Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1562030
MD5:8453f1d8df8f15f1bbc160bd225b7df3
SHA1:4b62adaf743ed29ba865c424d24f73259fd08d5f
SHA256:52eada2c59ecea03387a3b6fa6a1e557cd5f32ebfc4f478c2e6800f56e25eef0
Tags:exeuser-Bitsight
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Hides threads from debuggers
Machine Learning detection for sample
PE file contains section with special chars
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Detected potential crypto function
Entry point lies outside standard sections
Found inlined nop instructions (likely shell or obfuscated code)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 320 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 8453F1D8DF8F15F1BBC160BD225B7DF3)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-25T05:46:21.953434+010020283713Unknown Traffic192.168.2.749705104.21.88.250443TCP
2024-11-25T05:46:23.939996+010020283713Unknown Traffic192.168.2.749707104.21.88.250443TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-25T05:46:22.681227+010020546531A Network Trojan was detected192.168.2.749705104.21.88.250443TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-25T05:46:22.681227+010020498361A Network Trojan was detected192.168.2.749705104.21.88.250443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeAvira: detected
Source: https://frogs-severz.sbs/wAvira URL Cloud: Label: malware
Source: https://frogs-severz.sbs/apiAvira URL Cloud: Label: malware
Source: https://frogs-severz.sbs/apinAvira URL Cloud: Label: malware
Source: https://frogs-severz.sbs/Avira URL Cloud: Label: malware
Source: file.exeVirustotal: Detection: 50%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: file.exeJoe Sandbox ML: detected
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.7:49705 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [eax], bl5_2_00E3CF05
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, eax5_2_00E6B8E0
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, ecx5_2_00E6B8E0
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+14h]5_2_00E398F0
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then push eax5_2_00E6F8D0
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edi, eax5_2_00E6F8D0
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx eax, byte ptr [esp+esi+000001E8h]5_2_00E3E0D8
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then push eax5_2_00E6B860
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [ebx], al5_2_00E50870
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 98D5A07Fh5_2_00E6C040
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], C18BC4BAh5_2_00E6C040
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 6DBC3610h5_2_00E6C040
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 98D5A07Fh5_2_00E6C040
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, eax5_2_00E3C02B
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx+14h]5_2_00E3E970
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [esi], cx5_2_00E3EA38
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-65h]5_2_00E3E35B
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 4C697C35h5_2_00E6BCE0
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [esi], cl5_2_00E58CB0
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, ebp5_2_00E35C90
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, ebp5_2_00E35C90
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, ecx5_2_00E3BC9D
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [eax+ecx]5_2_00E3AD00
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [edi]5_2_00E55E90
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [eax+ecx+00008F12h]5_2_00E377D0
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [ebp+ebx*4+00h], ax5_2_00E377D0
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-58FA0F6Ch]5_2_00E70F60

Networking

barindex
Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.7:49705 -> 104.21.88.250:443
Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:49705 -> 104.21.88.250:443
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49705 -> 104.21.88.250:443
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49707 -> 104.21.88.250:443
Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: frogs-severz.sbs
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: property-imper.sbs
Source: global trafficDNS traffic detected: DNS query: frogs-severz.sbs
Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: frogs-severz.sbs
Source: file.exe, 00000005.00000003.1345252759.000000000173F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000005.00000002.1346505388.0000000001742000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoftb
Source: file.exe, 00000005.00000003.1345252759.000000000174A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000005.00000002.1346505388.000000000174A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000005.00000002.1346187098.00000000016FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/
Source: file.exe, 00000005.00000003.1345252759.000000000174A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000005.00000002.1346505388.000000000174A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000005.00000003.1345190059.0000000001751000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000005.00000002.1346505388.0000000001756000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/api
Source: file.exe, 00000005.00000002.1346187098.00000000016E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/apin
