Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1561688
MD5:2a14be5464af09ff5e0d667dbb41e756
SHA1:5e3e9e8ee8c79a1c3bf51170f12f72ca84e851f0
SHA256:e90e0d0df0140e53ff17d719d1d0343cd5f51eaaae614509338461beb5d20944
Tags:exeuser-Bitsight
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
AI detected suspicious sample
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Hides threads from debuggers
Machine Learning detection for sample
Modifies windows update settings
PE file contains section with special chars
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Entry point lies outside standard sections
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 6388 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 2A14BE5464AF09FF5E0D667DBB41E756)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: file.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CE9CF8 CryptVerifySignatureA,0_2_00CE9CF8
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: file.exe, 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmp, file.exe, 00000000.00000003.1859860586.0000000004D90000.00000004.00001000.00020000.00000000.sdmp

System Summary

barindex
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B25A510_2_00B25A51
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C91B880_2_00C91B88
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C91B620_2_00C91B62
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00CE4CED appears 35 times
Source: file.exe, 00000000.00000000.1829561636.0000000000B16000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exeBinary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: classification engineClassification label: mal100.evad.winEXE@1/1@0/0
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.logJump to behavior
Source: C:\Users\user\Desktop\file.exeMutant created: NULL
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeString found in binary or memory: 3The file %s is missing. Please, re-install this application
Source: file.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: file.exeString found in binary or memory: ORtlAllocateHeap3Cannot find '%s'. Please, re-install this applicationThunRTMain__vbaVarTstNe
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: file.exeStatic file information: File size 2741760 > 1048576
Source: file.exeStatic PE information: Raw size of gvbjqmpu is bigger than: 0x100000 < 0x297600
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: file.exe, 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmp, file.exe, 00000000.00000003.1859860586.0000000004D90000.00000004.00001000.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.b10000.0.unpack :EW;.rsrc:W;.idata :W;gvbjqmpu:EW;pcqkcyiw:EW;.taggant:EW; vs :ER;.rsrc:W;
Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
Source: file.exeStatic PE information: real checksum: 0x2a250e should be: 0x2a27ba
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: file.exeStatic PE information: section name: gvbjqmpu
Source: file.exeStatic PE information: section name: pcqkcyiw
Source: file.exeStatic PE information: section name: .taggant
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CA33E9 push 34399D41h; mov dword ptr [esp], ebx0_2_00CA3BE1
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CA33E9 push esi; mov dword ptr [esp], ebp0_2_00CA3D83
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B1E475 push 6F64161Eh; mov dword ptr [esp], esi0_2_00B1F291
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C9184F push 745B0E05h; mov dword ptr [esp], esi0_2_00C9187F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C9184F push 635610F1h; mov dword ptr [esp], eax0_2_00C918B2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C9184F push 16A414CEh; mov dword ptr [esp], ebx0_2_00C918F5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B22B1C push eax; mov dword ptr [esp], ebx0_2_00B23678
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B1EB0B push 6864B1CAh; mov dword ptr [esp], edi0_2_00B1EB1E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B1EB0B push edi; mov dword ptr [esp], edx0_2_00B1F159
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D810D5 push 7F141C08h; mov dword ptr [esp], ecx0_2_00D810FC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C9C0ED push ebp; mov dword ptr [esp], 3B32182Bh0_2_00C9C15F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C9C0ED push esi; mov dword ptr [esp], 55FF6C91h0_2_00C9C17F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C9C0ED push 5CBFEFDFh; mov dword ptr [esp], eax0_2_00C9C1DF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C9C0ED push 2661215Fh; mov dword ptr [esp], edi0_2_00C9C230
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CA20E2 push 7CE93F84h; mov dword ptr [esp], ecx0_2_00CA20EC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B2308F push esi; mov dword ptr [esp], 697FF412h0_2_00B24383
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C9F082 push ebx; mov dword ptr [esp], edx0_2_00C9F08B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B210E3 push esi; mov dword ptr [esp], 4CBEC601h0_2_00B210F6
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C9F09D push 4B3A62CAh; mov dword ptr [esp], ecx0_2_00C9F0A3
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C9F09D push eax; mov dword ptr [esp], 0165AA61h0_2_00CA1E7E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B1C0C0 push esi; mov dword ptr [esp], edi0_2_00B1C242
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B1C0C0 push esi; mov dword ptr [esp], edx0_2_00B1C3F5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B240C1 push eax; mov dword ptr [esp], esi0_2_00B20A71
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C9F049 push edi; mov dword ptr [esp], ebx0_2_00C9F06D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C9F049 push edx; mov dword ptr [esp], esp0_2_00C9F071
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CA104A push 29397677h; mov dword ptr [esp], ebx0_2_00CA173E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B22021 push edx; mov dword ptr [esp], ebx0_2_00B24606
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B22021 push ebp; mov dword ptr [esp], esi0_2_00B2460A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C8F06C push esi; mov dword ptr [esp], 5D6FD900h0_2_00C8F072
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C9F079 push edx; mov dword ptr [esp], ebp0_2_00CA2E6C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C9F079 push 045B15C2h; mov dword ptr [esp], esi0_2_00CA2E74
Source: file.exeStatic PE information: section name: entropy: 7.790921165340799

