegOpenKeyA.ADVAPI32(80000001,?,?), ref: 00568EC4
    • RegOpenKeyA.ADVAPI32(80000002,?,?), ref: 00568EEB
    • GetNativeSystemInfo.KERNELBASE(?), ref: 00568F42
    Memory Dump Source
    • Source File: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: Open$InfoNativeSystem
    • String ID:
    • API String ID: 1247124224-0
    • Opcode ID: 0ee4e0f2e0ca63660a0d53581825072dd8bb3cda5365b0ac321e92ef6fb16495
    • Instruction ID: 4e18cb8142684a8fbf84aa35729dcba1e84f6f2ae682095f9c941928bce305cb
    • Opcode Fuzzy Hash: 0ee4e0f2e0ca63660a0d53581825072dd8bb3cda5365b0ac321e92ef6fb16495
    • Instruction Fuzzy Hash: 4431F2B210010EDEEF11DF60D848BEF3BAAFF05314F104A26EA8286950DB764CA5CF59

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 149 5b2383-5b23b3 151 5b23b9-5b23ce 149->151 152 5b24de-5b24df 149->152 151->152 154 5b23d4-5b23d8 151->154 155 5b23fa-5b2401 154->155 156 5b23de-5b23f0 PathAddExtensionA 154->156 157 5b2423-5b242a 155->157 158 5b2407-5b2416 call 5b2024 155->158 161 5b23f9 156->161 159 5b246c-5b2473 157->159 160 5b2430-5b2437 157->160 167 5b241b-5b241d 158->167 165 5b2479-5b248f call 5b2024 159->165 166 5b2495-5b249c 159->166 163 5b243d-5b2446 160->163 164 5b2450-5b245f call 5b2024 160->164 161->155 163->164 168 5b244c 163->168 174 5b2464-5b2466 164->174 165->152 165->166 171 5b24be-5b24c5 166->171 172 5b24a2-5b24b8 call 5b2024 166->172 167->152 167->157 168->164 171->152 173 5b24cb-5b24d8 call 5b205d 171->173 172->152 172->171 173->152 174->152 174->159
    APIs
    • PathAddExtensionA.KERNELBASE(?,00000000), ref: 005B23E5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: ExtensionPath
    • String ID: \\?\
    • API String ID: 158807944-4282027825
    • Opcode ID: 67fa509464155cf7ddb9b599a1610d77c5d122b44206ff1a3bd70006668488ee
    • Instruction ID: 230bea89d95f4abf22d6528ef3a602ca34feb2b3a2d1e8b8ec1db302b9a3ccbd
    • Opcode Fuzzy Hash: 67fa509464155cf7ddb9b599a1610d77c5d122b44206ff1a3bd70006668488ee
    • Instruction Fuzzy Hash: 70310D3560020AFFDF26DF94CD09BDE7BB9BF44744F000155FA02A5860D772AAA2DB60

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 180 5b3a92-5b3aa5 call 5b1dd0 183 5b3aab-5b3ab7 call 5b24e2 180->183 184 5b3ae8-5b3afc call 5b1e7b GetModuleHandleExA 180->184 188 5b3abc-5b3abe 183->188 190 5b3b06-5b3b08 184->190 188->184 189 5b3ac4-5b3acb 188->189 191 5b3ad1 189->191 192 5b3ad4-5b3b01 call 5b1e7b 189->192 191->192 192->190
    APIs
      • Part of subcall function 005B1DD0: GetCurrentThreadId.KERNEL32 ref: 005B1DDF
      • Part of subcall function 005B1DD0: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 005B1E22
    • GetModuleHandleExA.KERNELBASE(?,?,?), ref: 005B3AF6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: CurrentHandleModuleSleepThread
    • String ID: .dll
    • API String ID: 683542999-2738580789
    • Opcode ID: f207948d6e6887ea258b6512c4be02e56b657fb18ac20792dfd0ee7651e2f6a8
    • Instruction ID: b03e2e1380980e627011bfd2fce54d6ccdfc9903e1ef09afa33244e244822bea
    • Opcode Fuzzy Hash: f207948d6e6887ea258b6512c4be02e56b657fb18ac20792dfd0ee7651e2f6a8
    • Instruction Fuzzy Hash: D1F03075104206BFDF10DF54C84AADA7FB4FF54350F608415FE0699051C731EA55DB61

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 223 5b651f-5b652d 224 5b653f 223->224 225 5b6533-5b653a 223->225 226 5b6546-5b6552 call 5b1dd0 224->226 225->226 229 5b6558-5b6562 call 5b642c 226->229 230 5b656d-5b657d call 5b64d1 226->230 229->230 237 5b6568 229->237 235 5b658f-5b659d call 5b24e2 230->235 236 5b6583-5b658a 230->236 238 5b65ae-5b65b3 235->238 243 5b65a3-5b65a4 call 5b3d26 235->243 236->238 237->238 241 5b65b9-5b65d7 CreateFileW 238->241 242 5b65dc-5b65f1 CreateFileA 238->242 244 5b65f7-5b65f8 241->244 242->244 247 5b65a9 243->247 246 5b65fd-5b6604 call 5b1e7b 244->246 247->246
