Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1561765
MD5:2f405290a54895095dba7ff04d7a5953
SHA1:e03dcaf483ba02c2145b3805d50f3c9d6fd50c7a
SHA256:4588027f22769e9207b98bc72c37b976154f0d0b6f58e2a13991787418f1544c
Tags:exeuser-Bitsight
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Hides threads from debuggers
Machine Learning detection for sample
Modifies windows update settings
PE file contains section with special chars
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Entry point lies outside standard sections
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 7844 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 2F405290A54895095DBA7FF04D7A5953)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeReversingLabs: Detection: 44%
Source: file.exeVirustotal: Detection: 54%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: file.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006F5FA3 CryptVerifySignatureA,0_2_006F5FA3
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: file.exe, 00000000.00000003.1420061486.0000000004B40000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmp

System Summary

barindex
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: C:\Users\user\Desktop\file.exeCode function: String function: 006F0F98 appears 31 times
Source: file.exe, 00000000.00000000.1409140817.0000000000516000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000002.1554348073.0000000000D0E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
Source: file.exeBinary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: classification engineClassification label: mal100.evad.winEXE@1/1@0/0
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.logJump to behavior
Source: C:\Users\user\Desktop\file.exeMutant created: NULL
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeReversingLabs: Detection: 44%
Source: file.exeVirustotal: Detection: 54%
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: file.exeStatic file information: File size 2813440 > 1048576
Source: file.exeStatic PE information: Raw size of pypdcipy is bigger than: 0x100000 < 0x2a8e00
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: file.exe, 00000000.00000003.1420061486.0000000004B40000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmp

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.510000.0.unpack :EW;.rsrc:W;.idata :W;pypdcipy:EW;mkjngwpv:EW;.taggant:EW; vs :ER;.rsrc:W;
Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
Source: file.exeStatic PE information: real checksum: 0x2b949c should be: 0x2af3cf
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: file.exeStatic PE information: section name: pypdcipy
Source: file.exeStatic PE information: section name: mkjngwpv
Source: file.exeStatic PE information: section name: .taggant
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069E942 push ebx; mov dword ptr [esp], 757FA430h0_2_0069E960
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069E942 push eax; mov dword ptr [esp], ecx0_2_0069E989
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00522042 push edx; mov dword ptr [esp], edi0_2_0052406B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0051E845 push 1BC6BE8Bh; mov dword ptr [esp], edi0_2_0051E85F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00521017 push edi; mov dword ptr [esp], 7EEC8ADDh0_2_00521CF7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069B02F push 784376C9h; mov dword ptr [esp], edi0_2_0069B03D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069B02F push 7649646Fh; mov dword ptr [esp], ebp0_2_0069B050
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00523033 push 0DDC5A60h; mov dword ptr [esp], eax0_2_00523056
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069B80F push 007769DAh; mov dword ptr [esp], edx0_2_0069B890
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00522838 push esi; mov dword ptr [esp], 7FF7369Dh0_2_00522842
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A1804 push edi; ret 0_2_006A1813
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005218D2 push ebx; mov dword ptr [esp], edi0_2_00524193
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0051E8C2 push esi; mov dword ptr [esp], ecx0_2_0051EA18
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A18F6 push eax; ret 0_2_006A1905
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069F0CC push eax; mov dword ptr [esp], 3FD97A52h0_2_0069F100
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069F0CC push esi; mov dword ptr [esp], edx0_2_0069F108
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069F0CC push ecx; mov dword ptr [esp], 1F7FF02Bh0_2_0069F13E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069F0CC push 41AC263Ah; mov dword ptr [esp], ebp0_2_0069F203
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A58DC push eax; mov dword ptr [esp], eax0_2_006A594E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A58DC push eax; mov dword ptr [esp], eax0_2_006A5970
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A58DC push eax; mov dword ptr [esp], eax0_2_006A59D4
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0051F090 push 0E900C01h; mov dword ptr [esp], ecx0_2_0051F09D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A18A4 push edx; ret 0_2_006A18B3
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069F0B3 push eax; mov dword ptr [esp], 3FD97A52h0_2_0069F100
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069F0B3 push esi; mov dword ptr [esp], edx0_2_0069F108
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069F0B3 push ecx; mov dword ptr [esp], 1F7FF02Bh0_2_0069F13E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069F0B3 push 41AC263Ah; mov dword ptr [esp], ebp0_2_0069F203
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0074389D push 32B99A40h; mov dword ptr [esp], esi0_2_007438BA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005208B9 push 2A91EFB0h; mov dword ptr [esp], edx0_2_00521B37
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069F96A push edx; mov dword ptr [esp], ebp0_2_0069FAC4
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069F96A push 1E9BFF71h; mov dword ptr [esp], edx0_2_0069FAF9
Source: file.exeStatic PE information: section name: entropy: 7.757169738716121