Boot Survival

barindex
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: B1DBAF second address: B1DBCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F4274B9D764h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: B1DBCA second address: B1DBCE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C916D2 second address: C916EA instructions: 0x00000000 rdtsc 0x00000002 jno 00007F4274B9D763h 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C916EA second address: C916F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C916F0 second address: C916F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C9185D second address: C91869 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007F4274C4D0B6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C91869 second address: C9186D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C919D3 second address: C919F0 instructions: 0x00000000 rdtsc 0x00000002 je 00007F4274C4D0B6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jns 00007F4274C4D0C1h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C919F0 second address: C919F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C919F6 second address: C91A2A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274C4D0BFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jnp 00007F4274C4D0E3h 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 pop eax 0x00000015 jmp 00007F4274C4D0C5h 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C91B68 second address: C91B98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 ja 00007F4274B9D756h 0x0000000e popad 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 jno 00007F4274B9D756h 0x00000018 pop edx 0x00000019 popad 0x0000001a push ecx 0x0000001b jmp 00007F4274B9D75Ch 0x00000020 push ebx 0x00000021 jng 00007F4274B9D756h 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C94EDD second address: C94F3A instructions: 0x00000000 rdtsc 0x00000002 jo 00007F4274C4D0B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d jg 00007F4274C4D0CAh 0x00000013 pop eax 0x00000014 mov eax, dword ptr [esp+04h] 0x00000018 jc 00007F4274C4D0BEh 0x0000001e jl 00007F4274C4D0B8h 0x00000024 pushad 0x00000025 popad 0x00000026 mov eax, dword ptr [eax] 0x00000028 js 00007F4274C4D0C0h 0x0000002e pushad 0x0000002f jp 00007F4274C4D0B6h 0x00000035 push ecx 0x00000036 pop ecx 0x00000037 popad 0x00000038 mov dword ptr [esp+04h], eax 0x0000003c pushad 0x0000003d je 00007F4274C4D0B8h 0x00000043 push esi 0x00000044 pop esi 0x00000045 push eax 0x00000046 push edx 0x00000047 push ecx 0x00000048 pop ecx 0x00000049 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C94F9C second address: C94FA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C94FA6 second address: C95011 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F4274C4D0B6h 0x0000000a popad 0x0000000b popad 0x0000000c mov dword ptr [esp], eax 0x0000000f call 00007F4274C4D0C8h 0x00000014 mov cx, 0600h 0x00000018 pop ecx 0x00000019 push 00000000h 0x0000001b push 7A09F1C3h 0x00000020 push eax 0x00000021 push esi 0x00000022 jno 00007F4274C4D0B6h 0x00000028 pop esi 0x00000029 pop eax 0x0000002a xor dword ptr [esp], 7A09F143h 0x00000031 add edx, 0078122Fh 0x00000037 push 00000003h 0x00000039 mov si, cx 0x0000003c push 00000000h 0x0000003e mov si, 1CADh 0x00000042 mov esi, 094E5661h 0x00000047 push 00000003h 0x00000049 mov dword ptr [ebp+122D3643h], eax 0x0000004f push 79FE0A1Bh 0x00000054 push esi 0x00000055 push esi 0x00000056 push eax 0x00000057 push edx 0x00000058 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C95011 second address: C9503A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop esi 0x00000006 add dword ptr [esp], 4601F5E5h 0x0000000d mov dx, bx 0x00000010 xor cl, 00000048h 0x00000013 lea ebx, dword ptr [ebp+1244ADD2h] 0x00000019 mov dword ptr [ebp+122D1C59h], eax 0x0000001f xchg eax, ebx 0x00000020 push esi 0x00000021 push eax 0x00000022 push edx 0x00000023 je 00007F4274B9D756h 0x00000029 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C9503A second address: C95047 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C95047 second address: C9504B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C950DD second address: C950E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C950E1 second address: C950EB instructions: 0x00000000 rdtsc 0x00000002 jl 00007F4274B9D756h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C950EB second address: C950F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F4274C4D0B6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C950F5 second address: C95156 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push ecx 0x0000000a jl 00007F4274B9D758h 0x00000010 pushad 0x00000011 popad 0x00000012 pop ecx 0x00000013 mov eax, dword ptr [esp+04h] 0x00000017 jmp 00007F4274B9D769h 0x0000001c mov eax, dword ptr [eax] 0x0000001e jns 00007F4274B9D766h 0x00000024 mov dword ptr [esp+04h], eax 0x00000028 push eax 0x00000029 push edx 0x0000002a jmp 00007F4274B9D763h 0x0000002f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C95156 second address: C95160 instructions: 0x00000000 rdtsc 0x00000002 js 00007F4274C4D0BCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C951F1 second address: C9523B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 jmp 00007F4274B9D762h 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e popad 0x0000000f push eax 0x00000010 jno 00007F4274B9D75Eh 0x00000016 mov eax, dword ptr [esp+04h] 0x0000001a pushad 0x0000001b pushad 0x0000001c pushad 0x0000001d popad 0x0000001e jmp 00007F4274B9D75Eh 0x00000023 popad 0x00000024 push eax 0x00000025 push edx 0x00000026 jng 00007F4274B9D756h 0x0000002c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C9523B second address: C9526B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274C4D0C2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov eax, dword ptr [eax] 0x0000000c jo 00007F4274C4D0BAh 0x00000012 push esi 0x00000013 pushad 0x00000014 popad 0x00000015 pop esi 0x00000016 mov dword ptr [esp+04h], eax 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d jc 00007F4274C4D0B6h 0x00000023 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C9526B second address: C95274 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C95274 second address: C952B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 pop eax 0x00000009 push 00000000h 0x0000000b push ecx 0x0000000c call 00007F4274C4D0B8h 0x00000011 pop ecx 0x00000012 mov dword ptr [esp+04h], ecx 0x00000016 add dword ptr [esp+04h], 00000015h 0x0000001e inc ecx 0x0000001f push ecx 0x00000020 ret 0x00000021 pop ecx 0x00000022 ret 0x00000023 mov edi, dword ptr [ebp+12447E45h] 0x00000029 lea ebx, dword ptr [ebp+1244ADDBh] 0x0000002f add di, A90Fh 0x00000034 xchg eax, ebx 0x00000035 push ecx 0x00000036 push eax 0x00000037 push edx 0x00000038 pushad 0x00000039 popad 0x0000003a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C95373 second address: C95377 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C95377 second address: C953F3 instructions: 0x00000000 rdtsc 0x00000002 js 00007F4274C4D0B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a add dword ptr [esp], 33FBA120h 0x00000011 push 00000000h 0x00000013 push esi 0x00000014 call 00007F4274C4D0B8h 0x00000019 pop esi 0x0000001a mov dword ptr [esp+04h], esi 0x0000001e add dword ptr [esp+04h], 00000015h 0x00000026 inc esi 0x00000027 push esi 0x00000028 ret 0x00000029 pop esi 0x0000002a ret 0x0000002b push 00000003h 0x0000002d mov edx, dword ptr [ebp+122D2AB2h] 0x00000033 push 00000000h 0x00000035 mov edi, 161EF2B2h 0x0000003a push 00000003h 0x0000003c mov dword ptr [ebp+122D3198h], eax 0x00000042 pushad 0x00000043 mov dword ptr [ebp+122D290Dh], ecx 0x00000049 or di, 6055h 0x0000004e popad 0x0000004f call 00007F4274C4D0B9h 0x00000054 push ebx 0x00000055 jng 00007F4274C4D0C4h 0x0000005b pop ebx 0x0000005c push eax 0x0000005d pushad 0x0000005e push edi 0x0000005f pushad 0x00000060 popad 0x00000061 pop edi 0x00000062 pushad 0x00000063 push ecx 0x00000064 pop ecx 0x00000065 push eax 0x00000066 push edx 0x00000067 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C953F3 second address: C95402 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C95402 second address: C95406 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C95406 second address: C9540A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C9540A second address: C9542E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 mov eax, dword ptr [eax] 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F4274C4D0C9h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C9542E second address: C9543E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c push esi 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C9543E second address: C95444 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C95444 second address: C95462 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 pop eax 0x00000007 mov dword ptr [ebp+124464EAh], ebx 0x0000000d lea ebx, dword ptr [ebp+1244ADE6h] 0x00000013 adc edi, 20552E7Ah 0x00000019 xchg eax, ebx 0x0000001a push eax 0x0000001b pushad 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CA6E6E second address: CA6E83 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F4274C4D0B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jo 00007F4274C4D0B8h 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB62D1 second address: CB62F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F4274B9D768h 0x0000000a pop edi 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB62F4 second address: CB62FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F4274C4D0B6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB62FE second address: CB632A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274B9D75Fh 0x00000007 jmp 00007F4274B9D766h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB632A second address: CB6330 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB4192 second address: CB41B1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274B9D75Ch 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007F4274B9D75Dh 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB41B1 second address: CB41B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB41B7 second address: CB41BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB41BB second address: CB41CD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274C4D0BEh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB45DE second address: CB45E4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB45E4 second address: CB45EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB45EA second address: CB45F4 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F4274B9D75Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB45F4 second address: CB4604 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 ja 00007F4274C4D0B6h 0x0000000e push eax 0x0000000f pop eax 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB492A second address: CB494F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274B9D75Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a push edi 0x0000000b pushad 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e jmp 00007F4274B9D75Bh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB4C03 second address: CB4C25 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 jmp 00007F4274C4D0C7h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB4C25 second address: CB4C2A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB500A second address: CB503C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274C4D0C0h 0x00000007 jmp 00007F4274C4D0C4h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jc 00007F4274C4D0C8h 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB503C second address: CB5040 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB5040 second address: CB5044 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB5309 second address: CB5317 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F4274B9D756h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB5317 second address: CB532B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4274C4D0C0h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CAB037 second address: CAB052 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jmp 00007F4274B9D766h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C7FDF5 second address: C7FE06 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F4274C4D0BDh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C7FE06 second address: C7FE17 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F4274B9D756h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB6145 second address: CB6160 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4274C4D0C6h 0x00000009 pop edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB6160 second address: CB6166 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB6166 second address: CB6180 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4274C4D0C6h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB6180 second address: CB6184 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB6184 second address: CB618A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB618A second address: CB61B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push edi 0x0000000a pushad 0x0000000b popad 0x0000000c pop edi 0x0000000d push edi 0x0000000e jmp 00007F4274B9D767h 0x00000013 pop edi 0x00000014 pushad 0x00000015 push eax 0x00000016 pop eax 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB850C second address: CB8516 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F4274C4D0B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB8516 second address: CB8532 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274B9D75Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c ja 00007F4274B9D756h 0x00000012 pop eax 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB875D second address: CB8780 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 mov eax, dword ptr [eax] 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F4274C4D0C7h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB8780 second address: CB8799 instructions: 0x00000000 rdtsc 0x00000002 je 00007F4274B9D756h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edi 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jl 00007F4274B9D758h 0x00000017 push ebx 0x00000018 pop ebx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CB886E second address: CB8879 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C83428 second address: C83430 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBF915 second address: CBF919 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBFAC7 second address: CBFACB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBFACB second address: CBFACF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBFACF second address: CBFADA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBFADA second address: CBFAE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 jo 00007F4274C4D0D2h 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBFAE9 second address: CBFAF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jg 00007F4274B9D756h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBFAF6 second address: CBFAFA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBFC27 second address: CBFC31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F4274B9D756h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CBFC31 second address: CBFC42 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274C4D0BDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CC018E second address: CC01A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4274B9D764h 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CC1C3C second address: CC1C41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CC2209 second address: CC2220 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4274B9D75Fh 0x00000009 popad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CC2220 second address: CC2226 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CC2AD9 second address: CC2AED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F4274B9D75Dh 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CC2AED second address: CC2AF1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CC64D1 second address: CC64D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CC64D5 second address: CC64DE instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CC6D9C second address: CC6E17 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274B9D75Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push ebx 0x0000000f call 00007F4274B9D758h 0x00000014 pop ebx 0x00000015 mov dword ptr [esp+04h], ebx 0x00000019 add dword ptr [esp+04h], 00000014h 0x00000021 inc ebx 0x00000022 push ebx 0x00000023 ret 0x00000024 pop ebx 0x00000025 ret 0x00000026 mov edi, dword ptr [ebp+122D33BEh] 0x0000002c push 00000000h 0x0000002e jmp 00007F4274B9D75Ah 0x00000033 push 00000000h 0x00000035 push 00000000h 0x00000037 push ebp 0x00000038 call 00007F4274B9D758h 0x0000003d pop ebp 0x0000003e mov dword ptr [esp+04h], ebp 0x00000042 add dword ptr [esp+04h], 0000001Ah 0x0000004a inc ebp 0x0000004b push ebp 0x0000004c ret 0x0000004d pop ebp 0x0000004e ret 0x0000004f mov si, di 0x00000052 add edi, 5C42934Ah 0x00000058 xchg eax, ebx 0x00000059 push eax 0x0000005a push edx 0x0000005b push edi 0x0000005c jns 00007F4274B9D756h 0x00000062 pop edi 0x00000063 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CC6E17 second address: CC6E1D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CC6E1D second address: CC6E53 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274B9D75Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d jmp 00007F4274B9D75Fh 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F4274B9D75Fh 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCD933 second address: CCD939 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCD939 second address: CCD95F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274B9D768h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jbe 00007F4274B9D75Eh 0x00000010 push ebx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD01E1 second address: CD01E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD21BC second address: CD21D2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 je 00007F4274B9D762h 0x0000000e jl 00007F4274B9D75Ch 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD21D2 second address: CD2231 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 nop 0x00000005 push 00000000h 0x00000007 push edi 0x00000008 call 00007F4274C4D0B8h 0x0000000d pop edi 0x0000000e mov dword ptr [esp+04h], edi 0x00000012 add dword ptr [esp+04h], 0000001Bh 0x0000001a inc edi 0x0000001b push edi 0x0000001c ret 0x0000001d pop edi 0x0000001e ret 0x0000001f jmp 00007F4274C4D0C7h 0x00000024 mov dword ptr [ebp+122D3A8Eh], ebx 0x0000002a push 00000000h 0x0000002c mov ebx, 290C5F10h 0x00000031 sbb edi, 349AD7EDh 0x00000037 push 00000000h 0x00000039 xor di, 6516h 0x0000003e xchg eax, esi 0x0000003f push edx 0x00000040 push eax 0x00000041 push edx 0x00000042 pushad 0x00000043 popad 0x00000044 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD2231 second address: CD2235 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD4278 second address: CD427E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD5235 second address: CD5239 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD4462 second address: CD4468 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD5239 second address: CD523D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD523D second address: CD52CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov dword ptr [esp], eax 0x0000000a mov dword ptr [ebp+122D3138h], ecx 0x00000010 push 00000000h 0x00000012 push 00000000h 0x00000014 push ebx 0x00000015 call 00007F4274C4D0B8h 0x0000001a pop ebx 0x0000001b mov dword ptr [esp+04h], ebx 0x0000001f add dword ptr [esp+04h], 0000001Ah 0x00000027 inc ebx 0x00000028 push ebx 0x00000029 ret 0x0000002a pop ebx 0x0000002b ret 0x0000002c call 00007F4274C4D0C0h 0x00000031 mov di, 06BCh 0x00000035 pop ebx 0x00000036 mov ebx, 5D36CE3Fh 0x0000003b push 00000000h 0x0000003d push 00000000h 0x0000003f push ebp 0x00000040 call 00007F4274C4D0B8h 0x00000045 pop ebp 0x00000046 mov dword ptr [esp+04h], ebp 0x0000004a add dword ptr [esp+04h], 0000001Ch 0x00000052 inc ebp 0x00000053 push ebp 0x00000054 ret 0x00000055 pop ebp 0x00000056 ret 0x00000057 mov bx, si 0x0000005a xchg eax, esi 0x0000005b push eax 0x0000005c push edx 0x0000005d jmp 00007F4274C4D0C4h 0x00000062 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD6230 second address: CD6237 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD6237 second address: CD624A instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F4274C4D0B8h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD542A second address: CD542F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD624A second address: CD624E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD542F second address: CD5450 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F4274B9D763h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 push edi 0x00000012 pop edi 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD624E second address: CD6258 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F4274C4D0B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD5450 second address: CD546B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274B9D764h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD721A second address: CD721E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD721E second address: CD7222 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD7222 second address: CD722C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD722C second address: CD7230 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD8203 second address: CD8209 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDA305 second address: CDA309 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDA309 second address: CDA382 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push edi 0x0000000d call 00007F4274C4D0B8h 0x00000012 pop edi 0x00000013 mov dword ptr [esp+04h], edi 0x00000017 add dword ptr [esp+04h], 0000001Dh 0x0000001f inc edi 0x00000020 push edi 0x00000021 ret 0x00000022 pop edi 0x00000023 ret 0x00000024 mov ebx, 52601F3Fh 0x00000029 pushad 0x0000002a sub ch, 00000017h 0x0000002d xor dword ptr [ebp+124464EAh], edi 0x00000033 popad 0x00000034 push 00000000h 0x00000036 sub di, 0EA6h 0x0000003b push 00000000h 0x0000003d push 00000000h 0x0000003f push eax 0x00000040 call 00007F4274C4D0B8h 0x00000045 pop eax 0x00000046 mov dword ptr [esp+04h], eax 0x0000004a add dword ptr [esp+04h], 0000001Dh 0x00000052 inc eax 0x00000053 push eax 0x00000054 ret 0x00000055 pop eax 0x00000056 ret 0x00000057 add dword ptr [ebp+122D2888h], eax 0x0000005d xchg eax, esi 0x0000005e push edi 0x0000005f push eax 0x00000060 push edx 0x00000061 push eax 0x00000062 push edx 0x00000063 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDA382 second address: CDA386 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDA386 second address: CDA398 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jno 00007F4274C4D0B6h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDA398 second address: CDA3A2 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F4274B9D756h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD844E second address: CD8454 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDB2B5 second address: CDB346 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274B9D75Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edx 0x0000000a jng 00007F4274B9D756h 0x00000010 pop edx 0x00000011 popad 0x00000012 mov dword ptr [esp], eax 0x00000015 push 00000000h 0x00000017 push esi 0x00000018 call 00007F4274B9D758h 0x0000001d pop esi 0x0000001e mov dword ptr [esp+04h], esi 0x00000022 add dword ptr [esp+04h], 0000001Dh 0x0000002a inc esi 0x0000002b push esi 0x0000002c ret 0x0000002d pop esi 0x0000002e ret 0x0000002f call 00007F4274B9D768h 0x00000034 mov ebx, eax 0x00000036 pop edi 0x00000037 push 00000000h 0x00000039 push 00000000h 0x0000003b push edi 0x0000003c call 00007F4274B9D758h 0x00000041 pop edi 0x00000042 mov dword ptr [esp+04h], edi 0x00000046 add dword ptr [esp+04h], 00000017h 0x0000004e inc edi 0x0000004f push edi 0x00000050 ret 0x00000051 pop edi 0x00000052 ret 0x00000053 mov dword ptr [ebp+1246FF73h], ebx 0x00000059 push 00000000h 0x0000005b mov ebx, 4C562B81h 0x00000060 xchg eax, esi 0x00000061 push eax 0x00000062 push eax 0x00000063 push edx 0x00000064 push eax 0x00000065 push edx 0x00000066 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CD8454 second address: CD8458 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDB346 second address: CDB34A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDB34A second address: CDB35C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b jbe 00007F4274C4D0B6h 0x00000011 pop edi 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDC3D2 second address: CDC3DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push esi 0x0000000a push edx 0x0000000b pop edx 0x0000000c pop esi 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDB5FD second address: CDB609 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 push ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDC3DF second address: CDC3FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F4274B9D768h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDC488 second address: CDC48C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CDD5CD second address: CDD5D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CE0E0E second address: CE0E2A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 jmp 00007F4274C4D0BDh 0x0000000e pop esi 0x0000000f push edi 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CEEEC0 second address: CEEEE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F4274B9D769h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CEEEE0 second address: CEEEEA instructions: 0x00000000 rdtsc 0x00000002 jns 00007F4274C4D0B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CEE664 second address: CEE66D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push edi 0x00000008 pop edi 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CF615E second address: CF6167 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push edx 0x00000008 pop edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CF6167 second address: CF616B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CF616B second address: CF618E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F4274C4D0B6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F4274C4D0C3h 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CFD906 second address: CFD910 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CFC6C3 second address: CFC6D7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F4274C4D0C0h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CFCC43 second address: CFCC51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jng 00007F4274B9D756h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CFCC51 second address: CFCC58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CFCC58 second address: CFCC72 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274B9D765h 0x00000007 push edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CFD1BB second address: CFD1C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CFD344 second address: CFD37F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F4274B9D756h 0x0000000a popad 0x0000000b pushad 0x0000000c jmp 00007F4274B9D764h 0x00000011 jmp 00007F4274B9D75Ch 0x00000016 pushad 0x00000017 popad 0x00000018 popad 0x00000019 popad 0x0000001a push esi 0x0000001b push eax 0x0000001c push edx 0x0000001d jg 00007F4274B9D756h 0x00000023 push ecx 0x00000024 pop ecx 0x00000025 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D01B3F second address: D01B46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D01B46 second address: D01B4E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D01B4E second address: D01B6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F4274C4D0BFh 0x0000000e push eax 0x0000000f push edx 0x00000010 ja 00007F4274C4D0B6h 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D01B6E second address: D01B78 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F4274B9D756h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D01B78 second address: D01B7D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D01DFA second address: D01E02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D01E02 second address: D01E19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4274C4D0C2h 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0225E second address: D02270 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007F4274B9D756h 0x00000009 pushad 0x0000000a popad 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D02270 second address: D022A1 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F4274C4D0B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ecx 0x0000000d pushad 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 