    APIs
    • CreateFileW.KERNELBASE(010416F4,?,?,-11EF5FEC,?,?,?,-11EF5FEC,?), ref: 005B65D1
      • Part of subcall function 005B64D1: IsBadWritePtr.KERNEL32(?,00000004), ref: 005B64DF
    • CreateFileA.KERNEL32(?,?,?,-11EF5FEC,?,?,?,-11EF5FEC,?), ref: 005B65F1
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: CreateFile$Write
    • String ID:
    • API String ID: 1125675974-0
    • Opcode ID: 18e27641ab4880b73f46f8b00926baa290738247456697f062a0ce05364a053f
    • Instruction ID: ab0fff3b1192896004fd7f116d6b6a325b6c6b847385c5e0f3e3bf088905ce19
    • Opcode Fuzzy Hash: 18e27641ab4880b73f46f8b00926baa290738247456697f062a0ce05364a053f
    • Instruction Fuzzy Hash: 0C11237200454AFBDF329FA0CD09BED3E62BF44380F944525F902644A5C77AEAB1EB41

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 250 5b5e8b-5b5ea1 call 5b1dd0 GetCurrentProcess 253 5b5ee3-5b5f05 call 5b1e7b DuplicateHandle 250->253 254 5b5ea7-5b5eaa 250->254 259 5b5f0f-5b5f11 253->259 254->253 255 5b5eb0-5b5eb3 254->255 255->253 257 5b5eb9-5b5ecc call 5b1c2a 255->257 257->253 262 5b5ed2-5b5f0a call 5b3c28 call 5b1e7b 257->262 262->259
    APIs
      • Part of subcall function 005B1DD0: GetCurrentThreadId.KERNEL32 ref: 005B1DDF
      • Part of subcall function 005B1DD0: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 005B1E22
    • GetCurrentProcess.KERNEL32(-11EF5FEC), ref: 005B5E98
    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 005B5EFE
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: Current$DuplicateHandleProcessSleepThread
    • String ID:
    • API String ID: 2846201637-0
    • Opcode ID: 8355e298fd490207d0d75c183b65eff3401d37d85666a77938da2df20a39816f
    • Instruction ID: ca05ed3afe692b84957d08559b7c5f4ffeea89f6a70f4af72f7cb238afc3aedf
    • Opcode Fuzzy Hash: 8355e298fd490207d0d75c183b65eff3401d37d85666a77938da2df20a39816f
    • Instruction Fuzzy Hash: 6901287210094AAB8F66AFA4DC09DEE3F79BF983407044621F90294010E732F662EB61

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 267 5b1dd0-5b1de6 GetCurrentThreadId 268 5b1de8-5b1df4 267->268 269 5b1dfa-5b1dfc 268->269 270 5b1e2f-5b1e3c 268->270 269->270 271 5b1e02-5b1e09 269->271 272 5b1e0f-5b1e16 271->272 273 5b1e1e-5b1e2a Sleep 271->273 272->273 275 5b1e1c 272->275 273->268 275->273
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 005B1DDF
    • Sleep.KERNELBASE(00000005,00050000,00000000), ref: 005B1E22
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: CurrentSleepThread
    • String ID:
    • API String ID: 1164918020-0
    • Opcode ID: 9fd4e0162093a162c7c4904035740443f1de242919fa89e6c1550e38f7f206cb
    • Instruction ID: dc7107acf7f3205adc9675e7a3214bdfc8d4cfc45871683c2c5e4dbb0881912a
    • Opcode Fuzzy Hash: 9fd4e0162093a162c7c4904035740443f1de242919fa89e6c1550e38f7f206cb
    • Instruction Fuzzy Hash: 75F0B47160164AEFDB218F50C4687AE7EB8FF4031AF700179E50289181CBB16D95DA85

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 276 5b4b24-5b4b43 call 5b1dd0 call 5b1c2a 281 5b4b59-5b4b69 call 5b1e7b CloseHandle 276->281 282 5b4b49-5b4b4a call 5b3c10 276->282 288 5b4b73-5b4b75 281->288 285 5b4b4f-5b4b6e call 5b1e7b 282->285 285->288
    APIs