Boot Survival

barindex
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 692747 second address: 69274B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 69E6AD second address: 69E6B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 69EA88 second address: 69EA9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 jc 00007F921539ABF6h 0x0000000c push eax 0x0000000d pop eax 0x0000000e popad 0x0000000f push edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 69ED97 second address: 69EDAC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B851h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 69EDAC second address: 69EDC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F921539ABFFh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 69EDC7 second address: 69EDCB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 69EDCB second address: 69EDCF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 69EF35 second address: 69EF3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 69EF3B second address: 69EF56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push edi 0x00000006 jne 00007F921539ABF6h 0x0000000c pop edi 0x0000000d pop edx 0x0000000e push edi 0x0000000f js 00007F921539ABF8h 0x00000015 pushad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 push ebx 0x0000001a pop ebx 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 69EF56 second address: 69EF5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1640 second address: 6A1679 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F921539AC06h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp+04h], eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 jmp 00007F921539AC05h 0x00000018 popad 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1679 second address: 6A167F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A167F second address: 6A1683 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A16B9 second address: 6A1735 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop ecx 0x00000006 push eax 0x00000007 pushad 0x00000008 jmp 00007F921527B84Bh 0x0000000d jmp 00007F921527B853h 0x00000012 popad 0x00000013 nop 0x00000014 mov edx, dword ptr [ebp+122D2C9Ch] 0x0000001a push 00000000h 0x0000001c mov ecx, ebx 0x0000001e call 00007F921527B849h 0x00000023 jmp 00007F921527B859h 0x00000028 push eax 0x00000029 jne 00007F921527B85Eh 0x0000002f mov eax, dword ptr [esp+04h] 0x00000033 push edx 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1735 second address: 6A1739 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1739 second address: 6A1772 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F921527B846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b mov eax, dword ptr [eax] 0x0000000d pushad 0x0000000e push eax 0x0000000f jo 00007F921527B846h 0x00000015 pop eax 0x00000016 pushad 0x00000017 jbe 00007F921527B846h 0x0000001d jmp 00007F921527B850h 0x00000022 popad 0x00000023 popad 0x00000024 mov dword ptr [esp+04h], eax 0x00000028 push eax 0x00000029 push edx 0x0000002a push eax 0x0000002b push edx 0x0000002c push esi 0x0000002d pop esi 0x0000002e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1772 second address: 6A1785 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921539ABFFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1785 second address: 6A17BD instructions: 0x00000000 rdtsc 0x00000002 jo 00007F921527B848h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop eax 0x0000000d mov ecx, 528BA7FCh 0x00000012 push 00000003h 0x00000014 clc 0x00000015 push 00000000h 0x00000017 jnc 00007F921527B84Ch 0x0000001d movzx esi, cx 0x00000020 push 00000003h 0x00000022 sub dword ptr [ebp+122D219Bh], esi 0x00000028 push B252FD61h 0x0000002d pushad 0x0000002e push eax 0x0000002f push edx 0x00000030 push edi 0x00000031 pop edi 0x00000032 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A17BD second address: 6A1825 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921539AC05h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F921539ABFFh 0x0000000e popad 0x0000000f add dword ptr [esp], 0DAD029Fh 0x00000016 mov dword ptr [ebp+122D28EEh], esi 0x0000001c lea ebx, dword ptr [ebp+12457536h] 0x00000022 push 00000000h 0x00000024 push edi 0x00000025 call 00007F921539ABF8h 0x0000002a pop edi 0x0000002b mov dword ptr [esp+04h], edi 0x0000002f add dword ptr [esp+04h], 00000015h 0x00000037 inc edi 0x00000038 push edi 0x00000039 ret 0x0000003a pop edi 0x0000003b ret 0x0000003c mov dx, bx 0x0000003f mov ecx, dword ptr [ebp+122D2A3Ah] 0x00000045 xchg eax, ebx 0x00000046 push eax 0x00000047 push edx 0x00000048 pushad 0x00000049 push eax 0x0000004a push edx 0x0000004b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1825 second address: 6A182C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A18E2 second address: 6A1934 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push eax 0x0000000c call 00007F921539ABF8h 0x00000011 pop eax 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 add dword ptr [esp+04h], 0000001Bh 0x0000001e inc eax 0x0000001f push eax 0x00000020 ret 0x00000021 pop eax 0x00000022 ret 0x00000023 jmp 00007F921539ABFBh 0x00000028 push 00000000h 0x0000002a mov edi, eax 0x0000002c call 00007F921539ABF9h 0x00000031 push eax 0x00000032 push edx 0x00000033 jno 00007F921539ABFCh 0x00000039 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1934 second address: 6A194C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B84Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A194C second address: 6A1952 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1952 second address: 6A1956 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1956 second address: 6A1977 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c push esi 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F921539AC02h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1977 second address: 6A1985 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 mov eax, dword ptr [eax] 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1985 second address: 6A1989 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1989 second address: 6A1993 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1993 second address: 6A1997 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1997 second address: 6A19AB instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F921527B846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A19AB second address: 6A19AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A19AF second address: 6A19F4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B852h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b add dword ptr [ebp+122D1E62h], esi 0x00000011 push 00000003h 0x00000013 mov dword ptr [ebp+122D28EEh], edx 0x00000019 push 00000000h 0x0000001b mov edi, dword ptr [ebp+122D258Fh] 0x00000021 push 00000003h 0x00000023 mov dword ptr [ebp+122D28DAh], esi 0x00000029 call 00007F921527B849h 0x0000002e push eax 0x0000002f push edx 0x00000030 push eax 0x00000031 pushad 0x00000032 popad 0x00000033 pop eax 0x00000034 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A19F4 second address: 6A19FB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A19FB second address: 6A1A41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 je 00007F921527B84Ch 0x0000000f jnc 00007F921527B846h 0x00000015 pop eax 0x00000016 mov eax, dword ptr [esp+04h] 0x0000001a push esi 0x0000001b jnp 00007F921527B850h 0x00000021 jmp 00007F921527B84Ah 0x00000026 pop esi 0x00000027 mov eax, dword ptr [eax] 0x00000029 push eax 0x0000002a push edx 0x0000002b jmp 00007F921527B856h 0x00000030 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1A41 second address: 6A1A5A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp+04h], eax 0x0000000e jo 00007F921539AC00h 0x00000014 pushad 0x00000015 push edi 0x00000016 pop edi 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1ABB second address: 6A1AFE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B857h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c mov ecx, ebx 0x0000000e push 00000000h 0x00000010 jl 00007F921527B84Eh 0x00000016 je 00007F921527B848h 0x0000001c call 00007F921527B849h 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 jns 00007F921527B846h 0x0000002b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1AFE second address: 6A1B08 instructions: 0x00000000 rdtsc 0x00000002 js 00007F921539ABF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1B08 second address: 6A1B12 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F921527B84Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1B12 second address: 6A1B58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push esi 0x00000008 pushad 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b jmp 00007F921539ABFBh 0x00000010 popad 0x00000011 pop esi 0x00000012 mov eax, dword ptr [esp+04h] 0x00000016 jmp 00007F921539ABFEh 0x0000001b mov eax, dword ptr [eax] 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 jmp 00007F921539AC04h 0x00000025 pushad 0x00000026 popad 0x00000027 popad 0x00000028 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1B58 second address: 6A1B5D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1B5D second address: 6A1B63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1B63 second address: 6A1BA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b jmp 00007F921527B84Bh 0x00000010 pop eax 0x00000011 sub edi, 2EF37C9Fh 0x00000017 push 00000003h 0x00000019 clc 0x0000001a mov cl, 56h 0x0000001c push 00000000h 0x0000001e mov si, dx 0x00000021 push 00000003h 0x00000023 mov dword ptr [ebp+122D201Ch], ecx 0x00000029 push B9CFE632h 0x0000002e pushad 0x0000002f push edx 0x00000030 jne 00007F921527B846h 0x00000036 pop edx 0x00000037 je 00007F921527B84Ch 0x0000003d push eax 0x0000003e push edx 0x0000003f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A1BA8 second address: 6A1BF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 xor dword ptr [esp], 79CFE632h 0x0000000c xor dword ptr [ebp+122D2A7Ch], edx 0x00000012 lea ebx, dword ptr [ebp+1245754Ah] 0x00000018 jmp 00007F921539AC09h 0x0000001d xchg eax, ebx 0x0000001e push esi 0x0000001f pushad 0x00000020 jmp 00007F921539AC01h 0x00000025 pushad 0x00000026 popad 0x00000027 popad 0x00000028 pop esi 0x00000029 push eax 0x0000002a push edi 0x0000002b push eax 0x0000002c push edx 0x0000002d push edx 0x0000002e pop edx 0x0000002f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B300F second address: 6B3013 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B3013 second address: 6B3019 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C1079 second address: 6C10AB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F921527B857h 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F921527B852h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C14EA second address: 6C1506 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F921539AC07h 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C1506 second address: 6C1529 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B850h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F921527B84Dh 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C168E second address: 6C16A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921539AC01h 0x00000007 jo 00007F921539ABF6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C16A9 second address: 6C16AE instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C17E2 second address: 6C17E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C17E8 second address: 6C17ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C1EB5 second address: 6C1EBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C21C6 second address: 6C21E5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B855h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C21E5 second address: 6C21EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push edx 0x00000007 pop edx 0x00000008 popad 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C21EE second address: 6C21F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B9052 second address: 6B9093 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921539ABFCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jl 00007F921539ABF6h 0x00000010 jnc 00007F921539ABF6h 0x00000016 popad 0x00000017 popad 0x00000018 pushad 0x00000019 pushad 0x0000001a jnl 00007F921539ABF6h 0x00000020 jmp 00007F921539AC08h 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B9093 second address: 6B90A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jnc 00007F921527B846h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B90A1 second address: 6B90A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B90A7 second address: 6B90B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B90B2 second address: 6B90BC instructions: 0x00000000 rdtsc 0x00000002 jne 00007F921539ABF6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68A2E9 second address: 68A2EF instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68A2EF second address: 68A2FC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007F921539ABF6h 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68A2FC second address: 68A31A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 jbe 00007F921527B846h 0x0000000c pop ecx 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 jp 00007F921527B846h 0x00000018 jne 00007F921527B846h 0x0000001e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C237A second address: 6C237E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C237E second address: 6C2384 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C2384 second address: 6C238D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C2957 second address: 6C295D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C295D second address: 6C2962 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C2C40 second address: 6C2C59 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F921527B846h 0x00000008 jmp 00007F921527B84Fh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C60B3 second address: 6C60D1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921539ABFCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a pushad 0x0000000b popad 0x0000000c push edi 0x0000000d pop edi 0x0000000e pop esi 0x0000000f jnl 00007F921539ABFEh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C60D1 second address: 6C60F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push edx 0x00000007 jbe 00007F921527B846h 0x0000000d pop edx 0x0000000e popad 0x0000000f push edi 0x00000010 jng 00007F921527B84Eh 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6CE9E3 second address: 6CE9F6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921539ABFFh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6CF235 second address: 6CF23A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6CF23A second address: 6CF240 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6CF3E7 second address: 6CF401 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B84Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F921527B84Eh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D211C second address: 6D217C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007F921539ABF6h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov dword ptr [esp+04h], eax 0x00000012 jno 00007F921539AC0Ch 0x00000018 pop eax 0x00000019 push 00000000h 0x0000001b push ebp 0x0000001c call 00007F921539ABF8h 0x00000021 pop ebp 0x00000022 mov dword ptr [esp+04h], ebp 0x00000026 add dword ptr [esp+04h], 00000019h 0x0000002e inc ebp 0x0000002f push ebp 0x00000030 ret 0x00000031 pop ebp 0x00000032 ret 0x00000033 mov dword ptr [ebp+122D2609h], esi 0x00000039 push 77B211E6h 0x0000003e pushad 0x0000003f push eax 0x00000040 push edx 0x00000041 push eax 0x00000042 push edx 0x00000043 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D217C second address: 6D2180 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D2180 second address: 6D2189 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D281A second address: 6D281F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D2C2D second address: 6D2C37 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F921539ABF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D2C37 second address: 6D2C41 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F921527B846h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D2D39 second address: 6D2D43 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F921539ABFCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D2DA2 second address: 6D2DA6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D3155 second address: 6D315A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D328E second address: 6D3293 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D52B2 second address: 6D52CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F921539AC08h 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D52CF second address: 6D5347 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d mov edi, ecx 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push edx 0x00000014 call 00007F921527B848h 0x00000019 pop edx 0x0000001a mov dword ptr [esp+04h], edx 0x0000001e add dword ptr [esp+04h], 0000001Ch 0x00000026 inc edx 0x00000027 push edx 0x00000028 ret 0x00000029 pop edx 0x0000002a ret 0x0000002b jmp 00007F921527B851h 0x00000030 jng 00007F921527B851h 0x00000036 jg 00007F921527B84Bh 0x0000003c pushad 0x0000003d mov esi, dword ptr [ebp+122D2B70h] 0x00000043 movsx edx, dx 0x00000046 popad 0x00000047 push 00000000h 0x00000049 jc 00007F921527B84Eh 0x0000004f push ebx 0x00000050 sub dword ptr [ebp+122D1FFCh], eax 0x00000056 pop edi 0x00000057 push eax 0x00000058 pushad 0x00000059 push eax 0x0000005a push edx 0x0000005b pushad 0x0000005c popad 0x0000005d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D5347 second address: 6D534B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D5DAB second address: 6D5DAF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D660F second address: 6D6613 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D6613 second address: 6D6619 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D743B second address: 6D7458 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F921539AC09h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D7C3E second address: 6D7C48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D8AB1 second address: 6D8AB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D8AB5 second address: 6D8ACF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B84Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D8ACF second address: 6D8B68 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921539ABFCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F921539AC01h 0x0000000e popad 0x0000000f nop 0x00000010 push 00000000h 0x00000012 push 00000000h 0x00000014 push ecx 0x00000015 call 00007F921539ABF8h 0x0000001a pop ecx 0x0000001b mov dword ptr [esp+04h], ecx 0x0000001f add dword ptr [esp+04h], 00000015h 0x00000027 inc ecx 0x00000028 push ecx 0x00000029 ret 0x0000002a pop ecx 0x0000002b ret 0x0000002c jmp 00007F921539ABFAh 0x00000031 mov dword ptr [ebp+1245B4DEh], edx 0x00000037 push 00000000h 0x00000039 push 00000000h 0x0000003b push edi 0x0000003c call 00007F921539ABF8h 0x00000041 pop edi 0x00000042 mov dword ptr [esp+04h], edi 0x00000046 add dword ptr [esp+04h], 0000001Ah 0x0000004e inc edi 0x0000004f push edi 0x00000050 ret 0x00000051 pop edi 0x00000052 ret 0x00000053 mov esi, 57FA51ABh 0x00000058 mov edi, dword ptr [ebp+122D2059h] 0x0000005e push eax 0x0000005f push eax 0x00000060 push edx 0x00000061 jmp 00007F921539AC05h 0x00000066 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6DBAAF second address: 6DBB52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pushad 0x00000006 popad 0x00000007 pop edx 0x00000008 popad 0x00000009 nop 0x0000000a jmp 00007F921527B84Fh 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push ebp 0x00000014 call 00007F921527B848h 0x00000019 pop ebp 0x0000001a mov dword ptr [esp+04h], ebp 0x0000001e add dword ptr [esp+04h], 0000001Ah 0x00000026 inc ebp 0x00000027 push ebp 0x00000028 ret 0x00000029 pop ebp 0x0000002a ret 0x0000002b jmp 00007F921527B853h 0x00000030 sub ebx, 4AE421DCh 0x00000036 push 00000000h 0x00000038 push 00000000h 0x0000003a push edi 0x0000003b call 00007F921527B848h 0x00000040 pop edi 0x00000041 mov dword ptr [esp+04h], edi 0x00000045 add dword ptr [esp+04h], 00000018h 0x0000004d inc edi 0x0000004e push edi 0x0000004f ret 0x00000050 pop edi 0x00000051 ret 0x00000052 jmp 00007F921527B856h 0x00000057 push eax 0x00000058 pushad 0x00000059 push eax 0x0000005a push edx 0x0000005b jmp 00007F921527B851h 0x00000060 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6DAD18 second address: 6DAD1C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6DBB52 second address: 6DBB6F instructions: 0x00000000 rdtsc 0x00000002 jno 00007F921527B846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F921527B851h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6DCC3E second address: 6DCC42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6DCC42 second address: 6DCC48 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6DCC48 second address: 6DCC4E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6DCC4E second address: 6DCC52 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6DDB8F second address: 6DDB95 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6DDB95 second address: 6DDB99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6DDB99 second address: 6DDBAB instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F921539ABF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push esi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6DDBAB second address: 6DDBB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6DCD64 second address: 6DCE11 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jo 00007F921539ABF6h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov dword ptr [esp], eax 0x00000011 sub dword ptr [ebp+122D3878h], ecx 0x00000017 push dword ptr fs:[00000000h] 0x0000001e add dword ptr [ebp+122D2174h], eax 0x00000024 mov dword ptr [ebp+122D256Dh], eax 0x0000002a mov dword ptr fs:[00000000h], esp 0x00000031 jmp 00007F921539AC05h 0x00000036 mov eax, dword ptr [ebp+122D0FE9h] 0x0000003c push 00000000h 0x0000003e push edx 0x0000003f call 00007F921539ABF8h 0x00000044 pop edx 0x00000045 mov dword ptr [esp+04h], edx 0x00000049 add dword ptr [esp+04h], 00000017h 0x00000051 inc edx 0x00000052 push edx 0x00000053 ret 0x00000054 pop edx 0x00000055 ret 0x00000056 mov ebx, dword ptr [ebp+122D2169h] 0x0000005c push FFFFFFFFh 0x0000005e push 00000000h 0x00000060 push ebx 0x00000061 call 00007F921539ABF8h 0x00000066 pop ebx 0x00000067 mov dword ptr [esp+04h], ebx 0x0000006b add dword ptr [esp+04h], 00000015h 0x00000073 inc ebx 0x00000074 push ebx 0x00000075 ret 0x00000076 pop ebx 0x00000077 ret 0x00000078 jmp 00007F921539AC07h 0x0000007d nop 0x0000007e pushad 0x0000007f push eax 0x00000080 push edx 0x00000081 push eax 0x00000082 push edx 0x00000083 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6DCE11 second address: 6DCE15 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68BD77 second address: 68BD7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6DDE9E second address: 6DDEAC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jg 00007F921527B846h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68BD7F second address: 68BD85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68BD85 second address: 68BD8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68BD8A second address: 68BDA3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F921539AC03h 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68BDA3 second address: 68BDA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6E21E1 second address: 6E21E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6E21E5 second address: 6E222E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov dword ptr [esp], eax 0x0000000a jmp 00007F921527B855h 0x0000000f push 00000000h 0x00000011 sbb di, 1021h 0x00000016 push 00000000h 0x00000018 jmp 00007F921527B856h 0x0000001d xchg eax, esi 0x0000001e push ecx 0x0000001f pushad 0x00000020 je 00007F921527B846h 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6E222E second address: 6E2245 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F921539ABFEh 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6E034D second address: 6E0351 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6E1394 second address: 6E13A5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921539ABFDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6E3368 second address: 6E3372 instructions: 0x00000000 rdtsc 0x00000002 js 00007F921527B84Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6E13A5 second address: 6E13CA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 jng 00007F921539ABF6h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F921539AC04h 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6E13CA second address: 6E1472 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B852h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a mov bx, 6A12h 0x0000000e push dword ptr fs:[00000000h] 0x00000015 mov edi, dword ptr [ebp+122D24DFh] 0x0000001b mov dword ptr fs:[00000000h], esp 0x00000022 push 00000000h 0x00000024 push edx 0x00000025 call 00007F921527B848h 0x0000002a pop edx 0x0000002b mov dword ptr [esp+04h], edx 0x0000002f add dword ptr [esp+04h], 0000001Ah 0x00000037 inc edx 0x00000038 push edx 0x00000039 ret 0x0000003a pop edx 0x0000003b ret 0x0000003c mov ebx, edx 0x0000003e mov eax, dword ptr [ebp+122D0021h] 0x00000044 push 00000000h 0x00000046 push ebp 0x00000047 call 00007F921527B848h 0x0000004c pop ebp 0x0000004d mov dword ptr [esp+04h], ebp 0x00000051 add dword ptr [esp+04h], 00000017h 0x00000059 inc ebp 0x0000005a push ebp 0x0000005b ret 0x0000005c pop ebp 0x0000005d ret 0x0000005e mov edi, dword ptr [ebp+122D2778h] 0x00000064 push FFFFFFFFh 0x00000066 push ecx 0x00000067 pop ebx 0x00000068 nop 0x00000069 pushad 0x0000006a js 00007F921527B85Ch 0x00000070 jmp 00007F921527B856h 0x00000075 jl 00007F921527B84Ch 0x0000007b push eax 0x0000007c push edx 0x0000007d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6E23A5 second address: 6E23AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6E8416 second address: 6E8420 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F921527B846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6E75D3 second address: 6E75E1 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b pushad 0x0000000c popad 0x0000000d pop ebx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6E75E1 second address: 6E766A instructions: 0x00000000 rdtsc 0x00000002 jne 00007F921527B84Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b mov dword ptr [ebp+1247EDBBh], ebx 0x00000011 push dword ptr fs:[00000000h] 0x00000018 ja 00007F921527B84Ch 0x0000001e mov dword ptr fs:[00000000h], esp 0x00000025 mov ebx, dword ptr [ebp+12467683h] 0x0000002b mov eax, dword ptr [ebp+122D15B9h] 0x00000031 push 00000000h 0x00000033 push ebp 0x00000034 call 00007F921527B848h 0x00000039 pop ebp 0x0000003a mov dword ptr [esp+04h], ebp 0x0000003e add dword ptr [esp+04h], 0000001Ch 0x00000046 inc ebp 0x00000047 push ebp 0x00000048 ret 0x00000049 pop ebp 0x0000004a ret 0x0000004b sub dword ptr [ebp+1247B16Eh], esi 0x00000051 push FFFFFFFFh 0x00000053 mov edi, 0798E0F7h 0x00000058 push eax 0x00000059 pushad 0x0000005a push eax 0x0000005b push edx 0x0000005c jmp 00007F921527B857h 0x00000061 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6E54C8 second address: 6E54CD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6E8727 second address: 6E872D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6E872D second address: 6E8731 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6E8731 second address: 6E8735 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6E4403 second address: 6E4407 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6E4407 second address: 6E4411 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007F921527B846h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6EA5F9 second address: 6EA5FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6EA5FD second address: 6EA60A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6EA60A second address: 6EA6A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 nop 0x00000008 and bx, 6614h 0x0000000d clc 0x0000000e push dword ptr fs:[00000000h] 0x00000015 mov di, dx 0x00000018 mov dword ptr fs:[00000000h], esp 0x0000001f call 00007F921539AC07h 0x00000024 mov di, si 0x00000027 pop ebx 0x00000028 mov eax, dword ptr [ebp+122D08F9h] 0x0000002e sbb ebx, 3360374Fh 0x00000034 push FFFFFFFFh 0x00000036 push 00000000h 0x00000038 push edi 0x00000039 call 00007F921539ABF8h 0x0000003e pop edi 0x0000003f mov dword ptr [esp+04h], edi 0x00000043 add dword ptr [esp+04h], 0000001Ch 0x0000004b inc edi 0x0000004c push edi 0x0000004d ret 0x0000004e pop edi 0x0000004f ret 0x00000050 add bx, ECDAh 0x00000055 pushad 0x00000056 mov dword ptr [ebp+122D29F8h], esi 0x0000005c js 00007F921539ABFCh 0x00000062 mov eax, dword ptr [ebp+122D2E58h] 0x00000068 popad 0x00000069 nop 0x0000006a push eax 0x0000006b push edx 0x0000006c push eax 0x0000006d push edx 0x0000006e jmp 00007F921539AC04h 0x00000073 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6EA6A8 second address: 6EA6C0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B854h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6EA6C0 second address: 6EA6E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 jmp 00007F921539AC05h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6EB6C1 second address: 6EB6E4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B84Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F921527B852h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6EEE4A second address: 6EEE54 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F921539ABF6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6FABE7 second address: 6FABF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6FAD81 second address: 6FAD89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6FAD89 second address: 6FAD8D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 703467 second address: 703471 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007F921539ABF6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 703471 second address: 7034A8 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F921527B846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push ebx 0x0000000e jmp 00007F921527B84Bh 0x00000013 pop ebx 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F921527B859h 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7034A8 second address: 7034AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7034AC second address: 7034B6 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F921527B846h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7041BC second address: 704204 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 pushad 0x00000009 jnl 00007F921539ABF6h 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 popad 0x00000012 pop eax 0x00000013 mov eax, dword ptr [esp+04h] 0x00000017 jmp 00007F921539ABFBh 0x0000001c mov eax, dword ptr [eax] 0x0000001e jbe 00007F921539ABFAh 0x00000024 push edi 0x00000025 pushad 0x00000026 popad 0x00000027 pop edi 0x00000028 mov dword ptr [esp+04h], eax 0x0000002c pushad 0x0000002d push eax 0x0000002e push edx 0x0000002f jmp 00007F921539AC03h 0x00000034 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 70A351 second address: 70A395 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F921527B84Bh 