Source: file.exe, 00000005.00000003.1345252759.000000000174A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000005.00000002.1346505388.000000000174A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/w
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.7:49705 version: TLS 1.2

System Summary

barindex
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: file.exeStatic PE information: section name:
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E690305_2_00E69030
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E389A05_2_00E389A0
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E3CF055_2_00E3CF05
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E6B8E05_2_00E6B8E0
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E398F05_2_00E398F0
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E6F8D05_2_00E6F8D0
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E3E0D85_2_00E3E0D8
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB8845_2_00FFB884
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E508705_2_00E50870
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E340405_2_00E34040
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E368405_2_00E36840
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E6C0405_2_00E6C040
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00EF30565_2_00EF3056
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00F969DB5_2_00F969DB
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E641D05_2_00E641D0
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E361A05_2_00E361A0
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E3E9705_2_00E3E970
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00F1413B5_2_00F1413B
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FF82F15_2_00FF82F1
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E34AC05_2_00E34AC0
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E35AC95_2_00E35AC9
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00F712C65_2_00F712C6
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0100CB355_2_0100CB35
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00F67AB45_2_00F67AB4
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_01005BBB5_2_01005BBB
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00F76A055_2_00F76A05
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E392105_2_00E39210
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E3B2105_2_00E3B210
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FA33F55_2_00FA33F5
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E32B805_2_00E32B80
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E4FB605_2_00E4FB60
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E4DB305_2_00E4DB30
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E624E05_2_00E624E0
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E36CC05_2_00E36CC0
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFD4D55_2_00FFD4D5
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E394D05_2_00E394D0
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00F874BA5_2_00F874BA
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E58CB05_2_00E58CB0
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E70C805_2_00E70C80
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FC1C905_2_00FC1C90
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E35C905_2_00E35C90
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_010025955_2_01002595
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FBCC555_2_00FBCC55
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E3542C5_2_00E3542C
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00F574005_2_00F57400
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0100ADFC5_2_0100ADFC
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E335805_2_00E33580
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E715805_2_00E71580
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E53D705_2_00E53D70
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E495305_2_00E49530
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E3AD005_2_00E3AD00
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00EB05115_2_00EB0511
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00F94EAB5_2_00F94EAB
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E55E905_2_00E55E90
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_01035FA15_2_01035FA1
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E506505_2_00E50650
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E57E205_2_00E57E20
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00F28E395_2_00F28E39
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FF9E115_2_00FF9E11
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00EACFE05_2_00EACFE0
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E327D05_2_00E327D0
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E377D05_2_00E377D0
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E687B05_2_00E687B0
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E6C7805_2_00E6C780
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E517905_2_00E51790
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E70F605_2_00E70F60
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E587705_2_00E58770
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_01004EAD5_2_01004EAD
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFEF125_2_00FFEF12
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: file.exeStatic PE information: Section: ZLIB complexity 0.9992443647540984