      • Part of subcall function 005B1DD0: GetCurrentThreadId.KERNEL32 ref: 005B1DDF
      • Part of subcall function 005B1DD0: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 005B1E22
    • CloseHandle.KERNELBASE(?,-11EF5FEC,?,?,005B44E7,?), ref: 005B4B62
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: CloseCurrentHandleSleepThread
    • String ID: D[
    • API String ID: 4003616898-2359138017
    • Opcode ID: ffa6ca589b4e7e002a97e8d8c1a49cd1a229e082631d2853bc21e6dab46e5010
    • Instruction ID: 37714c084be49e07778d680e7deabc1e58c51dc12853c9f1e28eaf3026efa469
    • Opcode Fuzzy Hash: ffa6ca589b4e7e002a97e8d8c1a49cd1a229e082631d2853bc21e6dab46e5010
    • Instruction Fuzzy Hash: DBE01272204807A69E707774C81EECF7F38BFD07807400921F60259056D620F592DAA4

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 290 5b450a-5b451b 291 5b454a-5b4553 call 5b1eae 290->291 292 5b4521-5b4535 call 5b1eae 290->292 296 5b4559-5b456a call 5b3cec 291->296 297 5b4630-5b4633 call 5b1ed3 291->297 302 5b453b-5b4549 292->302 303 5b4638 292->303 305 5b458a-5b45c9 CreateFileA 296->305 306 5b4570-5b4574 296->306 297->303 302->291 307 5b463f-5b4643 303->307 311 5b45cf-5b45ec 305->311 312 5b45ed-5b45f0 305->312 309 5b457a-5b4586 306->309 310 5b4587 306->310 309->310 310->305 311->312 313 5b4623-5b462b call 5b3b7b 312->313 314 5b45f6-5b460d call 5b1bf0 312->314 313->303 314->307 321 5b4613-5b461e call 5b3be9 314->321 321->303
    APIs
    • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,?,00000000,00000010), ref: 005B45BF
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 7ab49266058d0d298e72bf200b5d7637f6bfee2d2b37115e489de4431ce2ed20
    • Instruction ID: e2966c7a4236a5b818bcc08666391032a196f35013d1e8468f9c78b23e01a463
    • Opcode Fuzzy Hash: 7ab49266058d0d298e72bf200b5d7637f6bfee2d2b37115e489de4431ce2ed20
    • Instruction Fuzzy Hash: 20316971900609BADB309F64DC89FEEBFB8FB44714F208269F905AA192C771AA41CF54

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 324 5b3d26-5b3d35 call 5b1eae 327 5b3e3b 324->327 328 5b3d3b-5b3d4c call 5b3cec 324->328 330 5b3e42-5b3e46 327->330 332 5b3d6c-5b3db2 CreateFileA 328->332 333 5b3d52-5b3d56 328->333 336 5b3db8-5b3dd9 332->336 337 5b3dfd-5b3e00 332->337 334 5b3d69 333->334 335 5b3d5c-5b3d68 333->335 334->332 335->334 336->337 344 5b3ddf-5b3dfc 336->344 338 5b3e33-5b3e36 call 5b3b7b 337->338 339 5b3e06-5b3e1d call 5b1bf0 337->339 338->327 339->330 346 5b3e23-5b3e2e call 5b3be9 339->346 344->337 346->327
    APIs
    • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,?,00000000), ref: 005B3DA8
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 904adb60081d6727765232ae0cd36e1e2ce197fd903e06af2086c8224a0f13aa
    • Instruction ID: 144198264ab7e738a95bd11588af37521052ebe90921b66cfd449406fd8bc286
    • Opcode Fuzzy Hash: 904adb60081d6727765232ae0cd36e1e2ce197fd903e06af2086c8224a0f13aa
    • Instruction Fuzzy Hash: CC31B171640605BEEB309F64DC86FD97BB8FB44724F204226F612BA1D1C7B1F6428B54

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 350 55b068-55b06a LoadLibraryA 351 55b078-55b16c 350->351 353 55b16d 351->353 353->353
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID:
    • API String ID: 1029625771-0
    • Opcode ID: bdfa8ffa7e26d6632f11259ddb80c2988c9737dcff8471f43dc137b7c0a02060
    • Instruction ID: f52a6e201c5be0402faaf76dadcaf91e68cbfa9446ca6cf6ace5d84b2eb50b68
    • Opcode Fuzzy Hash: bdfa8ffa7e26d6632f11259ddb80c2988c9737dcff8471f43dc137b7c0a02060
    • Instruction Fuzzy Hash: 1A215CB240D204AFE7056F08DC45BAEBBE8FF45351F06492DEBD486240E7369864CB97