0x0000000b popad 0x0000000c jmp 00007F921527B84Bh 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 pop edx 0x00000015 jg 00007F921527B852h 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007F921527B84Eh 0x00000023 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 697996 second address: 69799C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 69799C second address: 6979B6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B856h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6979B6 second address: 6979BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6979BC second address: 6979DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B855h 0x00000007 push eax 0x00000008 push edx 0x00000009 jc 00007F921527B846h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 709177 second address: 709183 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007F921539ABF6h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 709795 second address: 7097BE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B84Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a jmp 00007F921527B857h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 71356F second address: 713573 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 713573 second address: 71357F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 712042 second address: 71206B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921539AC09h 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jg 00007F921539ABF6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 71206B second address: 71206F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7122F0 second address: 7122F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7122F4 second address: 712322 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F921527B84Dh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f jmp 00007F921527B857h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 712AFB second address: 712AFF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 712F26 second address: 712F2A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 712F2A second address: 712F33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 712F33 second address: 712F39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 712F39 second address: 712F3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 712F3E second address: 712F54 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 pop eax 0x00000005 jnc 00007F921527B846h 0x0000000b pop edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 jne 00007F921527B846h 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 712F54 second address: 712F58 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 712F58 second address: 712F5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B9BD5 second address: 6B9BF5 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jnc 00007F921539ABF6h 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F921539AC04h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B9BF5 second address: 6B9C16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jl 00007F921527B84Eh 0x00000012 pushad 0x00000013 popad 0x00000014 jnl 00007F921527B846h 0x0000001a pushad 0x0000001b push edi 0x0000001c pop edi 0x0000001d pushad 0x0000001e popad 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B9C16 second address: 6B9C1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B9C1B second address: 6B9C2E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B84Dh 0x00000007 push eax 0x00000008 push edx 0x00000009 push edi 0x0000000a pop edi 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B9C2E second address: 6B9C32 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 714EEE second address: 714EF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 71C802 second address: 71C80C instructions: 0x00000000 rdtsc 0x00000002 jno 00007F921539ABF6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68F24C second address: 68F263 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push ecx 0x0000000a jnc 00007F921527B846h 0x00000010 pop ecx 0x00000011 pop edi 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D0B6D second address: 6D0B77 instructions: 0x00000000 rdtsc 0x00000002 js 00007F921539ABFCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D0B77 second address: 6B9052 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 jmp 00007F921527B857h 0x0000000d jmp 00007F921527B856h 0x00000012 popad 0x00000013 nop 0x00000014 jp 00007F921527B856h 0x0000001a movzx edx, dx 0x0000001d call dword ptr [ebp+122D20C1h] 0x00000023 pushad 0x00000024 push ecx 0x00000025 push eax 0x00000026 pop eax 0x00000027 pop ecx 0x00000028 push eax 0x00000029 push edx 0x0000002a pushad 0x0000002b popad 0x0000002c ja 00007F921527B846h 0x00000032 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D1137 second address: 6D113B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D146B second address: 6D1471 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D1471 second address: 6D147B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007F921539ABF6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D147B second address: 6D148E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jc 00007F921527B848h 0x00000011 push esi 0x00000012 pop esi 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D19D6 second address: 6D1A39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 pushad 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e push edx 0x0000000f jmp 00007F921539AC04h 0x00000014 pop edx 0x00000015 popad 0x00000016 nop 0x00000017 mov dx, si 0x0000001a push 0000001Eh 0x0000001c mov dword ptr [ebp+12476B2Eh], esi 0x00000022 mov edi, dword ptr [ebp+122D2D88h] 0x00000028 nop 0x00000029 pushad 0x0000002a pushad 0x0000002b jmp 00007F921539AC07h 0x00000030 jne 00007F921539ABF6h 0x00000036 popad 0x00000037 push ecx 0x00000038 pushad 0x00000039 popad 0x0000003a pop ecx 0x0000003b popad 0x0000003c push eax 0x0000003d pushad 0x0000003e push eax 0x0000003f push edx 0x00000040 push ecx 0x00000041 pop ecx 0x00000042 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D1A39 second address: 6D1A3D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D1A3D second address: 6D1A47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D1DFC second address: 6D1E02 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D1E02 second address: 6B9BD5 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F921539ABF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d push ebx 0x0000000e or ecx, 1ADD2DA6h 0x00000014 pop edx 0x00000015 lea eax, dword ptr [ebp+124868B7h] 0x0000001b movsx ecx, dx 0x0000001e push eax 0x0000001f push eax 0x00000020 je 00007F921539ABFCh 0x00000026 jp 00007F921539ABF6h 0x0000002c pop eax 0x0000002d mov dword ptr [esp], eax 0x00000030 mov dword ptr [ebp+122D2A3Ah], ebx 0x00000036 lea eax, dword ptr [ebp+12486873h] 0x0000003c mov edx, dword ptr [ebp+122D2D20h] 0x00000042 push eax 0x00000043 push edi 0x00000044 push esi 0x00000045 pushad 0x00000046 popad 0x00000047 pop esi 0x00000048 pop edi 0x00000049 mov dword ptr [esp], eax 0x0000004c mov edx, dword ptr [ebp+122D2D9Ch] 0x00000052 call dword ptr [ebp+122D2573h] 0x00000058 push eax 0x00000059 push edx 0x0000005a jmp 00007F921539AC03h 0x0000005f jnc 00007F921539ABFEh 0x00000065 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 71B911 second address: 71B94B instructions: 0x00000000 rdtsc 0x00000002 jl 00007F921527B846h 0x00000008 jmp 00007F921527B856h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 push edx 0x00000013 jmp 00007F921527B851h 0x00000018 pop edx 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 71B94B second address: 71B951 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 71B951 second address: 71B955 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 71B955 second address: 71B959 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 71B959 second address: 71B96F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F921527B850h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 71B96F second address: 71B990 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F921539AC04h 0x00000008 jng 00007F921539ABF6h 0x0000000e popad 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 71B990 second address: 71B99C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F921527B846h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 71BADE second address: 71BAE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 71BF13 second address: 71BF63 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B858h 0x00000007 je 00007F921527B856h 0x0000000d jmp 00007F921527B84Ah 0x00000012 ja 00007F921527B846h 0x00000018 pop edx 0x00000019 pop eax 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d jg 00007F921527B846h 0x00000023 jmp 00007F921527B855h 0x00000028 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 71BF63 second address: 71BF6E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 71C0CC second address: 71C0F2 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F921527B846h 0x00000008 jmp 00007F921527B852h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jnl 00007F921527B846h 0x00000017 push ebx 0x00000018 pop ebx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 72105D second address: 721061 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 721061 second address: 721065 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 721065 second address: 721079 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jl 00007F921539ABFCh 0x0000000e jp 00007F921539ABF6h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 721379 second address: 72137D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 72137D second address: 721381 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7214CA second address: 7214D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 720ABD second address: 720ACD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jno 00007F921539ABF6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 720ACD second address: 720AD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 720AD3 second address: 720AD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 720AD7 second address: 720ADD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7259A8 second address: 7259DB instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F921539ABF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jno 00007F921539AC15h 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7259DB second address: 7259DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7259DF second address: 7259FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F921539AC05h 0x0000000b popad 0x0000000c push edx 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7275CC second address: 7275D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7294BF second address: 7294C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7294C3 second address: 7294FF instructions: 0x00000000 rdtsc 0x00000002 js 00007F921527B846h 0x00000008 jmp 00007F921527B858h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jmp 00007F921527B857h 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7294FF second address: 72950B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F921539ABF6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 72D7CE second address: 72D816 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F921527B850h 0x00000009 pop edx 0x0000000a jg 00007F921527B84Eh 0x00000010 pop ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F921527B84Dh 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F921527B853h 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 72D816 second address: 72D820 instructions: 0x00000000 rdtsc 0x00000002 je 00007F921539ABF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 72CF62 second address: 72CF69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop eax 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 686D01 second address: 686D2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jmp 00007F921539AC05h 0x0000000a popad 0x0000000b push edi 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 pop eax 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 js 00007F921539ABF6h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 686D2D second address: 686D31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 686D31 second address: 686D35 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7317B5 second address: 7317D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pushad 0x00000007 jmp 00007F921527B856h 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7317D6 second address: 7317ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F921539AC03h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 731959 second address: 73195D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 73195D second address: 731990 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F921539ABF8h 0x00000008 jmp 00007F921539AC00h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F921539AC05h 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 731990 second address: 731995 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 731DE0 second address: 731DF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F921539AC00h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 731DF4 second address: 731E08 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F921527B846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c ja 00007F921527B846h 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 731E08 second address: 731E0C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 731F45 second address: 731F4E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 736C73 second address: 736C78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 736C78 second address: 736CA7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push edi 0x00000006 pop edi 0x00000007 push edx 0x00000008 pop edx 0x00000009 jmp 00007F921527B84Fh 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 jmp 00007F921527B84Ch 0x00000019 pushad 0x0000001a popad 0x0000001b push ecx 0x0000001c pop ecx 0x0000001d popad 0x0000001e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 736CA7 second address: 736CAC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 736CAC second address: 736CD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F921527B846h 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007F921527B858h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 736E4A second address: 736E65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F921539AC07h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 736E65 second address: 736E7A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F921527B84Bh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 736E7A second address: 736E7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 736E7E second address: 736E82 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 736FFC second address: 737018 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F921539AC03h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 737018 second address: 737032 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F921527B855h 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 737032 second address: 737047 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F921539AC00h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 737047 second address: 73704F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D17EF second address: 6D17F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D17F3 second address: 6D1800 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D1800 second address: 6D1804 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D1804 second address: 6D180E instructions: 0x00000000 rdtsc 0x00000002 jng 00007F921527B846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 737BFE second address: 737C0B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 jo 00007F921539ABF6h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 737C0B second address: 737C1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jbe 00007F921527B846h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 737C1B second address: 737C32 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F921539ABFDh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 737C32 second address: 737C38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 737C38 second address: 737C3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 737C3C second address: 737C66 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B858h 0x00000007 jl 00007F921527B846h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jnp 00007F921527B846h 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 69948E second address: 6994B2 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F921539ABF6h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jp 00007F921539ABF6h 0x00000013 pushad 0x00000014 popad 0x00000015 jmp 00007F921539ABFDh 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 73E463 second address: 73E467 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 73E467 second address: 73E47E instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F921539ABF6h 0x00000008 jmp 00007F921539ABFDh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 73EAEF second address: 73EAF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 73EAF5 second address: 73EAF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 73EAF9 second address: 73EB17 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F921527B846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b jl 00007F921527B846h 0x00000011 pop esi 0x00000012 popad 0x00000013 pushad 0x00000014 js 00007F921527B84Eh 0x0000001a push edx 0x0000001b pop edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 73EB17 second address: 73EB3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F921539AC02h 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F921539ABFFh 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 73EDFB second address: 73EE1B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B852h 0x00000007 jc 00007F921527B846h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 73EE1B second address: 73EE21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 73EE21 second address: 73EE25 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 73EE25 second address: 73EE2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 73F11B second address: 73F121 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 73F121 second address: 73F142 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F921539AC06h 0x0000000b push edi 0x0000000c push edx 0x0000000d pop edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 73F45E second address: 73F49E instructions: 0x00000000 rdtsc 0x00000002 jo 00007F921527B857h 0x00000008 jmp 00007F921527B851h 0x0000000d push ecx 0x0000000e jmp 00007F921527B850h 0x00000013 pop ecx 0x00000014 pop edx 0x00000015 pop eax 0x00000016 push eax 0x00000017 jnc 00007F921527B84Eh 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 73F49E second address: 73F4A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 73F9F2 second address: 73F9FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push ecx 0x00000006 pushad 0x00000007 popad 0x00000008 pushad 0x00000009 popad 0x0000000a pop ecx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 73F9FD second address: 73FA03 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 73FD13 second address: 73FD2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F921527B84Fh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 73FD2B second address: 73FD33 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7434C5 second address: 7434CF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F921527B846h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7434CF second address: 7434E5 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F921539ABF6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jno 00007F921539ABFEh 0x00000012 push eax 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7434E5 second address: 743502 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F921527B855h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 743502 second address: 74350B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 743AB4 second address: 743AD1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F921527B856h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 748A45 second address: 748A4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 748A4B second address: 748A75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 jmp 00007F921527B857h 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 jp 00007F921527B846h 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 75117D second address: 75118E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F921539ABF6h 0x0000000a popad 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f push edx 0x00000010 pop edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 74F46D second address: 74F477 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 74FAF8 second address: 74FAFC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 74FD70 second address: 74FD74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 74FD74 second address: 74FD7E instructions: 0x00000000 rdtsc 0x00000002 ja 00007F921539ABF6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7501CB second address: 750219 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F921527B846h 0x0000000a popad 0x0000000b push ebx 0x0000000c jmp 00007F921527B854h 0x00000011 pushad 0x00000012 popad 0x00000013 pop ebx 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 jp 00007F921527B84Ch 0x0000001d je 00007F921527B846h 0x00000023 push edi 0x00000024 jmp 00007F921527B858h 0x00000029 push edx 0x0000002a pop edx 0x0000002b pop edi 0x0000002c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 750781 second address: 750785 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 750785 second address: 750793 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F921527B846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 750793 second address: 750799 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 750799 second address: 7507AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jmp 00007F921527B84Dh 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 757A20 second address: 757A3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F921539AC09h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 75750E second address: 75751D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop eax 0x00000006 jnp 00007F921527B854h 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 75751D second address: 757523 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 75DE09 second address: 75DE14 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jne 00007F921527B846h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7639C4 second address: 7639D3 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F921539ABF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7639D3 second address: 7639EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F921527B853h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 766E1A second address: 766E24 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 766E24 second address: 766E28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 76C51D second address: 76C521 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 76C521 second address: 76C530 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F921527B846h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push esi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 76C530 second address: 76C53A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop ebx 0x00000006 pushad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 76C53A second address: 76C540 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 76C540 second address: 76C54A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 76C54A second address: 76C562 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push edx 0x00000006 push eax 0x00000007 pop eax 0x00000008 jnl 00007F921527B846h 0x0000000e pop edx 0x0000000f push ecx 0x00000010 jno 00007F921527B846h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 76C09E second address: 76C0A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 76C0A4 second address: 76C0AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 76C0AA second address: 76C0AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7811BC second address: 7811D1 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F921527B846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jnl 00007F921527B846h 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6942CE second address: 6942E0 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F921539ABF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jc 00007F921539ABF6h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 786D9A second address: 786DB4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B84Ch 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jp 00007F921527B84Ch 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 786DB4 second address: 786DC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pushad 0x0000000b popad 0x0000000c pop eax 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 78C4D5 second address: 78C4F2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B854h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 78C4F2 second address: 78C500 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jl 00007F921539ABF6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 79E7AB second address: 79E7B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A44E9 second address: 7A44EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A4057 second address: 7A405C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A405C second address: 7A4062 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A4062 second address: 7A4068 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A4068 second address: 7A406E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A59CB second address: 7A59DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 jmp 00007F921527B84Ch 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A59DF second address: 7A59E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7A59E8 second address: 7A59F0 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AC6AC second address: 7AC6B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AC6B4 second address: 7AC6BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AC6BA second address: 7AC6C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AC6C3 second address: 7AC6C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7ABE6F second address: 7ABE87 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F921539ABFCh 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7ABE87 second address: 7ABE8B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AC162 second address: 7AC17B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F921539AC05h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AC17B second address: 7AC17F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AC17F second address: 7AC193 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F921539ABFBh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AC193 second address: 7AC199 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AC3ED second address: 7AC3F3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AC3F3 second address: 7AC3FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AC3FC second address: 7AC402 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AC402 second address: 7AC419 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push esi 0x00000006 jc 00007F921527B846h 0x0000000c pop esi 0x0000000d push eax 0x0000000e push edx 0x0000000f jo 00007F921527B846h 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AC419 second address: 7AC429 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a ja 00007F921539ABF6h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AFB6C second address: 7AFB70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AFB70 second address: 7AFB76 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AFB76 second address: 7AFBA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F921527B857h 0x0000000e jmp 00007F921527B84Eh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AFBA6 second address: 7AFBAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AFBAB second address: 7AFBC5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007F921527B846h 0x00000009 jmp 00007F921527B84Fh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AFBC5 second address: 7AFBE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F921539AC03h 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B4C69 second address: 7B4C91 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921527B855h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edx 0x0000000a jg 00007F921527B846h 0x00000010 pop edx 0x00000011 popad 0x00000012 push eax 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 push ecx 0x00000017 pop ecx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B4C91 second address: 7B4C95 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B4C95 second address: 7B4CB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F921527B857h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B65DC second address: 7B65F3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F921539AC03h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B65F3 second address: 7B6604 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F921527B84Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B82D9 second address: 7B82DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7B0BE1 second address: 7B0BE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 7AF909 second address: 7AF90D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D4F11 second address: 6D4F15 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 6C6C9A instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 51B2C6 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 6EEEA8 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 6D0CCC instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 5229CB instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeMemory allocated: 4D20000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 4F80000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 4DC0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A19EE rdtsc 0_2_006A19EE
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 8012Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: file.exe, file.exe, 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
Source: file.exe, 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: regmonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: gbdyllo
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: procmon_window_class
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: ollydbg
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: filemonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeFile opened: NTICE
Source: C:\Users\user\Desktop\file.exeFile opened: SICE
Source: C:\Users\user\Desktop\file.exeFile opened: SIWVID
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A19EE rdtsc 0_2_006A19EE
Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior
Source: file.exe, 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Program Manager
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006F50E5 GetSystemTime,GetFileTime,0_2_006F50E5