jc 00007F4274C4D0B6h 0x00000016 jmp 00007F4274C4D0C4h 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e push ecx 0x0000001f pop ecx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D022A1 second address: D022A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D02A97 second address: D02A9D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D02A9D second address: D02AA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D02AA8 second address: D02AB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D02AB0 second address: D02AB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D08C4B second address: D08C5A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 js 00007F4274C4D0B6h 0x00000009 pushad 0x0000000a popad 0x0000000b pop esi 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0DB4D second address: D0DB63 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F4274B9D75Ch 0x00000009 jno 00007F4274B9D756h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCABB7 second address: CCABC1 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F4274C4D0BCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCABC1 second address: CAB037 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push ebp 0x0000000c call 00007F4274B9D758h 0x00000011 pop ebp 0x00000012 mov dword ptr [esp+04h], ebp 0x00000016 add dword ptr [esp+04h], 0000001Ah 0x0000001e inc ebp 0x0000001f push ebp 0x00000020 ret 0x00000021 pop ebp 0x00000022 ret 0x00000023 mov dword ptr [ebp+122D340Ah], eax 0x00000029 call dword ptr [ebp+122D399Ah] 0x0000002f jmp 00007F4274B9D766h 0x00000034 push eax 0x00000035 push edx 0x00000036 push esi 0x00000037 jmp 00007F4274B9D75Bh 0x0000003c push eax 0x0000003d push edx 0x0000003e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCB0E7 second address: CCB0F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F4274C4D0B6h 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCB1BF second address: CCB1D1 instructions: 0x00000000 rdtsc 0x00000002 js 00007F4274B9D758h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e pushad 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCB1D1 second address: CCB202 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push ebx 0x00000008 jng 00007F4274C4D0B6h 0x0000000e pop ebx 0x0000000f popad 0x00000010 mov dword ptr [esp+04h], eax 0x00000014 push eax 0x00000015 push edx 0x00000016 jnp 00007F4274C4D0CBh 0x0000001c jmp 00007F4274C4D0C5h 0x00000021 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCB202 second address: CCB243 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jns 00007F4274B9D756h 0x00000009 push edx 0x0000000a pop edx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop eax 0x0000000f push 00000000h 0x00000011 push edx 0x00000012 call 00007F4274B9D758h 0x00000017 pop edx 0x00000018 mov dword ptr [esp+04h], edx 0x0000001c add dword ptr [esp+04h], 00000017h 0x00000024 inc edx 0x00000025 push edx 0x00000026 ret 0x00000027 pop edx 0x00000028 ret 0x00000029 call 00007F4274B9D759h 0x0000002e js 00007F4274B9D764h 0x00000034 push eax 0x00000035 push edx 0x00000036 push ecx 0x00000037 pop ecx 0x00000038 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCB243 second address: CCB247 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCB247 second address: CCB2BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 ja 00007F4274B9D75Eh 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 push ecx 0x00000012 pushad 0x00000013 jmp 00007F4274B9D769h 0x00000018 push esi 0x00000019 pop esi 0x0000001a popad 0x0000001b pop ecx 0x0000001c mov eax, dword ptr [eax] 0x0000001e jns 00007F4274B9D77Eh 0x00000024 mov dword ptr [esp+04h], eax 0x00000028 js 00007F4274B9D764h 0x0000002e push eax 0x0000002f push edx 0x00000030 pushad 0x00000031 popad 0x00000032 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCB2BD second address: CCB2C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCB38B second address: CCB38F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCB38F second address: CCB393 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCB5C6 second address: CCB5CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCB6E8 second address: CCB6EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCB6EC second address: CCB742 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], eax 0x0000000a mov edx, dword ptr [ebp+122D260Eh] 0x00000010 pushad 0x00000011 mov ch, bh 0x00000013 or edi, dword ptr [ebp+122D344Ah] 0x00000019 popad 0x0000001a push 00000004h 0x0000001c jmp 00007F4274B9D769h 0x00000021 nop 0x00000022 jmp 00007F4274B9D769h 0x00000027 push eax 0x00000028 push eax 0x00000029 push edx 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d popad 0x0000002e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCB742 second address: CCB748 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCB748 second address: CCB75F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F4274B9D763h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCBB11 second address: CCBB16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCBB16 second address: CCBB20 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007F4274B9D756h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCBDDD second address: CCBE0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4274C4D0BDh 0x00000009 popad 0x0000000a jmp 00007F4274C4D0C4h 0x0000000f popad 0x00000010 push eax 0x00000011 jbe 00007F4274C4D0CCh 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCBE0E second address: CCBE44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4274B9D75Eh 0x00000009 popad 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e jo 00007F4274B9D768h 0x00000014 push esi 0x00000015 jmp 00007F4274B9D760h 0x0000001a pop esi 0x0000001b mov eax, dword ptr [eax] 0x0000001d pushad 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 popad 0x00000022 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCBE44 second address: CCBE5A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274C4D0BEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCBE5A second address: CCBE77 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274B9D75Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov dword ptr [esp+04h], eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jp 00007F4274B9D758h 0x00000016 push ecx 0x00000017 pop ecx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCBF57 second address: CCBF61 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F4274C4D0BCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: C818FC second address: C8190F instructions: 0x00000000 rdtsc 0x00000002 ja 00007F4274B9D756h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0E290 second address: D0E295 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0E433 second address: D0E44E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 jmp 00007F4274B9D761h 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0E44E second address: D0E454 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0E5BF second address: D0E5D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F4274B9D764h 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0E752 second address: D0E757 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D0E899 second address: D0E89E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D12FBD second address: D12FC1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D135C1 second address: D135CF instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 ja 00007F4274B9D756h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D13730 second address: D1373B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 pushad 0x00000007 popad 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D1373B second address: D1374B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274B9D75Bh 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D1430E second address: D1432E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4274C4D0C5h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D1432E second address: D14342 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4274B9D760h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D14342 second address: D14348 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D14348 second address: D14364 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F4274B9D766h 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D14364 second address: D14370 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F4274C4D0B6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D14370 second address: D14374 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D12B59 second address: D12B7C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F4274C4D0C5h 0x00000008 jns 00007F4274C4D0B6h 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D12B7C second address: D12B80 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D17320 second address: D1732D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F4274C4D0B6h 0x0000000a push esi 0x0000000b pop esi 0x0000000c popad 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D1732D second address: D17337 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007F4274B9D756h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D19B68 second address: D19B6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D19B6C second address: D19B70 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D19B70 second address: D19B76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D19B76 second address: D19B7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D19B7F second address: D19B85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D19705 second address: D19709 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D19709 second address: D1972C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274C4D0C3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jc 00007F4274C4D0BCh 0x0000000f jl 00007F4274C4D0B6h 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D1972C second address: D19738 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jns 00007F4274B9D756h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D19738 second address: D1973C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D1973C second address: D19742 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D19742 second address: D19758 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push eax 0x0000000b pop eax 0x0000000c jp 00007F4274C4D0B6h 0x00000012 pop eax 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D19758 second address: D19774 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F4274B9D756h 0x0000000a jnc 00007F4274B9D756h 0x00000010 jnc 00007F4274B9D756h 0x00000016 popad 0x00000017 push esi 0x00000018 push edx 0x00000019 pop edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D20704 second address: D20708 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D20708 second address: D20713 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D20713 second address: D20718 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D20718 second address: D2071D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D1FF5A second address: D1FF62 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D20235 second address: D2024E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4274B9D765h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D2024E second address: D20277 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F4274C4D0CFh 0x00000008 jmp 00007F4274C4D0C7h 0x0000000d pushad 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D20277 second address: D2027B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D2027B second address: D20281 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D20281 second address: D20287 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D20287 second address: D202A2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 jmp 00007F4274C4D0C2h 0x0000000a push eax 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D202A2 second address: D202AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D247C3 second address: D247CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 push ecx 0x00000008 pushad 0x00000009 popad 0x0000000a pop ecx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D24A6C second address: D24A83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 jmp 00007F4274B9D75Ah 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D24D1B second address: D24D32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4274C4D0C2h 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D24D32 second address: D24D38 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCB9BF second address: CCB9C5 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCB9C5 second address: CCB9CA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCB9CA second address: CCB9FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jg 00007F4274C4D0C0h 0x00000010 nop 0x00000011 mov edi, 6B2D7402h 0x00000016 push 00000004h 0x00000018 pushad 0x00000019 mov bx, 9380h 0x0000001d popad 0x0000001e push eax 0x0000001f push eax 0x00000020 push edx 0x00000021 jnp 00007F4274C4D0BCh 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCB9FD second address: CCBA01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: CCBA01 second address: CCBA0B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F4274C4D0B6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D2517E second address: D25184 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D28D11 second address: D28D38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 jg 00007F4274C4D0C2h 0x0000000d push edi 0x0000000e jmp 00007F4274C4D0BCh 0x00000013 pop edi 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D28D38 second address: D28D45 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 ja 00007F4274B9D756h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D2849F second address: D284A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D28A55 second address: D28A77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 jmp 00007F4274B9D767h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D28A77 second address: D28A8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push edx 0x00000006 jmp 00007F4274C4D0BBh 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d pop edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D28A8B second address: D28A90 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D28A90 second address: D28A96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D28A96 second address: D28A9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D2EA6F second address: D2EA75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D2ED0D second address: D2ED17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 push edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D2ED17 second address: D2ED1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D2ED1D second address: D2ED28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D2ED28 second address: D2ED34 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D2ED34 second address: D2ED3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F4274B9D756h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D2F867 second address: D2F888 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F4274C4D0B6h 0x0000000a push esi 0x0000000b pop esi 0x0000000c popad 0x0000000d jmp 00007F4274C4D0BAh 0x00000012 push eax 0x00000013 push edx 0x00000014 jp 00007F4274C4D0B6h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D2F888 second address: D2F88C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D2FE55 second address: D2FE59 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D30133 second address: D30145 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274B9D75Eh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D30145 second address: D30155 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 je 00007F4274C4D0B6h 0x0000000e push eax 0x0000000f pop eax 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D30155 second address: D30165 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jbe 00007F4274B9D756h 0x0000000e push edx 0x0000000f pop edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D30165 second address: D30169 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D30169 second address: D3018E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 jnp 00007F4274B9D758h 0x0000000e push eax 0x0000000f pop eax 0x00000010 push ecx 0x00000011 jmp 00007F4274B9D762h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D37EB5 second address: D37EEC instructions: 0x00000000 rdtsc 0x00000002 jl 00007F4274C4D0BAh 0x00000008 push eax 0x00000009 pop eax 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007F4274C4D0BCh 0x00000011 pop edx 0x00000012 pop eax 0x00000013 pushad 0x00000014 pushad 0x00000015 push ecx 0x00000016 pop ecx 0x00000017 jmp 00007F4274C4D0C7h 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D37EEC second address: D37EF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D37EF4 second address: D37EFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D37EFA second address: D37F05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D37F05 second address: D37F1F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a pop eax 0x0000000b jmp 00007F4274C4D0BDh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D38095 second address: D3809F instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F4274B9D756h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3822D second address: D3825D instructions: 0x00000000 rdtsc 0x00000002 jg 00007F4274C4D0B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edx 0x0000000b jmp 00007F4274C4D0BFh 0x00000010 pop edx 0x00000011 pop esi 0x00000012 push eax 0x00000013 push edx 0x00000014 jo 00007F4274C4D0BAh 0x0000001a pushad 0x0000001b popad 0x0000001c push edi 0x0000001d pop edi 0x0000001e jp 00007F4274C4D0B8h 0x00000024 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3825D second address: D38262 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D38262 second address: D3827D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F4274C4D0C0h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3827D second address: D38281 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D383ED second address: D383F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D389A9 second address: D389AE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D38B2F second address: D38B39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F4274C4D0B6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D38B39 second address: D38B58 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274B9D765h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D38B58 second address: D38B5E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3E760 second address: D3E770 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F4274B9D75Ah 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3E770 second address: D3E794 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274C4D0C2h 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push ecx 0x00000010 jc 00007F4274C4D0B6h 0x00000016 pop ecx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3E794 second address: D3E7AC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274B9D763h 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3EB9B second address: D3EBB0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007F4274C4D0BCh 0x0000000c push esi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3ECF4 second address: D3ECF8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3ECF8 second address: D3ED02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3ED02 second address: D3ED12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4274B9D75Ch 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3ED12 second address: D3ED30 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F4274C4D0C5h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3EE56 second address: D3EE5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3F224 second address: D3F22A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3F22A second address: D3F241 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 jmp 00007F4274B9D75Dh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3F3AE second address: D3F3B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3F3B5 second address: D3F3C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F4274B9D756h 0x0000000a push edi 0x0000000b pop edi 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3F3C1 second address: D3F3D6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274C4D0BEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3F55B second address: D3F5A3 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 pushad 0x00000007 jmp 00007F4274B9D767h 0x0000000c jmp 00007F4274B9D75Eh 0x00000011 jne 00007F4274B9D756h 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a pushad 0x0000001b pushad 0x0000001c pushad 0x0000001d popad 0x0000001e jmp 00007F4274B9D75Dh 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D3FB92 second address: D3FB9C instructions: 0x00000000 rdtsc 0x00000002 jc 00007F4274C4D0B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D485FB second address: D485FF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D58612 second address: D58653 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4274C4D0C5h 0x00000009 push edx 0x0000000a pop edx 0x0000000b push edi 0x0000000c pop edi 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F4274C4D0C4h 0x00000015 jmp 00007F4274C4D0BDh 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D5831D second address: D58321 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D5B12E second address: D5B136 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D5AAFA second address: D5AB01 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D5AC75 second address: D5AC97 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F4274C4D0B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jg 00007F4274C4D0B6h 0x00000012 jmp 00007F4274C4D0C0h 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D5AC97 second address: D5ACA1 instructions: 0x00000000 rdtsc 0x00000002 je 00007F4274B9D756h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D5F96A second address: D5F9A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4274C4D0C9h 0x00000009 pop edi 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F4274C4D0C8h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D5F9A3 second address: D5F9AD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D5F9AD second address: D5F9BA instructions: 0x00000000 rdtsc 0x00000002 jg 00007F4274C4D0B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D5F9BA second address: D5F9C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D6B2EE second address: D6B2F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D6B2F7 second address: D6B2FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D725D4 second address: D725DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push edi 0x00000008 pop edi 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D725DD second address: D725F2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274B9D761h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D725F2 second address: D725F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D725F8 second address: D72602 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnl 00007F4274B9D756h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D72602 second address: D72606 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D71433 second address: D71437 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D71437 second address: D7143D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D722DA second address: D722E2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D722E2 second address: D722E7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D722E7 second address: D722F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F4274B9D756h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D75C69 second address: D75C97 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F4274C4D0C5h 0x00000008 js 00007F4274C4D0B6h 0x0000000e pop eax 0x0000000f pushad 0x00000010 jmp 00007F4274C4D0BCh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D75C97 second address: D75C9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D8104A second address: D81052 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D81052 second address: D8105D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F4274B9D756h 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D8105D second address: D81062 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D90525 second address: D9053E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F4274B9D761h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D9053E second address: D90542 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D99E4A second address: D99E4E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D99E4E second address: D99E70 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F4274C4D0B6h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F4274C4D0C4h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D99E70 second address: D99E76 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D99E76 second address: D99E7A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D99E7A second address: D99E8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnp 00007F4274B9D756h 0x0000000e jp 00007F4274B9D756h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D99E8E second address: D99E92 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D998C0 second address: D998C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: DA3748 second address: DA374D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: DA6A42 second address: DA6A67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F4274B9D756h 0x0000000a jo 00007F4274B9D756h 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F4274B9D760h 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D9F78D second address: D9F7B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F4274C4D0C9h 0x00000009 jbe 00007F4274C4D0B6h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D9E480 second address: D9E486 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D9E5E9 second address: D9E5F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F4274C4D0BEh 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D9E5F5 second address: D9E613 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push edx 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F4274B9D762h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D9E613 second address: D9E657 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007F4274C4D0C1h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F4274C4D0BFh 0x00000013 push edi 0x00000014 jmp 00007F4274C4D0C9h 0x00000019 pop edi 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D9E657 second address: D9E66A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4274B9D75Dh 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D9E66A second address: D9E66E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: D9E66E second address: D9E672 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: B1DBE0 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: B1DAEF instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: CB85EC instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: CB6E10 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: CCAD39 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: B1DB94 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: D4D7BE instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeMemory allocated: 4F50000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 5110000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 7110000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C9184F rdtsc 0_2_00C9184F
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 3156Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CF0752 GetSystemInfo,VirtualAlloc,0_2_00CF0752
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: file.exe, file.exe, 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
Source: file.exe, 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: regmonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: gbdyllo
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: procmon_window_class
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: ollydbg
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: filemonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeFile opened: NTICE
Source: C:\Users\user\Desktop\file.exeFile opened: SICE
Source: C:\Users\user\Desktop\file.exeFile opened: SIWVID
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C9184F rdtsc 0_2_00C9184F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B1B7D6 LdrInitializeThunk,0_2_00B1B7D6
Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior
Source: file.exe, file.exe, 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 9Program Manager
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CE8E3A GetSystemTime,GetFileTime,0_2_00CE8E3A