    APIs
    • GetModuleFileNameA.KERNELBASE(?,?,0000028A,?,?), ref: 005BF819
    Memory Dump Source
    • Source File: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: FileModuleName
    • String ID:
    • API String ID: 514040917-0
    • Opcode ID: acedaf84248d67fd9141bd7b6b5e2e250558d447ebdcebe9db581dff78d7ee1d
    • Instruction ID: ad41b5776c169fba57e96a5ffe05d4680600cbb10cab42d96ea5c71d5b7b62e1
    • Opcode Fuzzy Hash: acedaf84248d67fd9141bd7b6b5e2e250558d447ebdcebe9db581dff78d7ee1d
    • Instruction Fuzzy Hash: 32119472E01225AFEB319A159C48BFA7F7CFF54755F1040B5F805A6041DB74BD818BA1
    APIs
    • OpenSCManagerW.SECHOST(00000000,00000000,?), ref: 07260DCD
    Memory Dump Source
    • Source File: 00000000.00000002.2267353313.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7260000_file.jbxd
    Similarity
    • API ID: ManagerOpen
    • String ID:
    • API String ID: 1889721586-0
    • Opcode ID: a64e41503ea29f5f8b01a1f8cacbaf7fa4a941cd285e7811ec8106cf79e7b303
    • Instruction ID: 2720656c229e615dc653b08c95c0d33155550cd4abf9433f7c3f21f852b3fef0
    • Opcode Fuzzy Hash: a64e41503ea29f5f8b01a1f8cacbaf7fa4a941cd285e7811ec8106cf79e7b303
    • Instruction Fuzzy Hash: BE2168B2C00219DFCB50CF99D884ADEFBF0EB88710F10821AD908AB204C734A541CBA4
    APIs
    • OpenSCManagerW.SECHOST(00000000,00000000,?), ref: 07260DCD
    Memory Dump Source
    • Source File: 00000000.00000002.2267353313.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7260000_file.jbxd
    Similarity
    • API ID: ManagerOpen
    • String ID:
    • API String ID: 1889721586-0
    • Opcode ID: e2220f88dedc3942761d95848a6ab470c4e3fe613024b5c46aac6891f67e161d
    • Instruction ID: 4dc1a81ba846399dc51dd3b224cc0e4dea5a3f7f712390baf0d24d2874ebf057
    • Opcode Fuzzy Hash: e2220f88dedc3942761d95848a6ab470c4e3fe613024b5c46aac6891f67e161d
    • Instruction Fuzzy Hash: 1A2127B6C11219DFCB50CF99D884BDEFBF4EF88710F14865AD908AB245D734A544CBA4
    APIs
    • ControlService.ADVAPI32(?,?,?), ref: 07261580
    Memory Dump Source
    • Source File: 00000000.00000002.2267353313.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7260000_file.jbxd
    Similarity
    • API ID: ControlService
    • String ID:
    • API String ID: 253159669-0
    • Opcode ID: 931bf620503f7cbe58c90ec6142fd9c79d3fa818eb6b4a0524fb79adbd296fd3
    • Instruction ID: 8624fc7a3d6a2e3429725ca68fc4da91f6e9b658acef59b02aba213fa3692d54
    • Opcode Fuzzy Hash: 931bf620503f7cbe58c90ec6142fd9c79d3fa818eb6b4a0524fb79adbd296fd3
    • Instruction Fuzzy Hash: 0F2133B1C00249DFDB10CF9AC484BDEFBF4EB48320F10842AE918A7200C738AA44CFA5
    APIs
    • ControlService.ADVAPI32(?,?,?), ref: 07261580
    Memory Dump Source
    • Source File: 00000000.00000002.2267353313.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7260000_file.jbxd
    Similarity
    • API ID: ControlService
    • String ID:
    • API String ID: 253159669-0
    • Opcode ID: 84657c695d5b2f9ca5964bc77c84de1f2d6d7598fb22901f5652806ee69564e1
    • Instruction ID: e1d500024db8cd82a61dd0aab649ebc5ecda02d0ed7bafea727e63893669123e
    • Opcode Fuzzy Hash: 84657c695d5b2f9ca5964bc77c84de1f2d6d7598fb22901f5652806ee69564e1
    • Instruction Fuzzy Hash: 8211D3B1900749DFDB10CF9AC585BDEFBF4AB48320F10842AE959A7250D778A644CFA5
    APIs
      • Part of subcall function 005B1DD0: GetCurrentThreadId.KERNEL32 ref: 005B1DDF
      • Part of subcall function 005B1DD0: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 005B1E22