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\Desktop\file.exeRegistry key value created / modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications DisableNotifications 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableIOAVProtection 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableRealtimeMonitoring 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\NotificationsRegistry value created: DisableNotifications 1Jump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry value created: TamperProtection 0Jump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AUOptionsJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AutoInstallMinorUpdatesJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate DoNotConnectToWindowsUpdateInternetLocationsJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
41
Disable or Modify Tools
LSASS Memory641
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
Bypass User Account Control
261
Virtualization/Sandbox Evasion
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS261
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets23
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
Software Packing
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
Bypass User Account Control
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe45%ReversingLabsWin32.Infostealer.Tinba
file.exe54%VirustotalBrowse
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1561765
Start date and time:2024-11-24 08:43:31 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 23s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal100.evad.winEXE@1/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\file.exe
File Type:CSV text
Category:dropped
Size (bytes):226
Entropy (8bit):5.360398796477698
Encrypted:false
SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
MD5:3A8957C6382192B71471BD14359D0B12
SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
Malicious:true
Reputation:high, very likely benign file
Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.504625271893116
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:file.exe
File size:2'813'440 bytes
MD5:2f405290a54895095dba7ff04d7a5953
SHA1:e03dcaf483ba02c2145b3805d50f3c9d6fd50c7a
SHA256:4588027f22769e9207b98bc72c37b976154f0d0b6f58e2a13991787418f1544c
SHA512:ca454071f61304ffc7f46c976f74b5d49bed2a5e3e4384d2509adf1e5c7c1a85c9ac9579143ed56081c278fd0b8aed10f6e3e5b1c183d3f4342d55a26108ccc9
SSDEEP:49152:uIw4p/GG0KyDhWxJY0c7NP+Wlmc4SZz7dRI8:I4QGpyDhcJYX1LP
TLSH:B8D52AA1F40972CFD48E67789927CD47A85D83B9472408C7A86DA4BA7D73CC137B6C24
File Content Preview:MZ......................@...........z...................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P(,e.........."...0..$...........`+.. ...`....@.. ........................+.......+...`................................
Icon Hash:00928e8e8686b000
Entrypoint:0x6b6000
Entrypoint Section:.taggant
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE
Time Stamp:0x652C2850 [Sun Oct 15 17:58:40 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:2eabe9054cad5152567f0699947a2c5b
Instruction
jmp 00007F92146D398Ah
bswap esp
sub al, byte ptr [eax]
add byte ptr [eax], al
add byte ptr [eax], al
jmp 00007F92146D5985h
add byte ptr [ecx], cl
add byte ptr [eax], 00000000h
add byte ptr [eax], al
add byte ptr [eax], al
adc byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add eax, 0000000Ah
add byte ptr [eax], al
add byte ptr [eax], dh
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax+eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
and al, byte ptr [eax]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
push es
add byte ptr [eax], 00000000h
add byte ptr [eax], al
add byte ptr [eax], al
adc byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add eax, 0000000Ah
add byte ptr [eax], al
add byte ptr [eax], dh
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax+eax], ah
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
and dword ptr [eax], eax
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
push es
add byte ptr [eax], 00000000h
add byte ptr [eax], al
add byte ptr [eax], al
adc byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
or ecx, dword ptr [edx]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
sbb al, byte ptr [00000000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
or byte ptr [eax+00000000h], al
add byte ptr [eax], al
adc byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add eax, 0000000Ah
add byte ptr [eax], al
add byte ptr [eax], dh
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [edi], bh
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x80550x69.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000x59c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x81f80x8.idata
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
0x20000x40000x1200e8e1995b5ae4f7358f5e0b7e5a494ee3False0.9305555555555556PGP Secret Sub-key -7.757169738716121IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x60000x59c0x600aae15e30898a02f09cc86ed48aa06b09False0.4140625data4.036947054771808IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata 0x80000x20000x200ec9cb51e8cb4ea49a56ee3cf434fb69eFalse0.1484375data0.9342685949460681IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
pypdcipy0xa0000x2aa0000x2a8e0071728b4d5515dd23e1a198507faa7a53unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
mkjngwpv0x2b40000x20000x400dfa6c82c5ce44ebd5e95484ab04a9df1False0.7666015625data6.027301494003604IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.taggant0x2b60000x40000x22004bda437a1f1bbfcaa93bdafc9a5fadd0False0.051011029411764705DOS executable (COM)0.5026891444419739IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x60900x30cdata0.42948717948717946
RT_MANIFEST0x63ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
DLLImport
kernel32.dlllstrcpy
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:02:44:25
Start date:24/11/2024
Path:C:\Users\user\Desktop\file.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\file.exe"
Imagebase:0x510000
File size:2'813'440 bytes
MD5 hash:2F405290A54895095DBA7FF04D7A5953
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:6%
    Dynamic/Decrypted Code Coverage:4.6%
    Signature Coverage:0%
    Total number of Nodes:263
    Total number of Limit Nodes:10
    execution_graph 6912 6f57cf 6914 6f57db 6912->6914 6919 6f0f98 GetCurrentThreadId 6914->6919 6916 6f57e7 6918 6f5807 6916->6918 6923 6f56db 6916->6923 6920 6f0fb0 6919->6920 6921 6f0ff7 6920->6921 6922 6f0fe6 Sleep 6920->6922 6921->6916 6922->6920 6925 6f56e7 6923->6925 6926 6f56fb 6925->6926 6927 6f0f98 2 API calls 6926->6927 6928 6f5713 6927->6928 6929 6f5728 6928->6929 6953 6f55f4 6928->6953 6933 6f5730 6929->6933 6941 6f5699 IsBadWritePtr 6929->6941 6935 6f57a4 CreateFileA 6933->6935 6936 6f5781 CreateFileW 6933->6936 6940 6f5771 6935->6940 6936->6940 6938 6f576b 6947 6f2eee 6938->6947 6942 6f56bb 6941->6942 6942->6933 6943 6f16aa 6942->6943 6944 6f16bb 6943->6944 6945 6f16f8 6943->6945 6944->6945 6955 6f154b 6944->6955 6945->6933 6945->6938 6950 6f2efb 6947->6950 6948 6f2ff6 6948->6940 6949 6f2f34 CreateFileA 6951 6f2f80 6949->6951 6950->6948 6950->6949 6951->6948 6975 6f2db1 CloseHandle 6951->6975 6977 6f5603 GetWindowsDirectoryA 6953->6977 6957 6f1578 6955->6957 6956 6f167e 6956->6944 6957->6956 6958 6f15a6 PathAddExtensionA 6957->6958 6959 6f15c1 6957->6959 6958->6959 6963 6f15e3 6959->6963 6967 6f11ec 6959->6967 6961 6f162c 6961->6956 6962 6f1655 6961->6962 6965 6f11ec lstrcmpiA 6961->6965 6962->6956 6966 6f11ec lstrcmpiA 6962->6966 6963->6956 6963->6961 6964 6f11ec lstrcmpiA 6963->6964 6964->6961 6965->6962 6966->6956 6968 6f120a 6967->6968 6969 6f1221 6968->6969 6971 6f1169 6968->6971 6969->6963 6972 6f1194 6971->6972 6973 6f11c6 lstrcmpiA 6972->6973 6974 6f11dc 6972->6974 6973->6974 6974->6969 6976 6f2dc5 6975->6976 6976->6948 6978 6f562d 6977->6978 6979 6f27af 6982 6f25f7 6979->6982 6985 6f265e 6982->6985 6987 6f266b 6985->6987 6988 6f2681 6987->6988 6989 6f0f98 2 API calls 6988->6989 6997 6f2689 6988->6997 6992 6f26ab 6989->6992 6990 6f2769 6994 6f2787 LoadLibraryExA 6990->6994 6995 6f2773 LoadLibraryExW 6990->6995 6991 6f2756 7018 6f2496 6991->7018 6996 6f16aa 2 API calls 6992->6996 7001 6f272d 6994->7001 6995->7001 6998 6f26bc 6996->6998 6997->6990 6997->6991 6998->6997 6999 6f26ea 6998->6999 7002 6f1fd6 6999->7002 7003 6f1ffc 7002->7003 7004 6f1ff2 7002->7004 7022 6f1829 7003->7022 7004->7001 7011 6f204c 7012 6f2079 7011->7012 7017 6f20b1 7011->7017 7032 6f1a07 7011->7032 7036 6f1ca2 7012->7036 7015 6f2084 7015->7017 7041 6f1c19 7015->7041 7017->7004 7045 6f27e8 7017->7045 7019 6f24a1 7018->7019 7020 6f24c2 LoadLibraryExA 7019->7020 7021 6f24b1 7019->7021 7020->7021 7021->7001 7023 6f189e 7022->7023 7024 6f1845 7022->7024 7023->7004 7026 6f18cf VirtualAlloc 7023->7026 7024->7023 7025 6f1875 VirtualAlloc 7024->7025 7025->7023 7027 6f1914 7026->7027 7027->7017 7028 6f194c 7027->7028 7029 6f1974 7028->7029 7030 6f19eb 7029->7030 7031 6f198d VirtualAlloc 7029->7031 7030->7011 7031->7029 7031->7030 7033 6f1a27 7032->7033 7035 6f1a22 7032->7035 7034 6f1a5a lstrcmpiA 7033->7034 7033->7035 7034->7033 7034->7035 7035->7012 7037 6f1ccf 7036->7037 7038 6f1dae 7036->7038 7037->7038 7047 6f17b4 7037->7047 7055 6f28c5 7037->7055 7038->7015 7043 6f1c42 7041->7043 7042 6f1c83 7042->7017 7043->7042 7044 6f1c5a VirtualProtect 7043->7044 7044->7042 7044->7043 7081 6f27f4 7045->7081 7048 6f25f7 16 API calls 7047->7048 7050 6f17c7 7048->7050 7049 6f180d 7049->7037 7050->7049 7051 6f1819 7050->7051 7053 6f17f0 7050->7053 7052 6f27e8 3 API calls 7051->7052 7052->7049 7053->7049 7054 6f27e8 3 API calls 7053->7054 7054->7049 7057 6f28ce 7055->7057 7058 6f28dd 7057->7058 7059 6f28e5 7058->7059 7061 6f0f98 2 API calls 7058->7061 7060 6f2912 GetProcAddress 7059->7060 7066 6f2908 7060->7066 7062 6f28ef 7061->7062 7063 6f28ff 7062->7063 7064 6f290d 7062->7064 7067 6f2326 7063->7067 7064->7060 7068 6f2345 7067->7068 7072 6f2412 7067->7072 7069 6f2382 lstrcmpiA 7068->7069 7070 6f23ac 7068->7070 7068->7072 7069->7068 7069->7070 7070->7072 7073 6f226f 7070->7073 7072->7066 7075 6f2280 7073->7075 7074 6f230b 7074->7072 7075->7074 7076 6f22b0 lstrcpyn 7075->7076 7076->7074 7077 6f22cc 7076->7077 7077->7074 7078 6f17b4 15 API calls 7077->7078 7079 6f22fa 7078->7079 7079->7074 7080 6f28c5 15 API calls 7079->7080 7080->7074 7082 6f2803 7081->7082 7084 6f0f98 2 API calls 7082->7084 7087 6f280b 7082->7087 7083 6f2859 FreeLibrary 7089 6f2840 7083->7089 7085 6f2815 7084->7085 7086 6f2825 7085->7086 7085->7087 7090 6f21d6 7086->7090 7087->7083 7091 6f2239 7090->7091 7092 6f21f9 7090->7092 7091->7089 7092->7091 7094 6f0d92 7092->7094 7095 6f0d9b 7094->7095 7096 6f0db3 7095->7096 7098 6f0d79 7095->7098 7096->7091 7099 6f27e8 3 API calls 7098->7099 7100 6f0d86 7099->7100 7100->7095 7101 4d610f0 7102 4d61131 7101->7102 7105 6f3cec 7102->7105 7103 4d61151 7106 6f0f98 2 API calls 7105->7106 7107 6f3cf8 7106->7107 7108 6f3d21 7107->7108 7109 6f3d11 7107->7109 7111 6f3d26 CloseHandle 7108->7111 7113 6f2dd8 7109->7113 7112 6f3d17 7111->7112 7112->7103 7116 6f0e43 7113->7116 7117 6f0e59 7116->7117 7119 6f0e73 7117->7119 7120 6f0e27 7117->7120 7119->7112 7121 6f2db1 CloseHandle 7120->7121 7122 6f0e37 7121->7122 7122->7119 7123 4d61510 7124 4d61558 ControlService 7123->7124 7125 4d6158f 7124->7125 7126 6f5568 7128 6f5574 7126->7128 7129 6f0f98 2 API calls 7128->7129 7130 6f5580 7129->7130 7132 6f55a0 7130->7132 7133 6f54bf 7130->7133 7135 6f54cb 7133->7135 7136 6f54df 7135->7136 7137 6f0f98 2 API calls 7136->7137 7138 6f54f7 7137->7138 7146 6f16fc 7138->7146 7141 6f16aa 2 API calls 7142 6f551a 7141->7142 7143 6f5522 7142->7143 7144 6f554f GetFileAttributesA 7142->7144 7145 6f553e GetFileAttributesW 7142->7145 7144->7143 7145->7143 7147 6f17b0 7146->7147 7149 6f1710 7146->7149 7147->7141 7147->7143 7148 6f154b 2 API calls 7148->7149 7149->7147 7149->7148 7150 6f2b07 7152 6f2b13 7150->7152 7153 6f2b27 7152->7153 7155 6f2b4f 7153->7155 7156 6f2b68 7153->7156 7158 6f2b71 7156->7158 7159 6f2b80 7158->7159 7160 6f2b88 7159->7160 7161 6f0f98 2 API calls 7159->7161 7162 6f2c2b GetModuleHandleW 7160->7162 7163 6f2c39 GetModuleHandleA 7160->7163 7164 6f2b92 7161->7164 7167 6f2bc0 7162->7167 7163->7167 7165 6f2bad 7164->7165 7166 6f16aa 2 API calls 7164->7166 7165->7160 7165->7167 7166->7165 7168 51efdb VirtualAlloc 7169 51f006 7168->7169 7170 6f28c5 7171 6f28ce 16 API calls 7170->7171 7172 69e942 LoadLibraryA 7173 69e95d 7172->7173 7174 6f58e2 7176 6f58eb 7174->7176 7177 6f0f98 2 API calls 7176->7177 7178 6f58f7 7177->7178 7179 6f5947 ReadFile 7178->7179 7180 6f5910 7178->7180 7179->7180 7181 6a1bfe 7183 6a1b9c CreateFileA 7181->7183 7184 6a1c1f 7183->7184 7185 6f2c5a 7186 6f0f98 2 API calls 7185->7186 7187 6f2c66 7186->7187 7188 6f2c84 7187->7188 7189 6f16aa 2 API calls 7187->7189 7190 6f2cb5 GetModuleHandleExA 7188->7190 7191 6f2c8c 7188->7191 7189->7188 7190->7191 7192 6a1a33 7194 6a1a55 CreateFileA 7192->7194 7195 6a1c1f 7194->7195 7196 6a1aa3 7194->7196 7200 6a1af4 7196->7200 7198 6a1af0 CreateFileA 7198->7195 7201 6a1afe CreateFileA 7200->7201 7203 6a1c1f 7201->7203 7204 6f5053 7205 6f0f98 2 API calls 7204->7205 7206 6f505f GetCurrentProcess 7205->7206 7207 6f50ab 7206->7207 7209 6f506f 7206->7209 7208 6f50b0 DuplicateHandle 7207->7208 7210 6f50a6 7208->7210 7209->7207 7211 6f509a 7209->7211 7213 6f2df0 7211->7213 7215 6f2e1a 7213->7215 7214 6f2ead 7214->7210 7215->7214 7216 6f2dd8 CloseHandle 7215->7216 7216->7214 7217 6f36d2 7219 6f36e9 7217->7219 7218 6f3752 CreateFileA 7221 6f3797 7218->7221 7219->7218 7220 6f37e6 7219->7220 7221->7220 7222 6f2db1 CloseHandle 7221->7222 7222->7220 7223 4d60d48 7224 4d60d93 OpenSCManagerW 7223->7224 7226 4d60ddc 7224->7226 7227 4d61308 7228 4d61349 ImpersonateLoggedOnUser 7227->7228 7229 4d61376 7228->7229 7230 6f27d0 7233 6f2610 7230->7233 7235 6f261c 7233->7235 7236 6f2631 7235->7236 7237 6f265e 16 API calls 7236->7237 7238 6f264f 7236->7238 7237->7238