Source: file.exeStatic PE information: Section: rujnmhpu ZLIB complexity 0.9942296429910045
Source: classification engineClassification label: mal100.evad.winEXE@1/0@2/1
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E627B0 CoCreateInstance,5_2_00E627B0
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeVirustotal: Detection: 50%
Source: file.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: file.exeStatic file information: File size 1879040 > 1048576
Source: file.exeStatic PE information: Raw size of rujnmhpu is bigger than: 0x100000 < 0x1a0e00

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 5.2.file.exe.e30000.0.unpack :EW;.rsrc:W;.idata :W; :EW;rujnmhpu:EW;bfyrfdky:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;rujnmhpu:EW;bfyrfdky:EW;.taggant:EW;
Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
Source: file.exeStatic PE information: real checksum: 0x1cf736 should be: 0x1d238f
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: rujnmhpu
Source: file.exeStatic PE information: section name: bfyrfdky
Source: file.exeStatic PE information: section name: .taggant
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_01042910 push ebx; mov dword ptr [esp], edi5_2_01042967
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_010C3916 push 08A4EAE0h; mov dword ptr [esp], edi5_2_010C3940
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0108592D push 5F6BD2D3h; mov dword ptr [esp], eax5_2_01085953
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push edx; mov dword ptr [esp], ebp5_2_00FFB93D
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push 5337B263h; mov dword ptr [esp], ecx5_2_00FFB956
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push 02F79533h; mov dword ptr [esp], ecx5_2_00FFBA02
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push 4416E455h; mov dword ptr [esp], eax5_2_00FFBA94
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push 2209E6C9h; mov dword ptr [esp], edx5_2_00FFBA9C
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push 3DBA71DCh; mov dword ptr [esp], eax5_2_00FFBB21
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push 373E004Eh; mov dword ptr [esp], eax5_2_00FFBBE6
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push ebp; mov dword ptr [esp], 5BF766E1h5_2_00FFBBEA
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push 2C9C3690h; mov dword ptr [esp], eax5_2_00FFBC08
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push 561D9A97h; mov dword ptr [esp], edx5_2_00FFBC25
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push edx; mov dword ptr [esp], ecx5_2_00FFBC7E
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push eax; mov dword ptr [esp], 4EE91081h5_2_00FFBDDF
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push 41889419h; mov dword ptr [esp], ebp5_2_00FFBE94
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push eax; mov dword ptr [esp], ebp5_2_00FFBE98
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push eax; mov dword ptr [esp], edi5_2_00FFBF0C
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push edi; mov dword ptr [esp], edx5_2_00FFBF16
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push 0F3EBED4h; mov dword ptr [esp], ecx5_2_00FFBF39
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push 507E0D0Ch; mov dword ptr [esp], edx5_2_00FFBF66
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push esi; mov dword ptr [esp], 7F7596B2h5_2_00FFBF83
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push eax; mov dword ptr [esp], ebp5_2_00FFBFCA
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push ebx; mov dword ptr [esp], esi5_2_00FFC016
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push 4221547Eh; mov dword ptr [esp], edi5_2_00FFC05C
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push eax; mov dword ptr [esp], ecx5_2_00FFC0EA
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push ebx; mov dword ptr [esp], ecx5_2_00FFC139
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push esi; mov dword ptr [esp], ecx5_2_00FFC2E5
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push ebp; mov dword ptr [esp], edx5_2_00FFC2FE
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push ebx; mov dword ptr [esp], ebp5_2_00FFC3B4
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FFB884 push 429FBDB7h; mov dword ptr [esp], edx5_2_00FFC491
Source: file.exeStatic PE information: section name: entropy: 7.9830267729782625
Source: file.exeStatic PE information: section name: rujnmhpu entropy: 7.953499321906515

Boot Survival

barindex
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1010AF8 second address: 1010B03 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1010B03 second address: 1010B09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 101107C second address: 1011080 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 101475B second address: E8CA90 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xor dword ptr [esp], 08C8D0D8h 0x0000000e mov di, 9141h 0x00000012 push dword ptr [ebp+122D0D41h] 0x00000018 and edx, dword ptr [ebp+122D2D3Dh] 0x0000001e call dword ptr [ebp+122D1940h] 0x00000024 pushad 0x00000025 jmp 00007FBC40C70F2Dh 0x0000002a xor eax, eax 0x0000002c jmp 00007FBC40C70F30h 0x00000031 mov edx, dword ptr [esp+28h] 0x00000035 ja 00007FBC40C70F2Ch 0x0000003b sub dword ptr [ebp+122D2E1Ah], edx 0x00000041 mov dword ptr [ebp+122D2C9Ah], eax 0x00000047 mov dword ptr [ebp+122D2E1Ah], edx 