    • MapViewOfFileEx.KERNELBASE(?,?,?,?,?,?,-11EF5FEC), ref: 005B70DE
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: CurrentFileSleepThreadView
    • String ID:
    • API String ID: 2270672837-0
    • Opcode ID: 8cbbb295a7ad4993ebc567969a11a584252672b08915a2ae11453e7bba0d4c55
    • Instruction ID: d398ff802c58bbb85839a93345a4011e435de807304e3721704fefda7c9fb24d
    • Opcode Fuzzy Hash: 8cbbb295a7ad4993ebc567969a11a584252672b08915a2ae11453e7bba0d4c55
    • Instruction Fuzzy Hash: B411937210854FEACF22AFA4DC1ADDE3F66BF98340B004912FA1159461C636E572EF61
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: CurrentSleepThread
    • String ID:
    • API String ID: 1164918020-0
    • Opcode ID: ee00cdc8232bbe77359063a30379cd73c1bd439f512238981172664ab2db49e5
    • Instruction ID: 0dbac0102e0fdc6b521a24d701af36d9ccfbc441f65b2ec5a99da07b0434a33f
    • Opcode Fuzzy Hash: ee00cdc8232bbe77359063a30379cd73c1bd439f512238981172664ab2db49e5
    • Instruction Fuzzy Hash: 9011357610010AEBCF62AFA4C819AEF3F79BF84340F008410F9065A062C739EA65EB60
    APIs
    • ImpersonateLoggedOnUser.KERNELBASE ref: 07261367
    Memory Dump Source
    • Source File: 00000000.00000002.2267353313.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7260000_file.jbxd
    Similarity
    • API ID: ImpersonateLoggedUser
    • String ID:
    • API String ID: 2216092060-0
    • Opcode ID: a6fc082ff11ce3be9a8b32301e8b6effd6c594abc2de7f5785058f7655b5ed61
    • Instruction ID: 9d18ffa2e5e02a98f08a733daaf5df0ff14bf63b834ae618d4d6fc2c60a503f2
    • Opcode Fuzzy Hash: a6fc082ff11ce3be9a8b32301e8b6effd6c594abc2de7f5785058f7655b5ed61
    • Instruction Fuzzy Hash: 021155B1800349CFDB10DF9AD585BEEBBF4EF48720F20842AD918A3240D778A655CFA5
    APIs
    • ImpersonateLoggedOnUser.KERNELBASE ref: 07261367
    Memory Dump Source
    • Source File: 00000000.00000002.2267353313.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7260000_file.jbxd
    Similarity
    • API ID: ImpersonateLoggedUser
    • String ID:
    • API String ID: 2216092060-0
    • Opcode ID: 3dada64bc2f06e8724cc22440ec439f26180f05e65b553cfed08dca3feb4748e
    • Instruction ID: d7c4413a25fd243c0060c8d1d3f6c8d0a17da745ba0cb7eeff66c890601cc6e2
    • Opcode Fuzzy Hash: 3dada64bc2f06e8724cc22440ec439f26180f05e65b553cfed08dca3feb4748e
    • Instruction Fuzzy Hash: 641125B1800249CFDB10CF9AC445BDEBBF4AB48720F20845AD518A3250C778A544CBA5
    APIs
      • Part of subcall function 005B1DD0: GetCurrentThreadId.KERNEL32 ref: 005B1DDF
      • Part of subcall function 005B1DD0: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 005B1E22
    • ReadFile.KERNELBASE(?,00000000,?,00000400,?,-11EF5FEC,?,?,005B4452,?,?,00000400,?,00000000,?,00000000), ref: 005B678F
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: CurrentFileReadSleepThread
    • String ID:
    • API String ID: 1253362762-0
    • Opcode ID: 421f78dedb59a4fe084d85df2c303dd6173c443b0890f1cf4fd7263080613ec9
    • Instruction ID: 00ba132b939787d51e62afecb3af5ce4f242a8d858986250abca6f3381b73148
    • Opcode Fuzzy Hash: 421f78dedb59a4fe084d85df2c303dd6173c443b0890f1cf4fd7263080613ec9
    • Instruction Fuzzy Hash: 77F0E73610050AFBDF62AFA4D819DDE3F76FF84784F404811FA0659061DB36E9A1EBA1
    APIs
    • GetProcAddress.KERNEL32(005B2EBC,005B2EBC), ref: 005B3751
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: AddressProc
    • String ID:
    • API String ID: 190572456-0
    • Opcode ID: c232e32bfb91735ebab9dd77394259ffd9ceb564dcfb6e22b008ef6d057e9d8e