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\Desktop\file.exeRegistry key value created / modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications DisableNotifications 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableIOAVProtection 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableRealtimeMonitoring 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\NotificationsRegistry value created: DisableNotifications 1Jump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry value created: TamperProtection 0Jump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AUOptionsJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AutoInstallMinorUpdatesJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate DoNotConnectToWindowsUpdateInternetLocationsJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
41
Disable or Modify Tools
LSASS Memory641
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
Bypass User Account Control
261
Virtualization/Sandbox Evasion
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS261
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets24
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
Software Packing
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
Bypass User Account Control
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1561688
Start date and time:2024-11-24 05:10:06 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 36s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:4
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal100.evad.winEXE@1/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\file.exe
File Type:CSV text
Category:dropped
Size (bytes):226
Entropy (8bit):5.360398796477698
Encrypted:false
SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
MD5:3A8957C6382192B71471BD14359D0B12
SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
Malicious:true
Reputation:high, very likely benign file
Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.4853558413886265
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:file.exe
File size:2'741'760 bytes
MD5:2a14be5464af09ff5e0d667dbb41e756
SHA1:5e3e9e8ee8c79a1c3bf51170f12f72ca84e851f0
SHA256:e90e0d0df0140e53ff17d719d1d0343cd5f51eaaae614509338461beb5d20944
SHA512:9087753d84f871c42f6520182992a6b08b99ba6ae36e042f39db7a1d4429d3fe665cbd1cbfae7a990df58161136c6b2497dd0e70ce31dcdf356df5b06183ee4a
SSDEEP:49152:sktikSuhCiz3cAFmB6p1qr9u+uhR90h2pomnDJ:sks1YCiz3cAFmB6etuho2pL
TLSH:C8C53B92750B71CFD88E17789527CD82996D43B90F2648D3E86C79FE6E63CC211B6C28
File Content Preview:MZ......................@...........z...................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P(,e.........."...0..$...........@*.. ...`....@.. ........................*......%*...`................................
Icon Hash:90cececece8e8eb0
Entrypoint:0x6a4000
Entrypoint Section:.taggant
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE
Time Stamp:0x652C2850 [Sun Oct 15 17:58:40 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:2eabe9054cad5152567f0699947a2c5b
Instruction
jmp 00007F42748C8A4Ah
lfs ebp, dword ptr [ecx]
add byte ptr [eax], al
add byte ptr [eax], al
add cl, ch
add byte ptr [eax], ah
add byte ptr [eax], al
add byte ptr [ebx], al
or al, byte ptr [eax]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], dh
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], cl
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [edx], ah
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [ecx], al
add byte ptr [eax], 00000000h
add byte ptr [eax], al
add byte ptr [eax], al
adc byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add cl, byte ptr [edx]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x80550x69.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000x59c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x81f80x8.idata
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
0x20000x40000x1200525f709cacd99aeeffd23f64cf5ead4cFalse0.9322916666666666OpenPGP Public Key7.790921165340799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x60000x59c0x600aae15e30898a02f09cc86ed48aa06b09False0.4140625data4.036947054771808IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata 0x80000x20000x200ec9cb51e8cb4ea49a56ee3cf434fb69eFalse0.1484375data0.9342685949460681IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
gvbjqmpu0xa0000x2980000x2976004c560dc945937f8e0cba999e6d175387unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
pcqkcyiw0x2a20000x20000x4006147aa86e436c5d32a3b90a6e1029237False0.740234375data5.757298100982861IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.taggant0x2a40000x40000x22008f5edd2f7311912455d9c6137c895d36False0.06686580882352941DOS executable (COM)0.6835113880787812IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x60900x30cdata0.42948717948717946
RT_MANIFEST0x63ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
DLLImport
kernel32.dlllstrcpy
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:23:11:13
Start date:23/11/2024
Path:C:\Users\user\Desktop\file.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\file.exe"
Imagebase:0xb10000
File size:2'741'760 bytes
MD5 hash:2A14BE5464AF09FF5E0D667DBB41E756
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:6.7%
    Dynamic/Decrypted Code Coverage:3.3%
    Signature Coverage:5.3%
    Total number of Nodes:360
    Total number of Limit Nodes:21
    execution_graph 7866 ce69af 7867 ce4ced GetCurrentThreadId 7866->7867 7868 ce69bb 7867->7868 7869 ce69d9 7868->7869 7870 ce53ff 2 API calls 7868->7870 7871 ce6a0a GetModuleHandleExA 7869->7871 7872 ce69e1 7869->7872 7870->7869 7871->7872 7873 ca33e9 7874 ca3baa LoadLibraryA 7873->7874 7875 ca3d78 7874->7875 7876 cf16ec 7878 cf16f8 7876->7878 7879 cf170a 7878->7879 7880 cf1313 2 API calls 7879->7880 7881 cf171c 7880->7881 7569 b1e475 7570 b1e9b7 VirtualAlloc 7569->7570 7572 b1ef10 7570->7572 7573 4f510f0 7574 4f51131 7573->7574 7577 ce7a41 7574->7577 7575 4f51151 7585 ce4ced GetCurrentThreadId 7577->7585 7579 ce7a4d 7580 ce7a66 7579->7580 7582 ce7a76 7579->7582 7587 ce6b2d 7580->7587 7583 ce7a7b CloseHandle 7582->7583 7584 ce7a6c 7583->7584 7584->7575 7586 ce4d05 7585->7586 7586->7579 7590 ce4b98 7587->7590 7591 ce4bae 7590->7591 7592 ce4bc8 7591->7592 7594 ce4b7c 7591->7594 7592->7584 7597 ce6b06 CloseHandle 7594->7597 7596 ce4b8c 7596->7592 7598 ce6b1a 7597->7598 7598->7596 7882 4f51510 7883 4f51558 ControlService 7882->7883 7884 4f5158f 7883->7884 7599 c9184f LoadLibraryA 7600 c9185d 7599->7600 7600->7600 7885 ce8da8 7886 ce4ced GetCurrentThreadId 7885->7886 7887 ce8db4 GetCurrentProcess 7886->7887 7888 ce8e00 7887->7888 7890 ce8dc4 7887->7890 7889 ce8e05 DuplicateHandle 7888->7889 7893 ce8dfb 7889->7893 7890->7888 7891 ce8def 7890->7891 7894 ce6b45 7891->7894 7897 ce6b6f 7894->7897 7895 ce6c02 7895->7893 7896 ce6b2d CloseHandle 7896->7895 7897->7895 7897->7896 7898 b1b7d6 7899 b1b7db 7898->7899 7900 b1b946 LdrInitializeThunk 7899->7900 7601 ce6504 7604 ce634c 7601->7604 7607 ce63b3 7604->7607 7606 ce6361 7609 ce63c0 7607->7609 7612 ce63d6 7609->7612 7610 ce63de 7615 ce64be 7610->7615 7616 ce64ab 7610->7616 7611 ce63fb 7614 ce4ced GetCurrentThreadId 7611->7614 7612->7610 7612->7611 7630 cf19c5 7612->7630 7617 ce6400 7614->7617 7619 ce64dc LoadLibraryExA 7615->7619 7620 ce64c8 LoadLibraryExW 7615->7620 7652 ce61eb 7616->7652 7626 ce53ff 7617->7626 7625 ce6482 7619->7625 7620->7625 7624 ce643f 7632 ce5d2b 7624->7632 7627 ce544d 7626->7627 7628 ce5410 7626->7628 7627->7610 7627->7624 7628->7627 7656 ce52a0 7628->7656 7676 cf19d4 7630->7676 7633 ce5d47 7632->7633 7634 ce5d51 7632->7634 7633->7625 7684 ce557e 7634->7684 7641 ce5da1 7642 ce5dce 7641->7642 7650 ce5e4b 7641->7650 7694 ce575c 7641->7694 7698 ce59f7 7642->7698 7645 ce5dd9 7645->7650 7703 ce596e 7645->7703 7647 ce5e06 7648 ce5e2e 7647->7648 7647->7650 7707 cf161a 7647->7707 7648->7650 7711 cf1313 7648->7711 7650->7633 7716 ce653d 7650->7716 7653 ce61f6 7652->7653 7654 ce6206 7653->7654 7655 ce6217 LoadLibraryExA 7653->7655 7654->7625 7655->7654 7658 ce52cd 7656->7658 7657 ce53d3 7657->7628 7658->7657 7659 ce52fb PathAddExtensionA 7658->7659 7660 ce5316 7658->7660 7659->7660 7666 ce5338 7660->7666 7668 ce4f41 7660->7668 7662 ce5381 7662->7657 7663 ce53aa 7662->7663 7665 ce4f41 lstrcmpiA 7662->7665 7663->7657 7667 ce4f41 lstrcmpiA 7663->7667 7664 ce4f41 lstrcmpiA 7664->7662 7665->7663 7666->7657 7666->7662 7666->7664 7667->7657 7669 ce4f5f 7668->7669 7670 ce4f76 7669->7670 7672 ce4ebe 7669->7672 7670->7666 7673 ce4ee9 7672->7673 7674 ce4f1b lstrcmpiA 7673->7674 7675 ce4f31 7673->7675 7674->7675 7675->7670 7677 cf19e4 7676->7677 7678 ce4ced GetCurrentThreadId 7677->7678 7683 cf1a36 7677->7683 7679 cf1a4c 7678->7679 7680 ce53ff 2 API calls 7679->7680 7681 cf1a5e 7680->7681 7682 ce53ff 2 API calls 7681->7682 7681->7683 7682->7683 7685 ce559a 7684->7685 7687 ce55f3 7684->7687 7686 ce55ca VirtualAlloc 7685->7686 7685->7687 7686->7687 7687->7633 7688 ce5624 VirtualAlloc 7687->7688 7689 ce5669 7688->7689 7689->7650 7690 ce56a1 7689->7690 7693 ce56c9 7690->7693 7691 ce5740 7691->7641 7692 ce56e2 VirtualAlloc 7692->7691 7692->7693 7693->7691 7693->7692 7695 ce5777 7694->7695 7697 ce577c 7694->7697 7695->7642 7696 ce57af lstrcmpiA 7696->7695 7696->7697 7697->7695 7697->7696 7699 ce5b03 7698->7699 7701 ce5a24 7698->7701 7699->7645 7701->7699 7718 ce5509 7701->7718 7726 ce661a 7701->7726 7704 ce5997 7703->7704 7705 ce59d8 7704->7705 7706 ce59af VirtualProtect 7704->7706 7705->7647 7706->7704 7706->7705 7708 cf16e7 7707->7708 7709 cf1636 7707->7709 7708->7648 7709->7708 7751 cf117e 7709->7751 7712 cf1324 7711->7712 7714 cf13a7 7711->7714 7712->7714 7715 cf117e VirtualProtect 7712->7715 7755 cf0fbd 7712->7755 7714->7650 7715->7712 7764 ce6549 7716->7764 7719 ce634c 17 API calls 7718->7719 7720 ce551c 7719->7720 7721 ce556e 7720->7721 7723 ce5545 7720->7723 7725 ce5562 7720->7725 7722 ce653d 2 API calls 7721->7722 7722->7725 7724 ce653d 2 API calls 7723->7724 7723->7725 7724->7725 7725->7701 7728 ce6623 7726->7728 7729 ce6632 7728->7729 7731 ce4ced GetCurrentThreadId 7729->7731 7734 ce663a 7729->7734 7730 ce6667 GetProcAddress 7736 ce665d 7730->7736 7732 ce6644 7731->7732 7733 ce6654 7732->7733 7732->7734 7737 ce607b 7733->7737 7734->7730 7738 ce6167 7737->7738 7739 ce609a 7737->7739 7738->7736 7739->7738 7740 ce60d7 lstrcmpiA 7739->7740 7741 ce6101 7739->7741 7740->7739 7740->7741 7741->7738 7743 ce5fc4 7741->7743 7744 ce5fd5 7743->7744 7745 ce6005 lstrcpyn 7744->7745 7750 ce6060 7744->7750 7748 ce6021 7745->7748 7745->7750 7746 ce5509 16 API calls 7747 ce604f 7746->7747 7749 ce661a 16 API calls 7747->7749 7747->7750 7748->7746 7748->7750 7749->7750 7750->7738 7754 cf1192 7751->7754 7752 cf11aa 7752->7709 7753 cf12cd VirtualProtect 7753->7754 7754->7752 7754->7753 7757 cf0fc4 7755->7757 7758 cf100e 7757->7758 7759 cf117e VirtualProtect 7757->7759 7760 cf0ecb 7757->7760 7758->7712 7759->7757 7763 cf0ee0 7760->7763 7761 cf0fa0 7761->7757 7762 cf0f6a GetModuleFileNameA 7762->7763 7763->7761 7763->7762 7765 ce6558 7764->7765 7767 ce4ced GetCurrentThreadId 7765->7767 7770 ce6560 7765->7770 7766 ce65ae FreeLibrary 7772 ce6595 7766->7772 7768 ce656a 7767->7768 7769 ce657a 7768->7769 7768->7770 7773 ce5f2b 7769->7773 7770->7766 7774 ce5f4e 7773->7774 7776 ce5f8e 7773->7776 7774->7776 7777 ce4ae7 7774->7777 7776->7772 7778 ce4af0 7777->7778 7779 ce4b08 7778->7779 7781 ce4ace 7778->7781 7779->7776 7782 ce653d 2 API calls 7781->7782 7783 ce4adb 7782->7783 7783->7778 7901 ce9524 7903 ce9530 7901->7903 7904 ce4ced GetCurrentThreadId 7903->7904 7905 ce953c 7904->7905 7907 ce955c 7905->7907 7908 ce9430 7905->7908 7910 ce943c 7908->7910 7911 ce9450 7910->7911 7912 ce4ced GetCurrentThreadId 7911->7912 7913 ce9468 7912->7913 7914 ce947d 7913->7914 7934 ce9349 7913->7934 7918 ce9485 7914->7918 7926 ce93ee IsBadWritePtr 7914->7926 7920 ce94f9 CreateFileA 7918->7920 7921 ce94d6 CreateFileW 7918->7921 7919 ce53ff 2 API calls 7922 ce94b8 7919->7922 7925 ce94c6 7920->7925 7921->7925 7922->7918 7923 ce94c0 7922->7923 7928 ce6c43 7923->7928 7927 ce9410 7926->7927 7927->7918 7927->7919 7930 ce6c50 7928->7930 7929 ce6c89 CreateFileA 7932 ce6cd5 7929->7932 7930->7929 7931 ce6d4b 7930->7931 7931->7925 7932->7931 7933 ce6b06 CloseHandle 7932->7933 7933->7931 7936 ce9358 GetWindowsDirectoryA 7934->7936 7937 ce9382 7936->7937 7938 cf17a2 7940 cf17ae 7938->7940 7941 cf17c0 7940->7941 7946 ce6365 7941->7946 7943 cf17cf 7944 cf17e8 7943->7944 7945 cf1313 GetModuleFileNameA VirtualProtect 7943->7945 7945->7944 7948 ce6371 7946->7948 7949 ce6386 7948->7949 7950 ce63b3 17 API calls 7949->7950 7951 ce63a4 7949->7951 7950->7951 7952 b22b1c 7954 b2364b 7952->7954 7953 b252fd 7954->7953 7956 cf08f3 7954->7956 7957 cf0901 7956->7957 7958 cf0921 7957->7958 7960 cf0bc3 7957->7960 7958->7953 7961 cf0bd3 7960->7961 7963 cf0bf6 7960->7963 7962 cf0fbd 2 API calls 7961->7962 7961->7963 7962->7963 7963->7957 7784 ce685c 7786 ce6868 7784->7786 7787 ce687c 7786->7787 7789 ce68a4 7787->7789 7790 ce68bd 7787->7790 7792 ce68c6 7790->7792 7793 ce68d5 7792->7793 7794 ce68dd 7793->7794 7795 ce4ced GetCurrentThreadId 7793->7795 7796 ce698e GetModuleHandleA 7794->7796 7797 ce6980 GetModuleHandleW 7794->7797 7798 ce68e7 7795->7798 7801 ce6915 7796->7801 7797->7801 7799 ce53ff 2 API calls 7798->7799 7800 ce6902 7798->7800 7799->7800 7800->7794 7800->7801 7964 ce92bd 7966 ce92c9 7964->7966 7967 ce4ced GetCurrentThreadId 7966->7967 7968 ce92d5 7967->7968 7970 ce92f5 7968->7970 7971 ce9214 7968->7971 7973 ce9220 7971->7973 7974 ce9234 7973->7974 7975 ce4ced GetCurrentThreadId 7974->7975 7976 ce924c 7975->7976 7984 ce5451 7976->7984 7979 ce9277 7980 ce53ff 2 API calls 7981 ce926f 7980->7981 7981->7979 7982 ce92a4 GetFileAttributesA 7981->7982 7983 ce9293 GetFileAttributesW 7981->7983 7982->7979 7983->7979 7985 ce5505 7984->7985 7986 ce5465 7984->7986 7985->7979 7985->7980 7986->7985 7987 ce52a0 2 API calls 7986->7987 7987->7986 7802 ce9e16 7804 ce9e22 7802->7804 7805 ce9e3a 7804->7805 7807 ce9e64 7805->7807 7808 ce9d50 7805->7808 7810 ce9d5c 7808->7810 7811 ce4ced GetCurrentThreadId 7810->7811 7812 ce9d6f 7811->7812 7813 ce9de8 7812->7813 7815 ce9dad 7812->7815 7817 ce9d89 7812->7817 7814 ce9ded CreateFileMappingA 7813->7814 7814->7817 7815->7817 7818 ce7427 7815->7818 7821 ce743e 7818->7821 7819 ce753b 7819->7817 7820 ce74a7 CreateFileA 7822 ce74ec 7820->7822 7821->7819 7821->7820 7822->7819 7823 ce6b06 CloseHandle 7822->7823 7823->7819 7824 cf1756 7826 cf1762 7824->7826 7827 cf1774 7826->7827 7828 ce634c 17 API calls 7827->7828 7829 cf1783 7828->7829 7830 cf179c 7829->7830 7831 cf1313 2 API calls 7829->7831 7831->7830 7988 ce9637 7990 ce9640 7988->7990 7991 ce4ced GetCurrentThreadId 7990->7991 7992 ce964c 7991->7992 7993 ce969c ReadFile 7992->7993 7994 ce9665 7992->7994 7993->7994 7995 ce9f74 7996 ce4ced GetCurrentThreadId 7995->7996 7997 ce9f80 7996->7997 7998 ce9fe8 MapViewOfFileEx 7997->7998 7999 ce9f99 7997->7999 7998->7999 8000 b1eb0b VirtualAlloc 8001 b1eb29 8000->8001 7832 cf0752 GetSystemInfo 7833 cf07b0 VirtualAlloc 7832->7833 7835 cf0772 7832->7835 7847 cf0a9e 7833->7847 7835->7833 7836 cf07f7 7837 cf08cc 7836->7837 7839 cf0a9e VirtualAlloc GetModuleFileNameA VirtualProtect 7836->7839 7838 cf08e8 GetModuleFileNameA VirtualProtect 7837->7838 7846 cf0890 7837->7846 7838->7846 7840 cf0821 7839->7840 7840->7837 7841 cf0a9e VirtualAlloc GetModuleFileNameA VirtualProtect 7840->7841 7842 cf084b 7841->7842 7842->7837 7843 cf0a9e VirtualAlloc GetModuleFileNameA VirtualProtect 7842->7843 7844 cf0875 7843->7844 7844->7837 7845 cf0a9e VirtualAlloc GetModuleFileNameA VirtualProtect 7844->7845 7844->7846 7845->7837 7849 cf0aa6 7847->7849 7850 cf0aba 7849->7850 7851 cf0ad2 7849->7851 7857 cf096a 7850->7857 7853 cf096a 2 API calls 7851->7853 7854 cf0ae3 7853->7854 7859 cf0af5 7854->7859 7862 cf0972 7857->7862 7860 cf0b06 VirtualAlloc 7859->7860 7861 cf0af1 7859->7861 7860->7861 7863 cf0985 7862->7863 7864 cf09c8 7863->7864 7865 cf0fbd 2 API calls 7863->7865 7865->7864 8002 4f50d48 8003 4f50d93 OpenSCManagerW 8002->8003 8005 4f50ddc 8003->8005 8006 4f51308 8007 4f51349 ImpersonateLoggedOnUser 8006->8007 8008 4f51376 8007->8008