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 37 6a19ee-6a1a04 38 6a1a0a 37->38 39 6a1a10-6a1a16 37->39 38->39 40 6a1a1c 39->40 41 6a1a26-6a1a4f 39->41 40->41 43 6a1a5f-6a1a60 41->43 44 6a1a55-6a1a5e 41->44 45 6a1a6b-6a1a78 43->45 46 6a1a66-6a1a6a 43->46 44->43 47 6a1a7e-6a1a7f 45->47 48 6a1a80-6a1a8a 45->48 46->45 47->48 49 6a1a92-6a1a9d CreateFileA 48->49 50 6a1a90 48->50 51 6a1c5f-6a1c62 49->51 52 6a1aa3-6a1add 49->52 50->49 54 6a1c68 51->54 55 6a1c6e-6a1c92 call 6a1c95 51->55 59 6a1aeb-6a1b0a call 6a1af4 52->59 60 6a1ae3 52->60 54->55 67 6a1b10-6a1b15 59->67 68 6a1b16-6a1ba0 59->68 60->59 62 6a1ae9-6a1aea 60->62 62->59 67->68 75 6a1bac-6a1c19 CreateFileA 68->75 76 6a1ba6-6a1bab 68->76 75->51 80 6a1c1f-6a1c3e call 6a1c34 call 6a1c41 75->80 76->75 80->51
    APIs
    • CreateFileA.KERNELBASE(?,006A19EA,00000003,00000000,00000003,006A1922,00000000), ref: 006A1A92
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID: C
    • API String ID: 823142352-1037565863
    • Opcode ID: 7fd63a951188b8f33bfabb70c96c867ea700198c855a3f0de7f723f5d9916259
    • Instruction ID: 22cb6bf0621aecf7f820aae94465557d15ac171342ccfa1ae627489977e1d4fd
    • Opcode Fuzzy Hash: 7fd63a951188b8f33bfabb70c96c867ea700198c855a3f0de7f723f5d9916259
    • Instruction Fuzzy Hash: DE51D6B72891557EE301EA596E10EFB77AEE7C3730F30842AF906DA542E2544E0A5A34