    • Instruction ID: 854ca202c8265e6b2f0cf1fb508e43698e4d7dc4886b69b64f01ec40f3936693
    • Opcode Fuzzy Hash: c232e32bfb91735ebab9dd77394259ffd9ceb564dcfb6e22b008ef6d057e9d8e
    • Instruction Fuzzy Hash: 41E039B6104006AA8F512B79C81E8CE3E6AFFC0790B008421F80268021DE31F751E660
    APIs
    • VirtualAlloc.KERNELBASE(00000000), ref: 003DE603
    Memory Dump Source
    • Source File: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 22967e124c3bb58d78fb1458b9f1b19edced6ff2060bf06350dd38f92bbd3af4
    • Instruction ID: e46e27c4a903d474d75dbd072cc6750853ba4e8f67252e3cde6c84ee8d2f6f24
    • Opcode Fuzzy Hash: 22967e124c3bb58d78fb1458b9f1b19edced6ff2060bf06350dd38f92bbd3af4
    • Instruction Fuzzy Hash: 33F081F281870C9BD7613F54EC4A7BABEA4EB10310F150638DEC506750F6722A68968B
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: lstrcmpi
    • String ID:
    • API String ID: 1586166983-0
    • Opcode ID: 83e08b961c66b7df09ed14a78f216414a9f73d08036065b97e87e9a9c9f90535
    • Instruction ID: b0e8b3dc49d5aac570253e210026f142e442e372e9e168f304f0a9fb478da89c
    • Opcode Fuzzy Hash: 83e08b961c66b7df09ed14a78f216414a9f73d08036065b97e87e9a9c9f90535
    • Instruction Fuzzy Hash: 5B01C43560050EBBCF22AFA5CC09EDEBFB6FF48741F000165A402A4164D732AA61DB64
    APIs
    • VirtualAlloc.KERNELBASE(00000000,00001000,00001000,00000004,?,?,005BF392,?,?,005BF098,?,?,005BF098,?,?,005BF098), ref: 005BF3B6
    Memory Dump Source
    • Source File: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 4156597ee7f19b3b3ee9bb2a53d6418257e666176a4659f955c426e1a2431c05
    • Instruction ID: acbabe3ea6ddcea93f5c1160b8a4472bee920d5872a4f1734065bd8b898c2b38
    • Opcode Fuzzy Hash: 4156597ee7f19b3b3ee9bb2a53d6418257e666176a4659f955c426e1a2431c05
    • Instruction Fuzzy Hash: 9BF0A4B1904209EFEB208F24CD05B99BFE4FF48761F118078F48A9BA51D3B1A8C0CB50
    APIs
    • CloseHandle.KERNELBASE(?,?,005B1C6F,?,?), ref: 005B3BEF
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: CloseHandle
    • String ID:
    • API String ID: 2962429428-0
    • Opcode ID: 9d300bdcba02cb3d7305b4076bf90d6e1782b88490fe4b2dad69953c45a848e5
    • Instruction ID: f394c2e0b6c718eb496db6392b45329dfe06a65da6394af08f849aecac260dd0
    • Opcode Fuzzy Hash: 9d300bdcba02cb3d7305b4076bf90d6e1782b88490fe4b2dad69953c45a848e5
    • Instruction Fuzzy Hash: 45B0483100450ABBCB11BF61DC0A88DBE69BB55699B408121B906550628B72AA609AD0
    APIs
    • VirtualAlloc.KERNELBASE(00000000), ref: 003DECA7
    Memory Dump Source
    • Source File: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 2d03dd74ec9d1f74529ea5a59279142901c03d3ad1e06073c83bbca97b4d7d57
    • Instruction ID: 031f98f085b6d745a2ac810b58c5e1fd782d1e5bb41a1996c9f2c7cf92289a2e
    • Opcode Fuzzy Hash: 2d03dd74ec9d1f74529ea5a59279142901c03d3ad1e06073c83bbca97b4d7d57
    • Instruction Fuzzy Hash: 38C00236A0424E8BCB806F78B40C3CE3A30EF05722F200715FC2289AD0C7624C209A19
    APIs
      • Part of subcall function 005B1DD0: GetCurrentThreadId.KERNEL32 ref: 005B1DDF
      • Part of subcall function 005B1DD0: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 005B1E22
    • GetSystemTime.KERNEL32(?,-11EF5FEC), ref: 005B5F52
    • GetFileTime.KERNEL32(?,?,?,?,-11EF5FEC), ref: 005B5F95
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: Time$CurrentFileSleepSystemThread
    • String ID:
    • API String ID: 3818558864-0
    • Opcode ID: 494f63097989a61d4148500bf48cffef7e83feabe0296c6e287dcdd5a0fcec7c
    • Instruction ID: e7a4122cd3cef2172e4e36ca5ee45d3e06586029c1d2e68308ca1326f7c3841d