0x0000004d mov esi, 0000003Ch 0x00000052 jnc 00007FBC40C70F42h 0x00000058 jne 00007FBC40C70F3Ch 0x0000005e add esi, dword ptr [esp+24h] 0x00000062 jmp 00007FBC40C70F2Ch 0x00000067 lodsw 0x00000069 je 00007FBC40C70F35h 0x0000006f jmp 00007FBC40C70F2Fh 0x00000074 add eax, dword ptr [esp+24h] 0x00000078 mov dword ptr [ebp+122D2E1Ah], eax 0x0000007e sub dword ptr [ebp+122D2E1Ah], ecx 0x00000084 mov ebx, dword ptr [esp+24h] 0x00000088 pushad 0x00000089 or cl, FFFFFFB9h 0x0000008c push ecx 0x0000008d pushad 0x0000008e popad 0x0000008f pop esi 0x00000090 popad 0x00000091 nop 0x00000092 push ebx 0x00000093 push eax 0x00000094 push edx 0x00000095 jmp 00007FBC40C70F2Ah 0x0000009a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1014858 second address: 1014901 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C6A892h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ecx 0x0000000a push eax 0x0000000b jmp 00007FBC40C6A88Ch 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 jnl 00007FBC40C6A88Ch 0x0000001a mov eax, dword ptr [eax] 0x0000001c push edi 0x0000001d pushad 0x0000001e jl 00007FBC40C6A886h 0x00000024 push ebx 0x00000025 pop ebx 0x00000026 popad 0x00000027 pop edi 0x00000028 mov dword ptr [esp+04h], eax 0x0000002c jmp 00007FBC40C6A893h 0x00000031 pop eax 0x00000032 pushad 0x00000033 mov edi, 03838363h 0x00000038 pushad 0x00000039 mov ch, F5h 0x0000003b xor edi, 7D40942Ah 0x00000041 popad 0x00000042 popad 0x00000043 lea ebx, dword ptr [ebp+1245B693h] 0x00000049 mov dx, 60C3h 0x0000004d jmp 00007FBC40C6A898h 0x00000052 xchg eax, ebx 0x00000053 pushad 0x00000054 push ecx 0x00000055 pushad 0x00000056 popad 0x00000057 pop ecx 0x00000058 push eax 0x00000059 push edx 0x0000005a jmp 00007FBC40C6A894h 0x0000005f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1014901 second address: 1014912 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FBC40C70F26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1014912 second address: 1014916 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1014A54 second address: 1014A68 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b push edi 0x0000000c jc 00007FBC40C70F2Ch 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1014A68 second address: 1014A7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 mov eax, dword ptr [eax] 0x00000007 js 00007FBC40C6A8A5h 0x0000000d push eax 0x0000000e push edx 0x0000000f jns 00007FBC40C6A886h 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1014A7D second address: 1014AD9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C70F33h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d push edx 0x0000000e jmp 00007FBC40C70F37h 0x00000013 pop edx 0x00000014 pop eax 0x00000015 or dword ptr [ebp+122D2E99h], ecx 0x0000001b lea ebx, dword ptr [ebp+1245B69Ch] 0x00000021 xor dword ptr [ebp+122D1992h], ebx 0x00000027 xchg eax, ebx 0x00000028 pushad 0x00000029 jmp 00007FBC40C70F2Bh 0x0000002e je 00007FBC40C70F2Ch 0x00000034 push eax 0x00000035 push edx 0x00000036 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1014B4D second address: 1014B9D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], eax 0x0000000a mov dword ptr [ebp+122D190Eh], edi 0x00000010 push 00000000h 0x00000012 sub dword ptr [ebp+122D2D28h], ecx 0x00000018 call 00007FBC40C6A889h 0x0000001d pushad 0x0000001e jmp 00007FBC40C6A895h 0x00000023 push edi 0x00000024 js 00007FBC40C6A886h 0x0000002a pop edi 0x0000002b popad 0x0000002c push eax 0x0000002d push edi 0x0000002e push ecx 0x0000002f pushad 0x00000030 popad 0x00000031 pop ecx 0x00000032 pop edi 0x00000033 mov eax, dword ptr [esp+04h] 0x00000037 push eax 0x00000038 push edx 0x00000039 push eax 0x0000003a push eax 0x0000003b push edx 0x0000003c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1014B9D second address: 1014BA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1014BA2 second address: 1014BCA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C6A898h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push eax 0x0000000c push edx 0x0000000d jc 00007FBC40C6A888h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1014BCA second address: 1014C7F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FBC40C70F36h 0x00000008 jng 00007FBC40C70F26h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 mov dword ptr [esp+04h], eax 0x00000015 push edi 0x00000016 jbe 00007FBC40C70F28h 0x0000001c pop edi 0x0000001d pop eax 0x0000001e push 00000000h 0x00000020 push ecx 0x00000021 call 00007FBC40C70F28h 0x00000026 pop ecx 0x00000027 mov dword ptr [esp+04h], ecx 0x0000002b add dword ptr [esp+04h], 00000019h 0x00000033 inc ecx 0x00000034 push ecx 0x00000035 ret 0x00000036 pop ecx 0x00000037 ret 0x00000038 push 00000003h 0x0000003a jmp 00007FBC40C70F38h 0x0000003f push 00000000h 0x00000041 mov edx, dword ptr [ebp+122D2C1Eh] 0x00000047 push 00000003h 0x00000049 push 00000000h 0x0000004b push edx 0x0000004c call 00007FBC40C70F28h 0x00000051 pop edx 0x00000052 mov dword ptr [esp+04h], edx 0x00000056 add dword ptr [esp+04h], 0000001Dh 0x0000005e inc edx 0x0000005f push edx 0x00000060 ret 0x00000061 pop edx 0x00000062 ret 0x00000063 mov dword ptr [ebp+122D1952h], esi 0x00000069 call 00007FBC40C70F29h 0x0000006e push eax 0x0000006f push edx 0x00000070 pushad 0x00000071 js 00007FBC40C70F26h 0x00000077 push eax 0x00000078 push edx 0x00000079 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1014C7F second address: 1014C84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1014C84 second address: 