    Control-flow Graph

    APIs
    • LoadLibraryExW.KERNEL32(?,?,?), ref: 006F277C
    • LoadLibraryExA.KERNELBASE(00000000,?,?), ref: 006F2790
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID: .dll$.exe$1002
    • API String ID: 1029625771-847511843
    • Opcode ID: a6de7ae05f326e52c50b3777b5d7d6921f0b14d173b055588dc321ea517d1a2c
    • Instruction ID: 81312e9d00b2ba37dc08e0cc8e98112f0c595e3486321d055db51012bdb40dbb
    • Opcode Fuzzy Hash: a6de7ae05f326e52c50b3777b5d7d6921f0b14d173b055588dc321ea517d1a2c
    • Instruction Fuzzy Hash: 2331693180420EEFDF25AF50D964ABE7B77FF04350F104129FA069A261CB3199A1DFA5

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 85 6f2b71-6f2b82 call 6f24d5 88 6f2b8d-6f2b96 call 6f0f98 85->88 89 6f2b88 85->89 96 6f2b9c-6f2ba8 call 6f16aa 88->96 97 6f2bca-6f2bd1 88->97 90 6f2c21-6f2c25 89->90 92 6f2c2b-6f2c34 GetModuleHandleW 90->92 93 6f2c39-6f2c3c GetModuleHandleA 90->93 95 6f2c42 92->95 93->95 101 6f2c4c-6f2c4e 95->101 104 6f2bad-6f2baf 96->104 98 6f2c1c call 6f1043 97->98 99 6f2bd7-6f2bde 97->99 98->90 99->98 102 6f2be4-6f2beb 99->102 102->98 106 6f2bf1-6f2bf8 102->106 104->98 105 6f2bb5-6f2bba 104->105 105->98 107 6f2bc0-6f2c47 call 6f1043 105->107 106->98 108 6f2bfe-6f2c12 106->108 107->101 108->98
    APIs
    • GetModuleHandleW.KERNEL32(?,?,?,?,006F2B03,?,00000000,00000000), ref: 006F2C2E
    • GetModuleHandleA.KERNEL32(00000000,?,?,?,006F2B03,?,00000000,00000000), ref: 006F2C3C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: HandleModule
    • String ID: .dll
    • API String ID: 4139908857-2738580789
    • Opcode ID: eb2bff11f8c2acfb17ee9a5b1797c6d21ef661e554b04e5b9831d169cc3d131f
    • Instruction ID: 341d1c635122335a9413a681e0de9182059cdf00d373aa910ef93878e86e3840
    • Opcode Fuzzy Hash: eb2bff11f8c2acfb17ee9a5b1797c6d21ef661e554b04e5b9831d169cc3d131f
    • Instruction Fuzzy Hash: B2115E3010150FEEEBB59F14C819BBD3AA3BF10345F140225FB02495A1CBB59AE5CEA2

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 112 6f54cb-6f54d9 113 6f54df-6f54e6 112->113 114 6f54eb 112->114 115 6f54f2-6f5508 call 6f0f98 call 6f16fc 113->115 114->115 120 6f550e-6f551c call 6f16aa 115->120 121 6f5527 115->121 127 6f5533-6f5538 120->127 128 6f5522 120->128 122 6f552b-6f552e 121->122 124 6f555e-6f5565 call 6f1043 122->124 129 6f554f-6f5552 GetFileAttributesA 127->129 130 6f553e-6f554a GetFileAttributesW 127->130 128->122 132 6f5558-6f5559 129->132 130->132 132->124
    APIs
    • GetFileAttributesW.KERNELBASE(00D383AC,-11DB5FEC), ref: 006F5544
    • GetFileAttributesA.KERNEL32(00000000,-11DB5FEC), ref: 006F5552
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: AttributesFile
    • String ID: @
    • API String ID: 3188754299-2726393805
    • Opcode ID: 4a18726d280e2c0afc3ceded0ba71851fef18f3c279e073f1c21bf89448537d3
    • Instruction ID: ba8992a6b966dac061d6ba9f5fde3d7a3917fdd5cd6b9535f2aef493456a7811
    • Opcode Fuzzy Hash: 4a18726d280e2c0afc3ceded0ba71851fef18f3c279e073f1c21bf89448537d3
    • Instruction Fuzzy Hash: 5F016971504A0CFAEF21AF68C9097BC7EB3BF61385F204065E70369191C7719E92EB44

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 133 6a1af4-6a1b0a 136 6a1b10-6a1b15 133->136 137 6a1b16-6a1ba0 133->137 136->137 144 6a1bac-6a1c19 CreateFileA 137->144 145 6a1ba6-6a1bab 137->145 149 6a1c5f-6a1c62 144->149 150 6a1c1f-6a1c3e call 6a1c34 call 6a1c41 144->150 145->144 152 6a1c68 149->152 153 6a1c6e-6a1c92 call 6a1c95 149->153 150->149 152->153
    APIs
    • CreateFileA.KERNELBASE(?,B9CFE632,00000003,00000000,00000003,006A1AF0,00000000,?,006A19EA,00000003,00000000,00000003,006A1922,00000000), ref: 006A1C16
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID: C
    • API String ID: 823142352-1037565863
    • Opcode ID: cafeee8d4d25d6cc1e4274bfe7423846ec04fa3d81ecb0be150c0f1b16f8910a
    • Instruction ID: 6f76ff7e31d48d9cde9cf08607b7b93b5b0ddaa1f6570eb201c4615704f8ac09
    • Opcode Fuzzy Hash: cafeee8d4d25d6cc1e4274bfe7423846ec04fa3d81ecb0be150c0f1b16f8910a
    • Instruction Fuzzy Hash: E831EAB61882197DF715DE156E10EFF7B6ED7C3730F30842AF402DA542E2954E0A5A34

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 160 6f154b-6f157b 162 6f16a6-6f16a7 160->162 163 6f1581-6f1596 160->163 163->162 165 6f159c-6f15a0 163->165 166 6f15a6-6f15b8 PathAddExtensionA 165->166 167 6f15c2-6f15c9 165->167 170 6f15c1 166->170 168 6f15cf-6f15de call 6f11ec 167->168 169 6f15eb-6f15f2 167->169 176 6f15e3-6f15e5 168->176 172 6f15f8-6f15ff 169->172 173 6f1634-6f163b 169->173 170->167 177 6f1618-6f1627 call 6f11ec 172->177 178 6f1605-6f160e 172->178 174 6f165d-6f1664 173->174 175 6f1641-6f1657 call 6f11ec 173->175 182 6f166a-6f1680 call 6f11ec 174->182 183 6f1686-6f168d 174->183 175->162 175->174 176->162 176->169 184 6f162c-6f162e 177->184 178->177 179 6f1614 178->179 179->177 182->162 182->183 183->162 187 6f1693-6f16a0 call 6f1225 183->187 184->162 184->173 187->162
    APIs
    • PathAddExtensionA.KERNELBASE(?,00000000), ref: 006F15AD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: ExtensionPath
    • String ID: \\?\
    • API String ID: 158807944-4282027825
    • Opcode ID: 38806ef30d6c3af47abeb662beb84a884b2b1d167c453ac1da3d0dbbaeeb9d55
    • Instruction ID: 85717608807d97ed553480daae359674d29311ee2fb5e60c58a3799ebe4b72af
    • Opcode Fuzzy Hash: 38806ef30d6c3af47abeb662beb84a884b2b1d167c453ac1da3d0dbbaeeb9d55
    • Instruction Fuzzy Hash: 4031E676A0020DFEDF229F94CC09FEEB77ABF56784F040164FA01A95A0D3729A61DB54

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 191 6f2c5a-6f2c6d call 6f0f98 194 6f2c73-6f2c7f call 6f16aa 191->194 195 6f2cb0-6f2cc4 call 6f1043 GetModuleHandleExA 191->195 198 6f2c84-6f2c86 194->198 201 6f2cce-6f2cd0 195->201 198->195 200 6f2c8c-6f2c93 198->200 202 6f2c9c-6f2cc9 call 6f1043 200->202 203 6f2c99 200->203 202->201 203->202
    APIs
      • Part of subcall function 006F0F98: GetCurrentThreadId.KERNEL32 ref: 006F0FA7
      • Part of subcall function 006F0F98: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 006F0FEA
    • GetModuleHandleExA.KERNELBASE(?,?,?), ref: 006F2CBE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: CurrentHandleModuleSleepThread
    • String ID: .dll
    • API String ID: 683542999-2738580789
    • Opcode ID: 8ce2e79ee89cad99099cb3bb92964f37ebc78beec9f16d91e955691ad0cf9f75
    • Instruction ID: d68d2f46605914c483a92c639ced59a128f8617cc576835e7c767add4c001d12
    • Opcode Fuzzy Hash: 8ce2e79ee89cad99099cb3bb92964f37ebc78beec9f16d91e955691ad0cf9f75
    • Instruction Fuzzy Hash: 0CF09A7210020EEFEF50AF54C889ABD3BA2BF18340F108015FF058A256DB31C6A1DF20

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 206 6a1a22-6a1a4f 208 6a1a5f-6a1a60 206->208 209 6a1a55-6a1a5e 206->209 210 6a1a6b-6a1a78 208->210 211 6a1a66-6a1a6a 208->211 209->208 212 6a1a7e-6a1a7f 210->212 213 6a1a80-6a1a8a 210->213 211->210 212->213 214 6a1a92-6a1a9d CreateFileA 213->214 215 6a1a90 213->215 216 6a1c5f-6a1c62 214->216 217 6a1aa3-6a1add 214->217 215->214 219 6a1c68 216->219 220 6a1c6e-6a1c92 call 6a1c95 216->220 224 6a1aeb-6a1b0a call 6a1af4 217->224 225 6a1ae3 217->225 219->220 232 6a1b10-6a1b15 224->232 233 6a1b16-6a1ba0 224->233 225->224 227 6a1ae9-6a1aea 225->227 227->224 232->233 240 6a1bac-6a1c19 CreateFileA 233->240 241 6a1ba6-6a1bab 233->241 240->216 245 6a1c1f-6a1c3e call 6a1c34 call 6a1c41 240->245 241->240 245->216
    APIs
    • CreateFileA.KERNELBASE(?,006A19EA,00000003,00000000,00000003,006A1922,00000000), ref: 006A1A92
    Memory Dump Source
    • Source File: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: aaa413dd6975d9b43f3756f0b0596ee81490307395a0a48933a441748a4acc0b
    • Instruction ID: 46620fe913d37554ce4145e8385ef8097a4b37d52e2a6a22ecfa41f5373c0619
    • Opcode Fuzzy Hash: aaa413dd6975d9b43f3756f0b0596ee81490307395a0a48933a441748a4acc0b
    • Instruction Fuzzy Hash: E341F6B728D2557EE305EA156E10EFB7BAEE7C3730F30842AF402CA542E2550E0A5A34

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 250 6a1a33-6a1a4f 251 6a1a5f-6a1a60 250->251 252 6a1a55-6a1a5e 250->252 253 6a1a6b-6a1a78 251->253 254 6a1a66-6a1a6a 251->254 252->251 255 6a1a7e-6a1a7f 253->255 256 6a1a80-6a1a8a 253->256 254->253 255->256 257 6a1a92-6a1a9d CreateFileA 256->257 258 6a1a90 256->258 259 6a1c5f-6a1c62 257->259 260 6a1aa3-6a1add 257->260 258->257 262 6a1c68 259->262 263 6a1c6e-6a1c92 call 6a1c95 259->263 267 6a1aeb-6a1b0a call 6a1af4 260->267 268 6a1ae3 260->268 262->263 275 6a1b10-6a1b15 267->275 276 6a1b16-6a1ba0 267->276 268->267 270 6a1ae9-6a1aea 268->270 270->267 275->276 283 6a1bac-6a1c19 CreateFileA 276->283 284 6a1ba6-6a1bab 276->284 283->259 288 6a1c1f-6a1c3e call 6a1c34 call 6a1c41 283->288 284->283 288->259
    APIs
    • CreateFileA.KERNELBASE(?,006A19EA,00000003,00000000,00000003,006A1922,00000000), ref: 006A1A92
    Memory Dump Source
    • Source File: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 4914b07099de89345c2f679923e4f8d8cbb21cb4b687b62a50ebc335947ec680
    • Instruction ID: e200aff9c79dc7357ec1b98b6d31cb5a92aeb9e56a10c14b7ea2d90ba9657031
    • Opcode Fuzzy Hash: 4914b07099de89345c2f679923e4f8d8cbb21cb4b687b62a50ebc335947ec680
    • Instruction Fuzzy Hash: 984116B718D2557EE345EA556A50EFB7BAEE7C3730F30843EF402CA542E2510D0A9A34

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 293 6f56e7-6f56f5 294 6f56fb-6f5702 293->294 295 6f5707 293->295 296 6f570e-6f571a call 6f0f98 294->296 295->296 299 6f5735-6f5745 call 6f5699 296->299 300 6f5720-6f572a call 6f55f4 296->300 306 6f574b-6f5752 299->306 307 6f5757-6f5765 call 6f16aa 299->307 300->299 305 6f5730 300->305 308 6f5776-6f577b 305->308 306->308 307->308 313 6f576b-6f576c call 6f2eee 307->313 310 6f57a4-6f57b9 CreateFileA 308->310 311 6f5781-6f579f CreateFileW 308->311 314 6f57bf-6f57c0 310->314 311->314 317 6f5771 313->317 316 6f57c5-6f57cc call 6f1043 314->316 317->316
    APIs
    • CreateFileW.KERNELBASE(00D383AC,?,?,-11DB5FEC,?,?,?,-11DB5FEC,?), ref: 006F5799
      • Part of subcall function 006F5699: IsBadWritePtr.KERNEL32(?,00000004), ref: 006F56A7
    • CreateFileA.KERNEL32(?,?,?,-11DB5FEC,?,?,?,-11DB5FEC,?), ref: 006F57B9
    Memory Dump Source
    • Source File: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: CreateFile$Write
    • String ID:
    • API String ID: 1125675974-0
    • Opcode ID: 9a46bb49f205cdef3333f959c9a6dcf4fa5c9293cf0e90cde1a779b577e50da7
    • Instruction ID: 956c349e7b9e0075246d83a888ef311fd6657b580e4eee7bcb82d1a15e94a0df
    • Opcode Fuzzy Hash: 9a46bb49f205cdef3333f959c9a6dcf4fa5c9293cf0e90cde1a779b577e50da7
    • Instruction Fuzzy Hash: 7111E77200094EFADF22AFA4DC09BED3F63BF54384F144015FB0268465D77689A2EB51