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 134 cf0752-cf076c GetSystemInfo 135 cf0772-cf07aa 134->135 136 cf07b0-cf07f9 VirtualAlloc call cf0a9e 134->136 135->136 140 cf08df-cf08e4 call cf08e8 136->140 141 cf07ff-cf0823 call cf0a9e 136->141 148 cf08e6-cf08e7 140->148 141->140 147 cf0829-cf084d call cf0a9e 141->147 147->140 151 cf0853-cf0877 call cf0a9e 147->151 151->140 154 cf087d-cf088a 151->154 155 cf08b0-cf08c7 call cf0a9e 154->155 156 cf0890-cf08ab 154->156 159 cf08cc-cf08ce 155->159 160 cf08da 156->160 159->140 161 cf08d4 159->161 160->148 161->160
    APIs
    • GetSystemInfo.KERNELBASE(?,-117B5FEC), ref: 00CF075E
    • VirtualAlloc.KERNELBASE(00000000,00004000,00001000,00000004), ref: 00CF07BF
    Memory Dump Source
    • Source File: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: AllocInfoSystemVirtual
    • String ID:
    • API String ID: 3440192736-0
    • Opcode ID: 8133b710f08717ccc7353ca7c338833e5b0a04b9d8c439e1d35e5742044e50aa
    • Instruction ID: 8355fa8ffb26b2db36e7f2147d3e7734e5a156122610f068aaaf80b7bee3529c
    • Opcode Fuzzy Hash: 8133b710f08717ccc7353ca7c338833e5b0a04b9d8c439e1d35e5742044e50aa
    • Instruction Fuzzy Hash: EC411371E0420BADE765DF608846FA676ACFB84B41F104162B607D98C3E67095D49BD1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 222 c9184f-c91853 LoadLibraryA 223 c9185d-c9192f 222->223 226 c91931-c919a6 223->226 226->226 227 c919a8-c919c3 226->227
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID:
    • API String ID: 1029625771-0
    • Opcode ID: d28a8c5bade7cffc44ae4884fa38a888e1f62a289a72919b54691b19fd48df63
    • Instruction ID: 5d4eb23da8ce87375d923b2777e3981de39fc6e56d1d01284a61ea2842665252
    • Opcode Fuzzy Hash: d28a8c5bade7cffc44ae4884fa38a888e1f62a289a72919b54691b19fd48df63
    • Instruction Fuzzy Hash: 634156B250C600DFE302AF2AD8856B9BBE4EF88710F16482DE6C487645E6354484CB97
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID:
    • String ID: !!iH
    • API String ID: 0-3430752988
    • Opcode ID: 496f08e7352effe1be7b4071295d1768490a3dc6b1672ef378272142aa720233
    • Instruction ID: e113626a2f3f1d4c91af8f581f393f3715ddcfbee85c6f4d7bbaeb85b7d595d7
    • Opcode Fuzzy Hash: 496f08e7352effe1be7b4071295d1768490a3dc6b1672ef378272142aa720233
    • Instruction Fuzzy Hash: E0E0C232104889CAEB169F308A01FDA7A9EEB44B01FE00194FA418AE45CF3D4D52C795