1014C89 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1014C89 second address: 1014C9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FBC40C6A88Ah 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1014C9D second address: 1014CDE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C70F2Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d push esi 0x0000000e pushad 0x0000000f jo 00007FBC40C70F26h 0x00000015 push ebx 0x00000016 pop ebx 0x00000017 popad 0x00000018 pop esi 0x00000019 mov eax, dword ptr [eax] 0x0000001b jmp 00007FBC40C70F37h 0x00000020 mov dword ptr [esp+04h], eax 0x00000024 push eax 0x00000025 push edx 0x00000026 push edx 0x00000027 push ecx 0x00000028 pop ecx 0x00000029 pop edx 0x0000002a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1014CDE second address: 1014D1A instructions: 0x00000000 rdtsc 0x00000002 je 00007FBC40C6A88Ch 0x00000008 jl 00007FBC40C6A886h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pop eax 0x00000011 jns 00007FBC40C6A889h 0x00000017 lea ebx, dword ptr [ebp+1245B6A7h] 0x0000001d sub dword ptr [ebp+122D2E0Dh], edx 0x00000023 xchg eax, ebx 0x00000024 jmp 00007FBC40C6A890h 0x00000029 push eax 0x0000002a pushad 0x0000002b pushad 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1005655 second address: 1005683 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push esi 0x00000006 jmp 00007FBC40C70F31h 0x0000000b pop esi 0x0000000c pushad 0x0000000d jmp 00007FBC40C70F2Bh 0x00000012 jno 00007FBC40C70F26h 0x00000018 push esi 0x00000019 pop esi 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1033C93 second address: 1033C98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 103427D second address: 103429A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C70F35h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 103429A second address: 103429E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1034528 second address: 1034530 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1034530 second address: 103455E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c je 00007FBC40C6A88Eh 0x00000012 jne 00007FBC40C6A886h 0x00000018 pushad 0x00000019 popad 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007FBC40C6A88Ch 0x00000021 jno 00007FBC40C6A886h 0x00000027 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 103455E second address: 1034562 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1034562 second address: 103456E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FBC40C6A886h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1034BC1 second address: 1034BC7 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1029EC3 second address: 1029EDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FBC40C6A886h 0x0000000a popad 0x0000000b jng 00007FBC40C6A88Ch 0x00000011 jg 00007FBC40C6A886h 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1029EDA second address: 1029EE6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007FBC40C70F26h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1034E52 second address: 1034E5C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10355A8 second address: 10355AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1035878 second address: 1035896 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 pushad 0x00000006 popad 0x00000007 jmp 00007FBC40C6A88Ch 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 jg 00007FBC40C6A886h 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1035896 second address: 10358BD instructions: 0x00000000 rdtsc 0x00000002 jg 00007FBC40C70F26h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f jmp 00007FBC40C70F35h 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1037382 second address: 103738D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 103738D second address: 1037393 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1042B07 second address: 1042B0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF9955 second address: FF9959 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1042390 second address: 1042399 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push edi 0x00000008 pop edi 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1042684 second address: 10426A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBC40C70F2Ah 0x00000009 pushad 0x0000000a jmp 00007FBC40C70F34h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10426A9 second address: 10426B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1042850 second address: 104285B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104285B second address: 104285F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104285F second address: 1042872 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C70F2Fh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1042872 second address: 104287B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1044B32 second address: 1044B3C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007FBC40C70F26h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1044DDD second address: 1044E10 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C6A896h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b jnl 00007FBC40C6A893h 0x00000011 jmp 00007FBC40C6A88Dh 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1044E10 second address: 1044E14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1044E14 second address: 1044E18 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1044EB3 second address: 