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 320 6f5053-6f5069 call 6f0f98 GetCurrentProcess 323 6f506f-6f5072 320->323 324 6f50ab-6f50cd call 6f1043 DuplicateHandle 320->324 323->324 326 6f5078-6f507b 323->326 330 6f50d7-6f50d9 324->330 326->324 328 6f5081-6f5094 call 6f0df2 326->328 328->324 332 6f509a-6f50d2 call 6f2df0 call 6f1043 328->332 332->330
    APIs
      • Part of subcall function 006F0F98: GetCurrentThreadId.KERNEL32 ref: 006F0FA7
      • Part of subcall function 006F0F98: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 006F0FEA
    • GetCurrentProcess.KERNEL32(-11DB5FEC), ref: 006F5060
    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 006F50C6
    Memory Dump Source
    • Source File: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: Current$DuplicateHandleProcessSleepThread
    • String ID:
    • API String ID: 2846201637-0
    • Opcode ID: ec3604a3c0aa2659b5f3bf4e110af20226ace81829a9e7f731927c314b067fb8
    • Instruction ID: c36c90d589f9e4a13a7929d037350579514bb046512cda069f44e77c9aec0f29
    • Opcode Fuzzy Hash: ec3604a3c0aa2659b5f3bf4e110af20226ace81829a9e7f731927c314b067fb8
    • Instruction Fuzzy Hash: B601FB3210054EEB8F62AFA4DC45CFE3B27BF943507004519FB1695016DF35D962EBA1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 337 6f0f98-6f0fae GetCurrentThreadId 338 6f0fb0-6f0fbc 337->338 339 6f0ff7-6f1004 338->339 340 6f0fc2-6f0fc4 338->340 340->339 341 6f0fca-6f0fd1 340->341 342 6f0fd7-6f0fde 341->342 343 6f0fe6-6f0ff2 Sleep 341->343 342->343 345 6f0fe4 342->345 343->338 345->343
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 006F0FA7
    • Sleep.KERNELBASE(00000005,00050000,00000000), ref: 006F0FEA
    Memory Dump Source
    • Source File: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: CurrentSleepThread
    • String ID:
    • API String ID: 1164918020-0
    • Opcode ID: 3fd1a514047d0576787620a5f42a71a22cb3053d4a0737c4e7bea7aeb941b791
    • Instruction ID: 9e5d9856fcf728625d580a084f3a94c2e392f9607a234e5bc0217a3e78255599
    • Opcode Fuzzy Hash: 3fd1a514047d0576787620a5f42a71a22cb3053d4a0737c4e7bea7aeb941b791
    • Instruction Fuzzy Hash: C1F0B43150220EEFEB328F50C9887BFB6BAFF4030AF200179D70186542D7B11C55DA81

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 346 6a1ab6-6a1add 347 6a1aeb-6a1b0a call 6a1af4 346->347 348 6a1ae3 346->348 354 6a1b10-6a1b15 347->354 355 6a1b16-6a1ba0 347->355 348->347 349 6a1ae9-6a1aea 348->349 349->347 354->355 362 6a1bac-6a1c19 CreateFileA 355->362 363 6a1ba6-6a1bab 355->363 367 6a1c5f-6a1c62 362->367 368 6a1c1f-6a1c3e call 6a1c34 call 6a1c41 362->368 363->362 370 6a1c68 367->370 371 6a1c6e-6a1c92 call 6a1c95 367->371 368->367 370->371
    Memory Dump Source
    • Source File: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 52273afa7fa332c525328dc40fdd40db4b4379234a0aa791f4dd1ae0e26d1542
    • Instruction ID: 2fd15c8ffb20449333afed245a0d144fa7dddc93fe29bb941f2dacf25faefd36
    • Opcode Fuzzy Hash: 52273afa7fa332c525328dc40fdd40db4b4379234a0aa791f4dd1ae0e26d1542
    • Instruction Fuzzy Hash: D831FCB61892557EE706AA145E50EFB7B6EE7C3770F30846AF402DF143E2900D0A6A30

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 378 6f36d2-6f36e3 379 6f36e9-6f36fd call 6f1076 378->379 380 6f3712-6f371b call 6f1076 378->380 390 6f3800 379->390 391 6f3703-6f3711 379->391 385 6f37f8-6f37fb call 6f109b 380->385 386 6f3721-6f3732 call 6f2eb4 380->386 385->390 394 6f3738-6f373c 386->394 395 6f3752-6f3791 CreateFileA 386->395 393 6f3807-6f380b 390->393 391->380 396 6f374f 394->396 397 6f3742-6f374e 394->397 398 6f3797-6f37b4 395->398 399 6f37b5-6f37b8 395->399 396->395 397->396 398->399 401 6f37be-6f37d5 call 6f0db8 399->401 402 6f37eb-6f37f3 call 6f2d43 399->402 401->393 409 6f37db-6f37e6 call 6f2db1 401->409 402->390 409->390
    APIs
    • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,?,00000000,00000010), ref: 006F3787
    Memory Dump Source
    • Source File: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 393cf30e5cc95b693f6ca14a60464330842d94a3cc88295f86dfebe7cad59c2e
    • Instruction ID: 23649a67d29a0855e414414153aa04e7cb825028606609cdd062de8051a07c28
    • Opcode Fuzzy Hash: 393cf30e5cc95b693f6ca14a60464330842d94a3cc88295f86dfebe7cad59c2e
    • Instruction Fuzzy Hash: F431A4B1900208FEEF209F64DC45FEDBBB9FF44314F208169F615AA291C771AA41CB54