    Control-flow Graph

    APIs
    • LoadLibraryExW.KERNEL32(?,?,?), ref: 00CE64D1
    • LoadLibraryExA.KERNELBASE(00000000,?,?), ref: 00CE64E5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID: .dll$.exe$1002
    • API String ID: 1029625771-847511843
    • Opcode ID: e583ae4eba084bf4d6e974bc46afaea889078b9d33f1d8e01c840a172c81334e
    • Instruction ID: 272e88e7dcb4da0d762ec950b9cd8675ef27b548c32c85d5c370a5a1f868b7ed
    • Opcode Fuzzy Hash: e583ae4eba084bf4d6e974bc46afaea889078b9d33f1d8e01c840a172c81334e
    • Instruction Fuzzy Hash: E131F23141428AFFDF25EF52DA05AAD7F74FF28380F108025F912560A1C771DAA0EB61

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 40 ce68c6-ce68d7 call ce622a 43 ce68dd 40->43 44 ce68e2-ce68eb call ce4ced 40->44 45 ce6976-ce697a 43->45 51 ce691f-ce6926 44->51 52 ce68f1-ce68fd call ce53ff 44->52 47 ce698e-ce6991 GetModuleHandleA 45->47 48 ce6980-ce6989 GetModuleHandleW 45->48 50 ce6997 47->50 48->50 54 ce69a1-ce69a3 50->54 55 ce692c-ce6933 51->55 56 ce6971 call ce4d98 51->56 58 ce6902-ce6904 52->58 55->56 59 ce6939-ce6940 55->59 56->45 58->56 60 ce690a-ce690f 58->60 59->56 61 ce6946-ce694d 59->61 60->56 62 ce6915-ce699c call ce4d98 60->62 61->56 63 ce6953-ce6967 61->63 62->54 63->56
    APIs
    • GetModuleHandleW.KERNEL32(?,?,?,?,00CE6858,?,00000000,00000000), ref: 00CE6983
    • GetModuleHandleA.KERNEL32(00000000,?,?,?,00CE6858,?,00000000,00000000), ref: 00CE6991
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: HandleModule
    • String ID: .dll
    • API String ID: 4139908857-2738580789
    • Opcode ID: fb8eba6bfd092ce0d7cfb73c0300ab7bdbdf4802d8afb898479ecd894e0dff05
    • Instruction ID: eafc5e98b087654365f82e51f7354bc2c89ffaad1410fb62fa7bbe11182aa765
    • Opcode Fuzzy Hash: fb8eba6bfd092ce0d7cfb73c0300ab7bdbdf4802d8afb898479ecd894e0dff05
    • Instruction Fuzzy Hash: C411523411878AEBDF34DF27D80D769BBB0BF243C5F144221B811454A6CBB5A6E0DA92

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 67 ce9220-ce922e 68 ce9234-ce923b 67->68 69 ce9240 67->69 70 ce9247-ce925d call ce4ced call ce5451 68->70 69->70 75 ce927c 70->75 76 ce9263-ce9271 call ce53ff 70->76 78 ce9280-ce9283 75->78 81 ce9288-ce928d 76->81 82 ce9277 76->82 80 ce92b3-ce92ba call ce4d98 78->80 84 ce92a4-ce92a7 GetFileAttributesA 81->84 85 ce9293-ce929f GetFileAttributesW 81->85 82->78 87 ce92ad-ce92ae 84->87 85->87 87->80
    APIs
    • GetFileAttributesW.KERNELBASE(00F5122C,-117B5FEC), ref: 00CE9299
    • GetFileAttributesA.KERNEL32(00000000,-117B5FEC), ref: 00CE92A7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: AttributesFile
    • String ID: @
    • API String ID: 3188754299-2726393805
    • Opcode ID: 4bf587257425adee21db6cd85459b04ce9264712cd8c236dffb679eb3f3a1fe4
    • Instruction ID: 481bf3144850dfd33f55482e553f3264bdbeebd44477673a6dcea9e5ccecec24
    • Opcode Fuzzy Hash: 4bf587257425adee21db6cd85459b04ce9264712cd8c236dffb679eb3f3a1fe4
    • Instruction Fuzzy Hash: 79018CB1544685FADF219F66C909B9CBF70EF45348F208120EA12AA0A1C3B18B91EB40

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 88 ce52a0-ce52d0 90 ce53fb-ce53fc 88->90 91 ce52d6-ce52eb 88->91 91->90 93 ce52f1-ce52f5 91->93 94 ce52fb-ce530d PathAddExtensionA 93->94 95 ce5317-ce531e 93->95 98 ce5316 94->98 96 ce5324-ce5333 call ce4f41 95->96 97 ce5340-ce5347 95->97 104 ce5338-ce533a 96->104 100 ce534d-ce5354 97->100 101 ce5389-ce5390 97->101 98->95 105 ce536d-ce537c call ce4f41 100->105 106 ce535a-ce5363 100->106 102 ce5396-ce53ac call ce4f41 101->102 103 ce53b2-ce53b9 101->103 102->90 102->103 109 ce53bf-ce53d5 call ce4f41 103->109 110 ce53db-ce53e2 103->110 104->90 104->97 112 ce5381-ce5383 105->112 106->105 111 ce5369 106->111 109->90 109->110 110->90 115 ce53e8-ce53f5 call ce4f7a 110->115 111->105 112->90 112->101 115->90
    APIs
    • PathAddExtensionA.KERNELBASE(?,00000000), ref: 00CE5302
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: ExtensionPath
    • String ID: \\?\
    • API String ID: 158807944-4282027825
    • Opcode ID: bf54d257a8d4aa238b567e6a497f92c3c11c7d0749d3a8329f0bf334f597ccc9
    • Instruction ID: 27b89b5899264ef07a5dd7af625fdfddb03b7707a0fed416060a332550dd84c4
    • Opcode Fuzzy Hash: bf54d257a8d4aa238b567e6a497f92c3c11c7d0749d3a8329f0bf334f597ccc9
    • Instruction Fuzzy Hash: 24312A71A00689FFDF218F96CD09B9EB77AFF08748F004154F910A60A0D7B29A65DF64

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 119 ce69af-ce69c2 call ce4ced 122 ce69c8-ce69d4 call ce53ff 119->122 123 ce6a05-ce6a19 call ce4d98 GetModuleHandleExA 119->123 126 ce69d9-ce69db 122->126 129 ce6a23-ce6a25 123->129 126->123 128 ce69e1-ce69e8 126->128 130 ce69ee 128->130 131 ce69f1-ce6a1e call ce4d98 128->131 130->131 131->129
    APIs
      • Part of subcall function 00CE4CED: GetCurrentThreadId.KERNEL32 ref: 00CE4CFC
    • GetModuleHandleExA.KERNELBASE(?,?,?), ref: 00CE6A13
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: CurrentHandleModuleThread
    • String ID: .dll
    • API String ID: 2752942033-2738580789
    • Opcode ID: bcd0b1653ea54ac7715c85c8fa86b71aba8689ca40923282dc86456f92117364
    • Instruction ID: 5d27160466cf12a8158fc9a00e30aad1363bc75a0ad0d3b872ecb799f7274bcb
    • Opcode Fuzzy Hash: bcd0b1653ea54ac7715c85c8fa86b71aba8689ca40923282dc86456f92117364
    • Instruction Fuzzy Hash: 2AF0B476510285AFDF10DF56C949BAD3BB4FF28384F118020FE1596052D771C660FB21

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 162 ce943c-ce944a 163 ce945c 162->163 164 ce9450-ce9457 162->164 165 ce9463-ce946f call ce4ced 163->165 164->165 168 ce948a-ce949a call ce93ee 165->168 169 ce9475-ce947f call ce9349 165->169 175 ce94ac-ce94ba call ce53ff 168->175 176 ce94a0-ce94a7 168->176 169->168 174 ce9485 169->174 177 ce94cb-ce94d0 174->177 175->177 183 ce94c0-ce94c1 call ce6c43 175->183 176->177 179 ce94f9-ce950e CreateFileA 177->179 180 ce94d6-ce94f4 CreateFileW 177->180 182 ce9514-ce9515 179->182 180->182 185 ce951a-ce9521 call ce4d98 182->185 186 ce94c6 183->186 186->185
    APIs
    • CreateFileW.KERNELBASE(00F5122C,?,?,-117B5FEC,?,?,?,-117B5FEC,?), ref: 00CE94EE
      • Part of subcall function 00CE93EE: IsBadWritePtr.KERNEL32(?,00000004), ref: 00CE93FC
    • CreateFileA.KERNEL32(?,?,?,-117B5FEC,?,?,?,-117B5FEC,?), ref: 00CE950E
    Memory Dump Source
    • Source File: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: CreateFile$Write
    • String ID:
    • API String ID: 1125675974-0
    • Opcode ID: 807f51de7a4115f1f60f859104e3ab621c3faa22e55cfed795bdaf70ecb3b261
    • Instruction ID: a7aad7d9cad88782aabc101c207b1e3e9bbda3144a59a1705a6fc9dac6fca855
    • Opcode Fuzzy Hash: 807f51de7a4115f1f60f859104e3ab621c3faa22e55cfed795bdaf70ecb3b261
    • Instruction Fuzzy Hash: 2411263200428AFBDF229FA6DD09BAD3B72FF49344F148115F915640A1C3768AB2FB91

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 189 ce8da8-ce8dbe call ce4ced GetCurrentProcess 192 ce8dc4-ce8dc7 189->192 193 ce8e00-ce8e22 call ce4d98 DuplicateHandle 189->193 192->193 194 ce8dcd-ce8dd0 192->194 199 ce8e2c-ce8e2e 193->199 194->193 196 ce8dd6-ce8de9 call ce4b47 194->196 196->193 201 ce8def-ce8e27 call ce6b45 call ce4d98 196->201 201->199
    APIs
      • Part of subcall function 00CE4CED: GetCurrentThreadId.KERNEL32 ref: 00CE4CFC
    • GetCurrentProcess.KERNEL32(-117B5FEC), ref: 00CE8DB5
    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00CE8E1B
    Memory Dump Source
    • Source File: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: Current$DuplicateHandleProcessThread
    • String ID:
    • API String ID: 3748180921-0
    • Opcode ID: fccf7302089c0105de067956b115c23d539cabd31f9ab0822ac34e64448668e5
    • Instruction ID: 2b28af25afb20795af3888a6bab75f073c9dd27bfbf1d12845249aab4e5671e1
    • Opcode Fuzzy Hash: fccf7302089c0105de067956b115c23d539cabd31f9ab0822ac34e64448668e5
    • Instruction Fuzzy Hash: 9001193A10018ABB8F22AFA6CC09DAE3B3ABF583547144511FA1992015CB36D275EB61