1044ECD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBC40C70F35h 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10450B2 second address: 10450B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10450B8 second address: 10450BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1045161 second address: 1045166 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1045650 second address: 1045691 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FBC40C70F28h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jc 00007FBC40C70F30h 0x00000011 pushad 0x00000012 push edi 0x00000013 pop edi 0x00000014 jns 00007FBC40C70F26h 0x0000001a popad 0x0000001b xchg eax, ebx 0x0000001c jg 00007FBC40C70F2Ch 0x00000022 nop 0x00000023 push eax 0x00000024 push edx 0x00000025 jnp 00007FBC40C70F34h 0x0000002b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104570B second address: 104570F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104570F second address: 1045727 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FBC40C70F2Eh 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1046B70 second address: 1046B90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FBC40C6A896h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1046B90 second address: 1046B9A instructions: 0x00000000 rdtsc 0x00000002 jno 00007FBC40C70F26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1046B9A second address: 1046C25 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C6A88Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push esi 0x0000000d call 00007FBC40C6A888h 0x00000012 pop esi 0x00000013 mov dword ptr [esp+04h], esi 0x00000017 add dword ptr [esp+04h], 0000001Ch 0x0000001f inc esi 0x00000020 push esi 0x00000021 ret 0x00000022 pop esi 0x00000023 ret 0x00000024 jc 00007FBC40C6A88Ch 0x0000002a add dword ptr [ebp+122D1985h], edi 0x00000030 and esi, 7FC2B26Ch 0x00000036 push 00000000h 0x00000038 jmp 00007FBC40C6A88Fh 0x0000003d push 00000000h 0x0000003f xchg eax, ebx 0x00000040 push ecx 0x00000041 jmp 00007FBC40C6A897h 0x00000046 pop ecx 0x00000047 push eax 0x00000048 push eax 0x00000049 push eax 0x0000004a push edx 0x0000004b jmp 00007FBC40C6A895h 0x00000050 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1047C92 second address: 1047C99 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104845D second address: 1048467 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007FBC40C6A886h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1048467 second address: 1048479 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FBC40C70F26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edi 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104A62A second address: 104A62F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104A62F second address: 104A645 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FBC40C70F28h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jg 00007FBC40C70F26h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104B171 second address: 104B1E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 mov dword ptr [esp], eax 0x00000008 jmp 00007FBC40C6A897h 0x0000000d push 00000000h 0x0000000f push 00000000h 0x00000011 push eax 0x00000012 call 00007FBC40C6A888h 0x00000017 pop eax 0x00000018 mov dword ptr [esp+04h], eax 0x0000001c add dword ptr [esp+04h], 00000018h 0x00000024 inc eax 0x00000025 push eax 0x00000026 ret 0x00000027 pop eax 0x00000028 ret 0x00000029 mov edi, dword ptr [ebp+122D1B70h] 0x0000002f push 00000000h 0x00000031 push 00000000h 0x00000033 push edx 0x00000034 call 00007FBC40C6A888h 0x00000039 pop edx 0x0000003a mov dword ptr [esp+04h], edx 0x0000003e add dword ptr [esp+04h], 00000014h 0x00000046 inc edx 0x00000047 push edx 0x00000048 ret 0x00000049 pop edx 0x0000004a ret 0x0000004b xchg eax, ebx 0x0000004c push eax 0x0000004d push edx 0x0000004e jp 00007FBC40C6A888h 0x00000054 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104B1E1 second address: 104B1E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104B1E7 second address: 104B1EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104CF27 second address: 104CF56 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jno 00007FBC40C70F3Bh 0x0000000e popad 0x0000000f jbe 00007FBC40C70F5Dh 0x00000015 pushad 0x00000016 push eax 0x00000017 pop eax 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104F641 second address: 104F647 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1050855 second address: 1050859 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104F647 second address: 104F64B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1050859 second address: 105085F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104F64B second address: 104F64F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104F64F second address: 104F661 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jbe 00007FBC40C70F2Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104F732 second address: 104F737 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104F737 second address: 104F73C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10562E1 second address: 10562EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007FBC40C6A886h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 105647C second address: 1056481 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 105A3CD second address: 105A3D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1057559 second address: 105756E instructions: 0x00000000 rdtsc 0x00000002 jng 00007FBC40C70F2Ch 