    • Opcode Fuzzy Hash: 494f63097989a61d4148500bf48cffef7e83feabe0296c6e287dcdd5a0fcec7c
    • Instruction Fuzzy Hash: F501287220484AFBCB255F69DC0DEDEBF35FFC4350B504922F40285461E772E8A1DAA1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID:
    • String ID: NTDL
    • API String ID: 0-3662016964
    • Opcode ID: 4705d6242aca49537fa5277b2d3c207053b785c38dd24eb15fbe6aaa906ed7f6
    • Instruction ID: e3ef03c7b28723d281bbd897a50026a841c83aa025b8d04d11834d1c65642001
    • Opcode Fuzzy Hash: 4705d6242aca49537fa5277b2d3c207053b785c38dd24eb15fbe6aaa906ed7f6
    • Instruction Fuzzy Hash: CFA18BB390860E8BDB12CF65E5005EE77E5FF96320F25812BE80297B02D3B25D25DB59
    APIs
    • CryptVerifySignatureA.ADVAPI32(?,?,?,?,?,?), ref: 005B6E22
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: CryptSignatureVerify
    • String ID:
    • API String ID: 1015439381-0
    • Opcode ID: f819008dae3039c08fa9e57b70c21d4cafbbab1d3e6d02ff6c3987cae3c9402d
    • Instruction ID: a1fa37c0013aa25843b3f217d49699230b2399cdcde4d5ac7dffa8293283f088
    • Opcode Fuzzy Hash: f819008dae3039c08fa9e57b70c21d4cafbbab1d3e6d02ff6c3987cae3c9402d
    • Instruction Fuzzy Hash: 28F0D43660020AEFCF11CFA4C90598E7FB2FF09304B108529F9069A251D776EA60EF40
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID:
    • String ID: ,Qy
    • API String ID: 0-2423331711
    • Opcode ID: 5be6b01387743ba2f9e4b030da7bba13b3c8da6b164d01a8833893fefc216481
    • Instruction ID: 6da915d30685d27786d8a2a07e22bfff4da04d5831d0b1bf897f3664d202b7ee
    • Opcode Fuzzy Hash: 5be6b01387743ba2f9e4b030da7bba13b3c8da6b164d01a8833893fefc216481
    • Instruction Fuzzy Hash: D8519DB3F102254BF3484D28CC693A27692DB91310F2E827D8B4AAB7C6DD7E9C495384
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID:
    • String ID: V
    • API String ID: 0-1342839628
    • Opcode ID: 190941268c9713ede3d984bb306caab785a82fea4cbc590c85ae92c8c6a06ed8
    • Instruction ID: 04e64657f59a4a7619427fd3dc7876ed2df4116aa84f5c909d2c1eb09224e736
    • Opcode Fuzzy Hash: 190941268c9713ede3d984bb306caab785a82fea4cbc590c85ae92c8c6a06ed8
    • Instruction Fuzzy Hash: 0C4181B240924E9ED7179F24E9049EF3FBCEB56320F24446BE841CAA42D3764D249B69
    APIs
      • Part of subcall function 005B1DD0: GetCurrentThreadId.KERNEL32 ref: 005B1DDF
      • Part of subcall function 005B1DD0: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 005B1E22
      • Part of subcall function 005B64D1: IsBadWritePtr.KERNEL32(?,00000004), ref: 005B64DF
    • wsprintfA.USER32 ref: 005B5499
    • LoadImageA.USER32(?,?,?,?,?,?), ref: 005B555D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: CurrentImageLoadSleepThreadWritewsprintf
    • String ID: %8x$%8x
    • API String ID: 2375920415-2046107164
    • Opcode ID: c481597e682be10c279682bccb702319adb4f35bcac8018e2240f0b00a420c71
    • Instruction ID: f407343fb8af7652e318cd9d5b7f0da83968501a625fb2c5557973eed56a494f
    • Opcode Fuzzy Hash: c481597e682be10c279682bccb702319adb4f35bcac8018e2240f0b00a420c71
    • Instruction Fuzzy Hash: D331F77190050ABBDF21DF94DC49EEEBF79FF88710F108125F911A61A0D731AA61DB60
    APIs
    • GetFileAttributesExW.KERNEL32(010416F4,00004020,00000000,-11EF5FEC), ref: 005B6111
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2265256395.00000000005A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 003D0000, based on PE: true