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 228 cf117e-cf118c 229 cf11af-cf11b9 call cf1013 228->229 230 cf1192-cf11a4 228->230 235 cf11bf 229->235 236 cf11c4-cf11cd 229->236 230->229 234 cf11aa 230->234 239 cf130e-cf1310 234->239 235->239 237 cf11e5-cf11ec 236->237 238 cf11d3-cf11da 236->238 241 cf11f7-cf1207 237->241 242 cf11f2 237->242 238->237 240 cf11e0 238->240 240->239 241->239 243 cf120d-cf1219 call cf10e8 241->243 242->239 246 cf121c-cf1220 243->246 246->239 247 cf1226-cf1230 246->247 248 cf1257-cf125a 247->248 249 cf1236-cf1249 247->249 250 cf125d-cf1260 248->250 249->248 256 cf124f-cf1251 249->256 251 cf1306-cf1309 250->251 252 cf1266-cf126d 250->252 251->246 254 cf129b-cf12b4 252->254 255 cf1273-cf1279 252->255 262 cf12cd-cf12d5 VirtualProtect 254->262 263 cf12ba-cf12c8 254->263 257 cf127f-cf1284 255->257 258 cf1296 255->258 256->248 256->251 257->258 259 cf128a-cf1290 257->259 260 cf12fe-cf1301 258->260 259->254 259->258 260->250 264 cf12db-cf12de 262->264 263->264 264->260 266 cf12e4-cf12fd 264->266 266->260
    Memory Dump Source
    • Source File: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a4fe5a85924b267a5ff0b326c06c427380ced4d7665dcac3fe905c82c9f35fe8
    • Instruction ID: 66ef26d1403ddacf94b68413c76a84fce526673d9810bd78ebc17f4a939b0e82
    • Opcode Fuzzy Hash: a4fe5a85924b267a5ff0b326c06c427380ced4d7665dcac3fe905c82c9f35fe8
    • Instruction Fuzzy Hash: 19416A71A00109EFDB65CF94C944BBE77B1FF44315F288055EE12AA591C370AE94EB52

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 268 ce7427-ce7438 269 ce743e-ce7452 call ce4dcb 268->269 270 ce7467-ce7470 call ce4dcb 268->270 281 ce7555 269->281 282 ce7458-ce7466 269->282 275 ce754d-ce7550 call ce4df0 270->275 276 ce7476-ce7487 call ce6c09 270->276 275->281 283 ce748d-ce7491 276->283 284 ce74a7-ce74e6 CreateFileA 276->284 285 ce755c-ce7560 281->285 282->270 286 ce7497-ce74a3 call cebc91 283->286 287 ce74a4 283->287 288 ce74ec-ce7509 284->288 289 ce750a-ce750d 284->289 286->287 287->284 288->289 292 ce7513-ce752a call ce4b0d 289->292 293 ce7540-ce7548 call ce6a98 289->293 292->285 300 ce7530-ce753b call ce6b06 292->300 293->281 300->281
    APIs
    • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,?,00000000,00000010), ref: 00CE74DC
    Memory Dump Source
    • Source File: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 157171dd12ba40ad1f40173f107f83bd629c5ac1488c30fb0f228bf47e3db838
    • Instruction ID: 652ff50dd5c0664f613671230e95285e82f86d1535fb07e14c70f72ad98451ab
    • Opcode Fuzzy Hash: 157171dd12ba40ad1f40173f107f83bd629c5ac1488c30fb0f228bf47e3db838
    • Instruction Fuzzy Hash: 7631DE71504244FAEF209FA6DC49F9EBBB8FF08324F208269F515AA1C1D7319A51EF10

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 303 ce6c43-ce6c52 call ce4dcb 306 ce6d58 303->306 307 ce6c58-ce6c69 call ce6c09 303->307 309 ce6d5f-ce6d63 306->309 311 ce6c6f-ce6c73 307->311 312 ce6c89-ce6ccf CreateFileA 307->312 313 ce6c79-ce6c85 call cebc91 311->313 314 ce6c86 311->314 315 ce6d1a-ce6d1d 312->315 316 ce6cd5-ce6cf6 312->316 313->314 314->312 317 ce6d23-ce6d3a call ce4b0d 315->317 318 ce6d50-ce6d53 call ce6a98 315->318 316->315 325 ce6cfc-ce6d19 316->325 317->309 326 ce6d40-ce6d4b call ce6b06 317->326 318->306 325->315 326->306
    APIs
    • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,?,00000000), ref: 00CE6CC5
    Memory Dump Source
    • Source File: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: f3771c75e4f6d7f3996fa1c7add82904bec96dc1747987ecb5433d372c94ea96
    • Instruction ID: dbcd625c6335a16d2278916121307f0e28ffe7b1878b978cb9690a8fa71ba3cb
    • Opcode Fuzzy Hash: f3771c75e4f6d7f3996fa1c7add82904bec96dc1747987ecb5433d372c94ea96
    • Instruction Fuzzy Hash: 0331F071600205BAEB308F66DC46F99B7B8FF14764F308329F621AA0D1C3B2A641DB54