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 412 69e942-69e945 LoadLibraryA 413 69e95d-69ea6d 412->413
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID:
    • API String ID: 1029625771-0
    • Opcode ID: 56cebb0c674e61a5436be41d51e2c4a2d879a1c6bd16b21a9a3d778b5e3741a1
    • Instruction ID: e50336e3f51381f46e385a71b8cd9ec83ecdf454604c7fd920b5d440cc4f940c
    • Opcode Fuzzy Hash: 56cebb0c674e61a5436be41d51e2c4a2d879a1c6bd16b21a9a3d778b5e3741a1
    • Instruction Fuzzy Hash: 4B31E6B251C610AFE752AF18D8867BEFBE5EF58310F16082DE6C4C3650E6359490CB97
    APIs
    • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,?,00000000), ref: 006F2F70
    Memory Dump Source
    • Source File: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 425c62193a554222f17eec1daf317e47630e2b39af30312873c5024cbbc97bbb
    • Instruction ID: b942b6b8b54e6baa310e61692f4e907025c1ca84eff33725d0fa9f93d8f0bb09
    • Opcode Fuzzy Hash: 425c62193a554222f17eec1daf317e47630e2b39af30312873c5024cbbc97bbb
    • Instruction Fuzzy Hash: 7A31C1B1A40209BEEB219F64DC46FE97BB9BF04724F204269F711AE2D1C7B1A641CF54
    APIs
    • CreateFileA.KERNELBASE(?,B9CFE632,00000003,00000000,00000003,006A1AF0,00000000,?,006A19EA,00000003,00000000,00000003,006A1922,00000000), ref: 006A1C16
    Memory Dump Source
    • Source File: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 64ab219c1a15012d08d1763729d154de7edb27e1c0e66e761b0c2b49805771f9
    • Instruction ID: f735f40ffc69178aa042e74c556e7d589d6f7a9fec0954a6a1ee7c079cc7a0da
    • Opcode Fuzzy Hash: 64ab219c1a15012d08d1763729d154de7edb27e1c0e66e761b0c2b49805771f9
    • Instruction Fuzzy Hash: C711E7B61882557EE341EA556E10EFB7B6EE7C3770F30847AF443DA542E2944D0AA930
    APIs
    • CreateFileA.KERNELBASE(?,B9CFE632,00000003,00000000,00000003,006A1AF0,00000000,?,006A19EA,00000003,00000000,00000003,006A1922,00000000), ref: 006A1C16
    Memory Dump Source
    • Source File: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 37039ad8bd92f1566d5a68675fccc2bf296e87d2dfe1d0efc52d0e849b271193
    • Instruction ID: a624fb1cfdb7f3fc1e7c26bfe852c87495423e2cf75317f0ed539b5fb1658967
    • Opcode Fuzzy Hash: 37039ad8bd92f1566d5a68675fccc2bf296e87d2dfe1d0efc52d0e849b271193
    • Instruction Fuzzy Hash: 3A11C4B65882597DF345AA256E10EFB7B6FE6C3770F30843AF403DA442E2950E0A6934
    APIs
    • CreateFileA.KERNELBASE(?,B9CFE632,00000003,00000000,00000003,006A1AF0,00000000,?,006A19EA,00000003,00000000,00000003,006A1922,00000000), ref: 006A1C16
    Memory Dump Source
    • Source File: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: fe27492482e25e18056656b0785f1ac19895e7f8116911f3547c11f9df77d93a
    • Instruction ID: db6f280c2936dc6b497ec9dd30c7576f25cc039e4bfd63f9e2bf3d0b7e9e49d4
    • Opcode Fuzzy Hash: fe27492482e25e18056656b0785f1ac19895e7f8116911f3547c11f9df77d93a
    • Instruction Fuzzy Hash: 4B11E9B65882557DE345DA216E11EFB7B6EE6C3770F30843AF403DA442E2940E0AA930
    APIs
    • CreateFileA.KERNELBASE(?,B9CFE632,00000003,00000000,00000003,006A1AF0,00000000,?,006A19EA,00000003,00000000,00000003,006A1922,00000000), ref: 006A1C16
    Memory Dump Source
    • Source File: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 2508489eb7496730f3568c25abd8d41df0c1c4f3ac830ae58b1c561bf8366f03
    • Instruction ID: fa449acc51231ef262264eb4885dcd02e0269efab13207fd572f1f157077378b
    • Opcode Fuzzy Hash: 2508489eb7496730f3568c25abd8d41df0c1c4f3ac830ae58b1c561bf8366f03
    • Instruction Fuzzy Hash: 411108B65882557DE351AA516F10EFB7B6EE7C3770F30843AF403DA543E2950D0AA934
    APIs
    • OpenSCManagerW.SECHOST(00000000,00000000,?), ref: 04D60DCD
    Memory Dump Source
    • Source File: 00000000.00000002.1555772935.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4d60000_file.jbxd
    Similarity
    • API ID: ManagerOpen
    • String ID:
    • API String ID: 1889721586-0
    • Opcode ID: bfe25cfff443df7210c227e0712abb399f8b501d458ea0b8383f08e452858901
    • Instruction ID: 6777b811e1cc1b6cfc7ac6cdb0677c6650de4198990e2092f5c92a4df0b24c63
    • Opcode Fuzzy Hash: bfe25cfff443df7210c227e0712abb399f8b501d458ea0b8383f08e452858901
    • Instruction Fuzzy Hash: CC2137B58012099FDB11CF99D884BDEFBF4FB88710F14821AD809AB244C774A540CFA5
    APIs
    • OpenSCManagerW.SECHOST(00000000,00000000,?), ref: 04D60DCD
    Memory Dump Source
    • Source File: 00000000.00000002.1555772935.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4d60000_file.jbxd
    Similarity
    • API ID: ManagerOpen
    • String ID:
    • API String ID: 1889721586-0
    • Opcode ID: 3a60d7dfa5ee6fd560cec0cc99dde48bade5ae6ef9e507e27dab5ff3472ce44e
    • Instruction ID: eafd472e537af1374e102317fec8bfa4d97e5889ecda6164c2189ce28203e9ae
    • Opcode Fuzzy Hash: 3a60d7dfa5ee6fd560cec0cc99dde48bade5ae6ef9e507e27dab5ff3472ce44e
    • Instruction Fuzzy Hash: 072135B6C002099FCB10CF99D884BDEFBF4FB88710F14821AD809AB244C734A540CFA5
    APIs
    • ControlService.ADVAPI32(?,?,?), ref: 04D61580
    Memory Dump Source
    • Source File: 00000000.00000002.1555772935.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4d60000_file.jbxd
    Similarity
    • API ID: ControlService
    • String ID:
    • API String ID: 253159669-0
    • Opcode ID: 2559a80d461daea6b47befd481cfb9f0bd90395b9f1e74840d629972564c99b7
    • Instruction ID: c86b040cf195e441f40c419412b27ada98cd26000b93e68bd3e456bb6bca7e0d
    • Opcode Fuzzy Hash: 2559a80d461daea6b47befd481cfb9f0bd90395b9f1e74840d629972564c99b7
    • Instruction Fuzzy Hash: BF2103B59003499FDB10CF9AC884BDEFBF4AB48324F108429E559A7340D778A644CFA5
    APIs
    • CreateFileA.KERNELBASE(?,B9CFE632,00000003,00000000,00000003,006A1AF0,00000000,?,006A19EA,00000003,00000000,00000003,006A1922,00000000), ref: 006A1C16
    Memory Dump Source
    • Source File: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: c55e14ca22b7df45cc82d161e4d2e1922f385b4c376f6cfd48ff2a7890bea528
    • Instruction ID: e2b2eb967af4bd41306eff4027a2e90c94b64c62a8174a4a6c4dc665ad6ac1f4
    • Opcode Fuzzy Hash: c55e14ca22b7df45cc82d161e4d2e1922f385b4c376f6cfd48ff2a7890bea528
    • Instruction Fuzzy Hash: A0014C361CD3D96EE346EB215D508EA7F7AED83370B2440AAE483CA043C2484D4FDA34
    APIs
    • ControlService.ADVAPI32(?,?,?), ref: 04D61580
    Memory Dump Source
    • Source File: 00000000.00000002.1555772935.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4d60000_file.jbxd
    Similarity
    • API ID: ControlService
    • String ID:
    • API String ID: 253159669-0
    • Opcode ID: 0c78965bd36e1b6eecfcc9dc3687067873b0e7cc105c436cf5a020f15c894466
    • Instruction ID: d6b7987a9742014d90a28256534c2185492ce3c747a045d36409615943c3f314
    • Opcode Fuzzy Hash: 0c78965bd36e1b6eecfcc9dc3687067873b0e7cc105c436cf5a020f15c894466
    • Instruction Fuzzy Hash: F211E4B59003499FDB10CF9AC884BDEFBF4FB48320F108429E559A3250D778A645CFA5
    APIs
    • ImpersonateLoggedOnUser.KERNELBASE ref: 04D61367
    Memory Dump Source
    • Source File: 00000000.00000002.1555772935.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4d60000_file.jbxd
    Similarity
    • API ID: ImpersonateLoggedUser
    • String ID:
    • API String ID: 2216092060-0
    • Opcode ID: 52ece695fa0651551a8ae603b12925099cb234ec08263bbfbb6561cbc49cfa6b
    • Instruction ID: 6c45c340c12859f2551018d0fa69063c05be978729770e70b7b3fd4590e67b30
    • Opcode Fuzzy Hash: 52ece695fa0651551a8ae603b12925099cb234ec08263bbfbb6561cbc49cfa6b
    • Instruction Fuzzy Hash: B41125B1800249CFDB10CF9AD484BDEFBF4EF48724F10841AD559A3640C778A945CFA5
    APIs
    • ImpersonateLoggedOnUser.KERNELBASE ref: 04D61367
    Memory Dump Source
    • Source File: 00000000.00000002.1555772935.0000000004D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D60000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4d60000_file.jbxd
    Similarity
    • API ID: ImpersonateLoggedUser
    • String ID:
    • API String ID: 2216092060-0
    • Opcode ID: 6e2fb50a489ff1b98dfecc10f74b01c3fa74410d57426e0cae032dde997dcae4
    • Instruction ID: acf2617c036a3b0a602d49f845d603a69b3d582bbef5ef6c7e7e053b942158f2
    • Opcode Fuzzy Hash: 6e2fb50a489ff1b98dfecc10f74b01c3fa74410d57426e0cae032dde997dcae4
    • Instruction Fuzzy Hash: 3F1133B1800349CFDB20CF9AC844BDEFBF8EB48720F20842AD559A3640C778A944CFA5
    APIs
      • Part of subcall function 006F0F98: GetCurrentThreadId.KERNEL32 ref: 006F0FA7
      • Part of subcall function 006F0F98: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 006F0FEA
    • ReadFile.KERNELBASE(?,00000000,?,00000400,?,-11DB5FEC,?,?,006F361A,?,?,00000400,?,00000000,?,00000000), ref: 006F5957
    Memory Dump Source
    • Source File: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: CurrentFileReadSleepThread
    • String ID:
    • API String ID: 1253362762-0
    • Opcode ID: 70a1d0d89254a94c9c960d2138367390122b49b4f2fc92a0ded53fc865d36844
    • Instruction ID: e910eee96c15d02f78e712016d06122f7ed706fe9176ff308074df7665e9ec87
    • Opcode Fuzzy Hash: 70a1d0d89254a94c9c960d2138367390122b49b4f2fc92a0ded53fc865d36844
    • Instruction Fuzzy Hash: 87F01D3210054EEBCF165F98DC05DAE3B67BF55350F048015F71259121DB76C9A2EB61
    APIs
    • CreateFileA.KERNELBASE(?,B9CFE632,00000003,00000000,00000003,006A1AF0,00000000,?,006A19EA,00000003,00000000,00000003,006A1922,00000000), ref: 006A1C16
    Memory Dump Source
    • Source File: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 936ac471aedbc0f78d06cd155960f9706ede688e40b63f236b101f760fd2a2e5
    • Instruction ID: baafb18fae3106f8573b9709e96758afca36fb89fddd12c3ac8bba75eda8ba61
    • Opcode Fuzzy Hash: 936ac471aedbc0f78d06cd155960f9706ede688e40b63f236b101f760fd2a2e5
    • Instruction Fuzzy Hash: C4E022B958D2826FA311BA201D108BF2B1FEAC333071084A9EC03CA502CA088C079970
    APIs
    • GetProcAddress.KERNEL32(006F2084,006F2084), ref: 006F2919
    Memory Dump Source
    • Source File: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: AddressProc
    • String ID:
    • API String ID: 190572456-0
    • Opcode ID: 1df0437fa7a7db896cd60c4f551e8ba30d50861b1c5c2fcedf5494d65d0660c5
    • Instruction ID: d86683b1bb8b2dc98483f789b955e92dc9166ded656731ae8c38b5fa037a93d0
    • Opcode Fuzzy Hash: 1df0437fa7a7db896cd60c4f551e8ba30d50861b1c5c2fcedf5494d65d0660c5
    • Instruction Fuzzy Hash: B2E06D7210005EEA8F523FB1DC299BD3B5BAFA0380B008029BF0659061DF74C6A2EE65
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: lstrcmpi
    • String ID:
    • API String ID: 1586166983-0
    • Opcode ID: 84d795743f900aeaf867a34559dc443d97b888fce6517f6c4aa6a629c13c0381
    • Instruction ID: 73e2a11dbd887f2c26ce6a74b130ba1b0c1de66e6a9e1b5953060e1d67083b34
    • Opcode Fuzzy Hash: 84d795743f900aeaf867a34559dc443d97b888fce6517f6c4aa6a629c13c0381
    • Instruction Fuzzy Hash: 1801D63260010EFFCF119FA5CC04DEEBF76EF46780F004165B601A8560D7329A61DB64
    APIs
      • Part of subcall function 006F0F98: GetCurrentThreadId.KERNEL32 ref: 006F0FA7
      • Part of subcall function 006F0F98: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 006F0FEA
    • CloseHandle.KERNELBASE(006F36AF,-11DB5FEC,?,?,006F36AF,?), ref: 006F3D2A
    Memory Dump Source
    • Source File: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: CloseCurrentHandleSleepThread
    • String ID:
    • API String ID: 4003616898-0
    • Opcode ID: 54755fd43e176f1f8954b70050c7daf095b3070359b098b37f2a7edcb3b81294
    • Instruction ID: d10ef816316c7edb6434a04d72cb240168b4b2091709372fe79787bacd7dfb0d
    • Opcode Fuzzy Hash: 54755fd43e176f1f8954b70050c7daf095b3070359b098b37f2a7edcb3b81294
    • Instruction Fuzzy Hash: E0E0D8B210045DA5DD613AB8C849C7D1A1BAFD13407004126B7019D142DE24C682C664
    APIs
    • VirtualAlloc.KERNELBASE(00000000), ref: 0051EFF4
    Memory Dump Source
    • Source File: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 3c92a3d33004f0fc4ce0107631af0515dacb781c163b20012e30497f6088cbc6
    • Instruction ID: e91470a386515c85c232dcb1dcfb6c113e60c607cd763b18bcfae0c38af485c3
    • Opcode Fuzzy Hash: 3c92a3d33004f0fc4ce0107631af0515dacb781c163b20012e30497f6088cbc6
    • Instruction Fuzzy Hash: B2E017B640C20ADFEB002F60D80A7EEBBA4EF15336F000B15EE61C1AC0C3358C90DA1A
    APIs
    • CloseHandle.KERNELBASE(?,?,006F0E37,?,?), ref: 006F2DB7
    Memory Dump Source
    • Source File: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: CloseHandle
    • String ID:
    • API String ID: 2962429428-0
    • Opcode ID: 9953091d68157ba0eb5d09794f5cf63658722ecc324f39f751f65d8fcbcb64f2
    • Instruction ID: 3c4b5b0f72954ad94cb87c774bccafd0da83cf97236091ba9a653bf97280e482
    • Opcode Fuzzy Hash: 9953091d68157ba0eb5d09794f5cf63658722ecc324f39f751f65d8fcbcb64f2
    • Instruction Fuzzy Hash: 74B0923200050DBBCF82BF65DC0688DBFAABF51399B108120FA16484318B76EA609B94
    APIs
      • Part of subcall function 006F0F98: GetCurrentThreadId.KERNEL32 ref: 006F0FA7
      • Part of subcall function 006F0F98: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 006F0FEA
    • GetSystemTime.KERNEL32(?,-11DB5FEC), ref: 006F511A
    • GetFileTime.KERNEL32(?,?,?,?,-11DB5FEC), ref: 006F515D
    Memory Dump Source
    • Source File: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: Time$CurrentFileSleepSystemThread
    • String ID:
    • API String ID: 3818558864-0
    • Opcode ID: 6999cd07b64004155c02dd668652153a4dabfab01a17ac24779d06a199c26759
    • Instruction ID: e6894abf999cab1141559bd49ecf348e315ee6c687bba4d089e9755711a4fa7a
    • Opcode Fuzzy Hash: 6999cd07b64004155c02dd668652153a4dabfab01a17ac24779d06a199c26759
    • Instruction Fuzzy Hash: 9201283224054AFBDF219F99DC08EAF7F36FF92301B004526F612490A1CB7299A2DA60
    APIs
    • CryptVerifySignatureA.ADVAPI32(?,?,?,?,?,?), ref: 006F5FEA
    Memory Dump Source
    • Source File: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: CryptSignatureVerify
    • String ID:
    • API String ID: 1015439381-0
    • Opcode ID: cc50e32f678a6a55766c679baf347ef202e2d43db5f3576f2b2e584281770806
    • Instruction ID: b1e9056d2c1bd5a15aa8fcb1a2714283e0306cdb651d72f59b8cb0a5cd0d6d41
    • Opcode Fuzzy Hash: cc50e32f678a6a55766c679baf347ef202e2d43db5f3576f2b2e584281770806
    • Instruction Fuzzy Hash: 7DF01C3260560EFFCF01DF94C90499D7BB2FF15315B108265FA0696251D376DA61EF40
    APIs
      • Part of subcall function 006F0F98: GetCurrentThreadId.KERNEL32 ref: 006F0FA7
      • Part of subcall function 006F0F98: Sleep.KERNELBASE(00000005,00050000,00000000), ref: 006F0FEA
      • Part of subcall function 006F5699: IsBadWritePtr.KERNEL32(?,00000004), ref: 006F56A7
    • wsprintfA.USER32 ref: 006F4661
    • LoadImageA.USER32(?,?,?,?,?,?), ref: 006F4725
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: CurrentImageLoadSleepThreadWritewsprintf
    • String ID: %8x$%8x
    • API String ID: 2375920415-2046107164
    • Opcode ID: c02fb9663ece163ffcff71e3d091241be82f84e30c30f7286e07a3a52c8a8afc
    • Instruction ID: d3f521cedf9ea15aeeec49c8d400ea1e2eb3f377c9e071f3a47a45354fc48cd2
    • Opcode Fuzzy Hash: c02fb9663ece163ffcff71e3d091241be82f84e30c30f7286e07a3a52c8a8afc
    • Instruction Fuzzy Hash: B231F57290010AEFDF119F94DC49EEEBB76FF89700F108125F611A61A1CB719A62DB50
    APIs
    • GetFileAttributesExW.KERNEL32(00D383AC,00004020,00000000,-11DB5FEC), ref: 006F52D9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1553846158.00000000006EC000.00000040.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
    • Associated: 00000000.00000002.1553391778.0000000000510000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553409181.0000000000512000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553430851.0000000000516000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553449487.000000000051A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553471862.0000000000526000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553616192.0000000000683000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553633167.0000000000686000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.000000000069B000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553654204.00000000006A9000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553690985.00000000006AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553718284.00000000006B1000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553743798.00000000006C3000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553761222.00000000006C5000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553791287.00000000006C7000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553806755.00000000006C8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553827193.00000000006DA000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553860426.00000000006F6000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553873628.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553889435.00000000006F9000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553905018.00000000006FB000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553926126.0000000000713000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553938620.0000000000714000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553952327.0000000000715000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553966972.0000000000718000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1553982437.0000000000719000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554000101.000000000071D000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554015455.000000000071E000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554031797.0000000000723000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554049262.0000000000735000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554065413.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554080809.0000000000741000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554097088.0000000000748000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554116777.0000000000750000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554135067.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554176666.00000000007A0000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554189709.00000000007A2000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007AE000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554204489.00000000007B4000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554234306.00000000007C4000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1554246554.00000000007C6000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_510000_file.jbxd
    Similarity
    • API ID: AttributesFile
    • String ID: @
    • API String ID: 3188754299-2726393805
    • Opcode ID: 53fe506a82865f30c33272c3fc294346e725361bc741ce903597128e46a5936a
    • Instruction ID: 32fbb93c1d5a6b2ae12dcc2de3814fff2ae302bcb6b2ee2f9b4161480dbc4484
    • Opcode Fuzzy Hash: 53fe506a82865f30c33272c3fc294346e725361bc741ce903597128e46a5936a
    • Instruction Fuzzy Hash: 97319EB5504B09EFDF258F54D8447AEBBB1FF08340F008619EA566B650C371AAA1CF80