    • Associated: 00000000.00000002.2264890503.00000000003D0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264912528.00000000003D2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264931283.00000000003D6000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264948669.00000000003DA000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2264967427.00000000003E6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265070488.000000000053F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265087760.0000000000541000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000558000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265108666.0000000000563000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265142809.000000000056C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265158023.000000000056D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265177705.0000000000581000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265192816.0000000000582000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265209723.0000000000592000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265223265.0000000000594000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265238225.0000000000596000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265273807.00000000005B8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265289301.00000000005BB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265308263.00000000005D7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265323641.00000000005E2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265337994.00000000005E3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265353537.00000000005E9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265368653.00000000005F3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265384807.00000000005F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265400225.0000000000600000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265414423.0000000000605000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265516748.0000000000606000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265535003.000000000060A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265550654.0000000000610000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265566563.0000000000615000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265584444.0000000000626000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265599440.000000000062A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265615013.0000000000633000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265631939.0000000000635000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265662668.0000000000673000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265678376.0000000000674000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.0000000000675000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265691906.000000000067D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265720245.000000000068A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2265733335.000000000068C000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3d0000_file.jbxd
    Similarity
    • API ID: AttributesFile
    • String ID: @
    • API String ID: 3188754299-2726393805
    • Opcode ID: 5dc96b4e73310a396a90f3ae5220458a3198f4d0b54172229e9a3d0b6f6fb36c
    • Instruction ID: 360aa4908e7f4929fd39727f284bb8e62ec18631e96c8e598ff78e3b44b20709
    • Opcode Fuzzy Hash: 5dc96b4e73310a396a90f3ae5220458a3198f4d0b54172229e9a3d0b6f6fb36c
    • Instruction Fuzzy Hash: 4531897150460AEFDB28DF44C848BCEBFB0FF08340F108529E95666651C3B9AAA1DF90