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 330 cf0ecb-cf0eda 331 cf0ee6-cf0efa 330->331 332 cf0ee0 330->332 334 cf0fb8-cf0fba 331->334 335 cf0f00-cf0f0a 331->335 332->331 336 cf0fa7-cf0fb3 335->336 337 cf0f10-cf0f1a 335->337 336->331 337->336 338 cf0f20-cf0f2a 337->338 338->336 339 cf0f30-cf0f3f 338->339 341 cf0f4a-cf0f4f 339->341 342 cf0f45 339->342 341->336 343 cf0f55-cf0f64 341->343 342->336 343->336 344 cf0f6a-cf0f81 GetModuleFileNameA 343->344 344->336 345 cf0f87-cf0f95 call cf0e27 344->345 348 cf0f9b 345->348 349 cf0fa0-cf0fa2 345->349 348->336 349->334
    APIs
    • GetModuleFileNameA.KERNELBASE(?,?,0000028A,?,?), ref: 00CF0F78
    Memory Dump Source
    • Source File: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: FileModuleName
    • String ID:
    • API String ID: 514040917-0
    • Opcode ID: 3461fd23f8926dc974d0a9868abe8d79e6c6b9b213008bc20999482732c99905
    • Instruction ID: 08b7bffcf5a3c93c3e11de61ecbf407ae8b493ac2fd5441f39188910868dda44
    • Opcode Fuzzy Hash: 3461fd23f8926dc974d0a9868abe8d79e6c6b9b213008bc20999482732c99905
    • Instruction Fuzzy Hash: C411DA71A0132DDFEBB44A488C45FFBB76CEF44B50F304095EA95E6043D7709E818AA2
    APIs
    • OpenSCManagerW.SECHOST(00000000,00000000,?), ref: 04F50DCD
    Memory Dump Source
    • Source File: 00000000.00000002.1995018068.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f50000_file.jbxd
    Similarity
    • API ID: ManagerOpen
    • String ID:
    • API String ID: 1889721586-0
    • Opcode ID: ae0b29107cba9dbdc7457d4a065388a3301e4e1a7bd789719ab981ffa0bdf9df
    • Instruction ID: d5384494b2b99ffd6c672ebe0f5e5c88ea6e7b4b1e911b61dd8b939bec0e475a
    • Opcode Fuzzy Hash: ae0b29107cba9dbdc7457d4a065388a3301e4e1a7bd789719ab981ffa0bdf9df
    • Instruction Fuzzy Hash: 062133B6D00208CFCB10CF99D485BDEFBF1FB88320F14822AD908AB254DB34A545CBA4
    APIs
    • OpenSCManagerW.SECHOST(00000000,00000000,?), ref: 04F50DCD
    Memory Dump Source
    • Source File: 00000000.00000002.1995018068.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f50000_file.jbxd
    Similarity
    • API ID: ManagerOpen
    • String ID:
    • API String ID: 1889721586-0
    • Opcode ID: 72808a192b4a19ebaef08b38ab257b8ae307fcb533503e3ed05f574449e2b990
    • Instruction ID: 592549d5ffd37ff81a466bbf5639bc87b054452a3636328c3a540a9693d75642
    • Opcode Fuzzy Hash: 72808a192b4a19ebaef08b38ab257b8ae307fcb533503e3ed05f574449e2b990
    • Instruction Fuzzy Hash: 642113B6C01218DFCB50CF99D885ADEFBF4EB88320F14856AD908AB214DB74A541CBA5
    APIs
    • ControlService.ADVAPI32(?,?,?), ref: 04F51580
    Memory Dump Source
    • Source File: 00000000.00000002.1995018068.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f50000_file.jbxd
    Similarity
    • API ID: ControlService
    • String ID:
    • API String ID: 253159669-0
    • Opcode ID: 9340dc9fb38099c7debd2940279967ee56657976b37b0c6f64f521a7a195eeaf
    • Instruction ID: a00960bc6afbb1710a78023f499f345e5400504573a32e965d0c946acb2b82ea
    • Opcode Fuzzy Hash: 9340dc9fb38099c7debd2940279967ee56657976b37b0c6f64f521a7a195eeaf
    • Instruction Fuzzy Hash: 6011F6B1D00249DFDB10CF9AC584BDEFBF4EB48320F108029E959A7250D378A644CFA5
    APIs
    • ControlService.ADVAPI32(?,?,?), ref: 04F51580
    Memory Dump Source
    • Source File: 00000000.00000002.1995018068.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f50000_file.jbxd
    Similarity
    • API ID: ControlService
    • String ID:
    • API String ID: 253159669-0
    • Opcode ID: 8fcf2536153562a3455801b35d767ba6deebe112b555b761beb57404a3cf7d02
    • Instruction ID: b3cae99b7f6c55205e8cb423008fe66fe47196b467b82aedb24c73e1ea417791
    • Opcode Fuzzy Hash: 8fcf2536153562a3455801b35d767ba6deebe112b555b761beb57404a3cf7d02
    • Instruction Fuzzy Hash: BE11E4B5D00249CFDB10CF9AC584BDEFBF4AB48320F10842AD959A7250D778A644CFA5
    APIs
      • Part of subcall function 00CE4CED: GetCurrentThreadId.KERNEL32 ref: 00CE4CFC
    • MapViewOfFileEx.KERNELBASE(?,?,?,?,?,?,-117B5FEC), ref: 00CE9FFB
    Memory Dump Source
    • Source File: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: CurrentFileThreadView
    • String ID:
    • API String ID: 1949693742-0
    • Opcode ID: 0fa1559dd0a597efc458019d1239f047a95f1be9b622ef028ec99f39b69bc703
    • Instruction ID: 3ac93d721e1ac5f69144b462651b5dc08eea249bdc8e867256d7e24e37246d17
    • Opcode Fuzzy Hash: 0fa1559dd0a597efc458019d1239f047a95f1be9b622ef028ec99f39b69bc703
    • Instruction Fuzzy Hash: DC11B33250018AEFCF12AFA6CC09DDE3B66BF59344B104411FA1296025C736D572FB62
    Memory Dump Source
    • Source File: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: CurrentThread
    • String ID:
    • API String ID: 2882836952-0
    • Opcode ID: 1350520cb8d1b774543a54363ed4ad321f8161ae49510580a8a4489897db77f7
    • Instruction ID: 8a6c522a582e646a674d15872aa7d7b8a4d6cd5328ab7cfc4d866a90d35380ef
    • Opcode Fuzzy Hash: 1350520cb8d1b774543a54363ed4ad321f8161ae49510580a8a4489897db77f7
    • Instruction Fuzzy Hash: 31112D365042DAEBCF12AFA6CC09E9E7B75EF48344F104111FA1196061C775CB71EB50
    APIs
    • ImpersonateLoggedOnUser.KERNELBASE ref: 04F51367
    Memory Dump Source
    • Source File: 00000000.00000002.1995018068.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f50000_file.jbxd
    Similarity
    • API ID: ImpersonateLoggedUser
    • String ID:
    • API String ID: 2216092060-0
    • Opcode ID: 3db23d2886e9fde24abe39949d83f1dd16f6c7c56b5eebc5ce5d28f7bfc0a029
    • Instruction ID: d81adc261a0bed225c8e7ca504fc713f1ebc9ae51552ce664c5f26bc2de118a9
    • Opcode Fuzzy Hash: 3db23d2886e9fde24abe39949d83f1dd16f6c7c56b5eebc5ce5d28f7bfc0a029
    • Instruction Fuzzy Hash: 431155B1900249CFDB10CF9AD584BDEFBF4EF48324F24842AD558A3650D778A585CFA5
    APIs
    • ImpersonateLoggedOnUser.KERNELBASE ref: 04F51367
    Memory Dump Source
    • Source File: 00000000.00000002.1995018068.0000000004F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F50000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f50000_file.jbxd
    Similarity
    • API ID: ImpersonateLoggedUser
    • String ID:
    • API String ID: 2216092060-0
    • Opcode ID: 5f31b6c35002305c9c93e13f07cf7c2775a75f198587d757a2a0fe8babeb81aa
    • Instruction ID: 079f1c199824ec1b5a02f3b3e5891dcb1c12bd9be41d4b8e76245825034fde47
    • Opcode Fuzzy Hash: 5f31b6c35002305c9c93e13f07cf7c2775a75f198587d757a2a0fe8babeb81aa
    • Instruction Fuzzy Hash: 971145B1C00249CFDB10CF9AC545BDEFBF8EB48320F20846AD958A3650D778A984CFA5
    APIs
      • Part of subcall function 00CE4CED: GetCurrentThreadId.KERNEL32 ref: 00CE4CFC
    • ReadFile.KERNELBASE(?,00000000,?,00000400,?,-117B5FEC,?,?,00CE736F,?,?,00000400,?,00000000,?,00000000), ref: 00CE96AC
    Memory Dump Source
    • Source File: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: CurrentFileReadThread
    • String ID:
    • API String ID: 2348311434-0
    • Opcode ID: 2eb9071e0ac0bdbc5e54af847dbc8d954f294af03124811cf4bba421ac599097
    • Instruction ID: d67136c1a14fad4125d2001f58f649a6ff5113fff9c9f5d9359541ef0467006a
    • Opcode Fuzzy Hash: 2eb9071e0ac0bdbc5e54af847dbc8d954f294af03124811cf4bba421ac599097
    • Instruction Fuzzy Hash: 6AF0C93210018AABCF125FA6CD09EDE3F6AFF59744F004022FA158A021D732C5A1EB61
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID:
    • API String ID: 1029625771-0
    • Opcode ID: 49af38d412ee8c1bdc381f531527d488e17254f0dff2f2221638d4deb20a5057
    • Instruction ID: 67cad1a3b678e6400ad0a42065ff742d974ce064d5c06ee3021721bee5b4265a
    • Opcode Fuzzy Hash: 49af38d412ee8c1bdc381f531527d488e17254f0dff2f2221638d4deb20a5057
    • Instruction Fuzzy Hash: 70F0FFB151D705EFC3002F2AD88626EF7E4FF15310F56492EE6C282680D63544809F47
    APIs
    • VirtualAlloc.KERNELBASE(00000000), ref: 00B1EB0D
    Memory Dump Source
    • Source File: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: a2dd0a5ce6a2c612c2da440d41e344615e3475d60ebbe0e3731a51366bda5320
    • Instruction ID: 22675a50650b1eb58735296f32437a35b43b8a4c9361006114631db22d2c4b74
    • Opcode Fuzzy Hash: a2dd0a5ce6a2c612c2da440d41e344615e3475d60ebbe0e3731a51366bda5320
    • Instruction Fuzzy Hash: 5D11597240C3199FC3402E68ECC86FB7AE8DF05720F694A3AAA61D2E40D1619990D296
    APIs
    • VirtualAlloc.KERNELBASE(00000000), ref: 00B1EEFE
    Memory Dump Source
    • Source File: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: aea93e07ce3b0554554877026480e4b925d2b6fbfece6ddd13a319aa13d82a33
    • Instruction ID: f2dc1ffe91f5412e5c65d4118bfa0167839201665b9def1eadec2c799d0d7874
    • Opcode Fuzzy Hash: aea93e07ce3b0554554877026480e4b925d2b6fbfece6ddd13a319aa13d82a33
    • Instruction Fuzzy Hash: 490180B2508604DBD7006F08D8847BE7BE4EF58710F69466CFEE147780E635ACA4DA83
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: lstrcmpi
    • String ID:
    • API String ID: 1586166983-0
    • Opcode ID: 31f8fe9fedc0143e979395b568fa18d7ac11fa36239d32552ff4ca19cf5c3dc1
    • Instruction ID: 4bf01a2b3b71ed3c1114b2b00853208dfcc508d9ca1de840a072a867b2cbac25
    • Opcode Fuzzy Hash: 31f8fe9fedc0143e979395b568fa18d7ac11fa36239d32552ff4ca19cf5c3dc1
    • Instruction Fuzzy Hash: 0601E432A00549FFCF119FA6CC04D9EBBBAFF48740F0051A1B914A5060D7328A61EF60
    APIs
    • VirtualAlloc.KERNELBASE(00000000,00001000,00001000,00000004,?,?,00CF0AF1,?,?,00CF07F7,?,?,00CF07F7,?,?,00CF07F7), ref: 00CF0B15
    Memory Dump Source
    • Source File: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: a40ca083aebc60df8ade7cca91ccc35d08d0a9e548efa0130ccedfedbeef5dc0
    • Instruction ID: ba71dc05cfe4a40bb543a3a1ecfe0c71d87b98bb95ffdee42c5182a8be115564
    • Opcode Fuzzy Hash: a40ca083aebc60df8ade7cca91ccc35d08d0a9e548efa0130ccedfedbeef5dc0
    • Instruction Fuzzy Hash: B5F0F4B1A0420AEFDB25CF04CD05B69BBF0FF85B62F208064F54AAB592D3B099C0CB51
    APIs
      • Part of subcall function 00CE4CED: GetCurrentThreadId.KERNEL32 ref: 00CE4CFC
    • CloseHandle.KERNELBASE(00CE7404,-117B5FEC,?,?,00CE7404,?), ref: 00CE7A7F
    Memory Dump Source
    • Source File: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: CloseCurrentHandleThread
    • String ID:
    • API String ID: 3305057742-0
    • Opcode ID: 6931c936bca6521921d74d4dfc6b59a8fb9aa5adb9778b6e320dd7a6f4e0bfbb
    • Instruction ID: e269342528d8eaa23948a3180d98867c7af5e318c4d28006534b78d9e01cd374
    • Opcode Fuzzy Hash: 6931c936bca6521921d74d4dfc6b59a8fb9aa5adb9778b6e320dd7a6f4e0bfbb
    • Instruction Fuzzy Hash: 78E086766141C7A6CE207FBBDC0DE9E6F68AF947847106231F102C6045DB75C2A2F361
    APIs
    • CloseHandle.KERNELBASE(?,?,00CE4B8C,?,?), ref: 00CE6B0C
    Memory Dump Source
    • Source File: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: CloseHandle
    • String ID:
    • API String ID: 2962429428-0
    • Opcode ID: d6c1acfacd3ad734a15d98b8ab6c8456a58aed851bfb2b143501a44688e2eb59
    • Instruction ID: 63c4397d58b14e4dd71e98406cf6080575d6187279244ce8faddd5b5681913ec
    • Opcode Fuzzy Hash: d6c1acfacd3ad734a15d98b8ab6c8456a58aed851bfb2b143501a44688e2eb59
    • Instruction Fuzzy Hash: 14B0923100050ABBCF41BF92EC0684DBF79BF253A8B10C520B90B54021CB72E961AB95
    APIs
      • Part of subcall function 00CE4CED: GetCurrentThreadId.KERNEL32 ref: 00CE4CFC
    • GetSystemTime.KERNEL32(?,-117B5FEC), ref: 00CE8E6F
    • GetFileTime.KERNEL32(?,?,?,?,-117B5FEC), ref: 00CE8EB2
    Memory Dump Source
    • Source File: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: Time$CurrentFileSystemThread
    • String ID:
    • API String ID: 2191017843-0
    • Opcode ID: 1fb025a36c36a545070ee02dd74fb2e54928f082140e6e88a72e9c30c861ceb3
    • Instruction ID: c69878498980b9cb8d3a8605a654d242de6da3e00ac4fde31a6446de17ee6d81
    • Opcode Fuzzy Hash: 1fb025a36c36a545070ee02dd74fb2e54928f082140e6e88a72e9c30c861ceb3
    • Instruction Fuzzy Hash: 2101243660058AFBCF21AF2ADC08D9F7F79FF89711B004122F51586160CB72D9A1EB60
    APIs
    • CryptVerifySignatureA.ADVAPI32(?,?,?,?,?,?), ref: 00CE9D3F
    Memory Dump Source
    • Source File: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: CryptSignatureVerify
    • String ID:
    • API String ID: 1015439381-0
    • Opcode ID: f021d3d82b6c7417df950221f61ba2f768a8986944c3e6afbf961c95368f94c5
    • Instruction ID: acaf2fbf78a3fb052267ebb0a378e42d701042099b06ce9f09067272960868b3
    • Opcode Fuzzy Hash: f021d3d82b6c7417df950221f61ba2f768a8986944c3e6afbf961c95368f94c5
    • Instruction Fuzzy Hash: 29F0F83260024EFFCF01CF95C9489CC7BB1FF18345B108125FA1596110C3759A61EF40
    Memory Dump Source
    • Source File: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 73632c9b4654f419d700a5449d88a689c9cb9158e95c833094c96d68ecef4db7
    • Instruction ID: 058e790d4b1503cfee0b0e387657b141b8286e54a1a8f66f934c5d173eef90bd
    • Opcode Fuzzy Hash: 73632c9b4654f419d700a5449d88a689c9cb9158e95c833094c96d68ecef4db7
    • Instruction Fuzzy Hash: 8051CEB3F512254BF3984D68CC983A27683DB95310F2F82788E89AB7C5DCBE5D095384
    Memory Dump Source
    • Source File: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 9805b364a8cdc49c194ec7c1ab7803298c043de0485c75b427d0eb95c347160c
    • Instruction ID: 32e6a6bd4ef9da897515609b23e7a55f642a4339db63d654c877d16ab38478c5
    • Opcode Fuzzy Hash: 9805b364a8cdc49c194ec7c1ab7803298c043de0485c75b427d0eb95c347160c
    • Instruction Fuzzy Hash: 80418EB351C304AFE701AF59EC81ABAFBE9FB59320F16492DE6C4D7610E67158408B93
    Memory Dump Source
    • Source File: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: fb220b9ff276c133576318158802b3e10e9df3f16773cf7e23857dd9a2b8fd4c
    • Instruction ID: a05ccef5fa20515f50963dfd4ce599a199409c150411707f8fe6e15e8917cfa7
    • Opcode Fuzzy Hash: fb220b9ff276c133576318158802b3e10e9df3f16773cf7e23857dd9a2b8fd4c
    • Instruction Fuzzy Hash: 59418CB250C304AFE701AF29EC816BAFBE9FF58324F06492DE6C487710D67158408B93
    APIs
      • Part of subcall function 00CE4CED: GetCurrentThreadId.KERNEL32 ref: 00CE4CFC
      • Part of subcall function 00CE93EE: IsBadWritePtr.KERNEL32(?,00000004), ref: 00CE93FC
    • wsprintfA.USER32 ref: 00CE83B6
    • LoadImageA.USER32(?,?,?,?,?,?), ref: 00CE847A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: CurrentImageLoadThreadWritewsprintf
    • String ID: %8x$%8x
    • API String ID: 439219941-2046107164
    • Opcode ID: fd0e887ec1c761b374a28ccbd15744e191a2b1043b5d4825c49bd845f6d8d41d
    • Instruction ID: 49eea56ccd10f928d078377ed6063f11934edb8d0b7e9e39a4f9f7253c422490
    • Opcode Fuzzy Hash: fd0e887ec1c761b374a28ccbd15744e191a2b1043b5d4825c49bd845f6d8d41d
    • Instruction Fuzzy Hash: DD31363190024AFFCF119F95DC49EEEBB79FF88710F108125FA15A61A0CB719A61EB60
    APIs
    • GetFileAttributesExW.KERNEL32(00F5122C,00004020,00000000,-117B5FEC), ref: 00CE902E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1993284961.0000000000CDE000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
    • Associated: 00000000.00000002.1992909163.0000000000B10000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992921777.0000000000B12000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992935327.0000000000B16000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992948347.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1992963019.0000000000B26000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993062025.0000000000C7E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993077819.0000000000C80000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C8F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993094858.0000000000C9A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993125756.0000000000CA4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993139390.0000000000CA5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993154364.0000000000CA6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993168260.0000000000CA7000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993183970.0000000000CB7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993196727.0000000000CB8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993214034.0000000000CC8000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993228084.0000000000CC9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993240862.0000000000CCB000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993252975.0000000000CCC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993267855.0000000000CD4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993299909.0000000000CED000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993313658.0000000000CEF000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993330752.0000000000CFF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993346256.0000000000D09000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993360273.0000000000D11000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993374023.0000000000D15000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993386845.0000000000D16000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993402245.0000000000D1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993416582.0000000000D23000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993429925.0000000000D26000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993443730.0000000000D27000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993458622.0000000000D29000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993472958.0000000000D31000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993487520.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993501403.0000000000D36000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993518922.0000000000D39000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993533196.0000000000D3A000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993547893.0000000000D42000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993567393.0000000000D5E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993580306.0000000000D5F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993605105.0000000000D99000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993619863.0000000000D9B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000D9C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993633700.0000000000DA3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993663441.0000000000DB2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1993675928.0000000000DB4000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b10000_file.jbxd
    Similarity
    • API ID: AttributesFile
    • String ID: @
    • API String ID: 3188754299-2726393805
    • Opcode ID: 434309f36618845c5b51407879f2a706fa4af634f1166844328813052eeca3a2
    • Instruction ID: 4bd40e8dbf3cfcd85263488540419ee2d93cd9a7ec4e2021505f2c13c375cf3d
    • Opcode Fuzzy Hash: 434309f36618845c5b51407879f2a706fa4af634f1166844328813052eeca3a2
    • Instruction Fuzzy Hash: D031CCB1504749EFDF24CF46C848B9EBBB1FF08300F008219E856676A0C3B5AAA4DB80