0x00000008 js 00007FBC40C70F26h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 pushad 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 105A4CD second address: 105A4D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 105C3CB second address: 105C3D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 105A4D2 second address: 105A4ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBC40C6A897h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 105C3D0 second address: 105C3D6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 105A4ED second address: 105A581 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b mov bx, 4028h 0x0000000f push dword ptr fs:[00000000h] 0x00000016 jo 00007FBC40C6A888h 0x0000001c mov ebx, ecx 0x0000001e mov dword ptr fs:[00000000h], esp 0x00000025 push 00000000h 0x00000027 push edx 0x00000028 call 00007FBC40C6A888h 0x0000002d pop edx 0x0000002e mov dword ptr [esp+04h], edx 0x00000032 add dword ptr [esp+04h], 00000017h 0x0000003a inc edx 0x0000003b push edx 0x0000003c ret 0x0000003d pop edx 0x0000003e ret 0x0000003f add dword ptr [ebp+122D2E7Eh], ecx 0x00000045 mov eax, dword ptr [ebp+122D06B1h] 0x0000004b push edi 0x0000004c pop edi 0x0000004d mov dword ptr [ebp+122D197Ah], eax 0x00000053 push FFFFFFFFh 0x00000055 push 00000000h 0x00000057 push ebp 0x00000058 call 00007FBC40C6A888h 0x0000005d pop ebp 0x0000005e mov dword ptr [esp+04h], ebp 0x00000062 add dword ptr [esp+04h], 0000001Ah 0x0000006a inc ebp 0x0000006b push ebp 0x0000006c ret 0x0000006d pop ebp 0x0000006e ret 0x0000006f push eax 0x00000070 push eax 0x00000071 push edx 0x00000072 jmp 00007FBC40C6A895h 0x00000077 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 105C3D6 second address: 105C3DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 105A581 second address: 105A591 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBC40C6A88Ch 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 105E9E8 second address: 105E9EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 105E9EC second address: 105E9FA instructions: 0x00000000 rdtsc 0x00000002 jp 00007FBC40C6A886h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 105FAC9 second address: 105FB1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 push edi 0x00000008 pushad 0x00000009 popad 0x0000000a pop edi 0x0000000b popad 0x0000000c mov dword ptr [esp], eax 0x0000000f push 00000000h 0x00000011 push ebp 0x00000012 call 00007FBC40C70F28h 0x00000017 pop ebp 0x00000018 mov dword ptr [esp+04h], ebp 0x0000001c add dword ptr [esp+04h], 0000001Dh 0x00000024 inc ebp 0x00000025 push ebp 0x00000026 ret 0x00000027 pop ebp 0x00000028 ret 0x00000029 push 00000000h 0x0000002b mov di, ax 0x0000002e push 00000000h 0x00000030 mov ebx, dword ptr [ebp+122D2BB6h] 0x00000036 xor ebx, dword ptr [ebp+122D2D1Eh] 0x0000003c push eax 0x0000003d push eax 0x0000003e push eax 0x0000003f push edx 0x00000040 jg 00007FBC40C70F26h 0x00000046 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1063793 second address: 10637A7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 popad 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10637A7 second address: 10637AC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 100A8FE second address: 100A905 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 100A905 second address: 100A90F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007FBC40C70F26h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 100A90F second address: 100A921 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push edi 0x0000000f pop edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 100A921 second address: 100A925 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 100A925 second address: 100A92F instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FBC40C6A886h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 100A92F second address: 100A93F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007FBC40C70F26h 0x0000000a jl 00007FBC40C70F26h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 100A93F second address: 100A949 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FBC40C6A886h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 100A949 second address: 100A954 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push esi 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 106649F second address: 10664E0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C6A88Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FBC40C6A893h 0x0000000e pop edi 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FBC40C6A88Ch 0x00000016 jmp 00007FBC40C6A891h 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10684D0 second address: 10684ED instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C70F2Dh 0x00000007 jc 00007FBC40C70F26h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop ecx 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 106F94F second address: 106F961 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FBC40C6A888h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 106F961 second address: 106F96E instructions: 0x00000000 rdtsc 0x00000002 jo 00007FBC40C70F26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 106F96E second address: 106F990 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FBC40C6A886h 0x0000000a popad 0x0000000b popad 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 push edi 0x00000011 jnp 00007FBC40C6A888h 0x00000017 pushad 0x00000018 popad 0x00000019 pop edi 0x0000001a mov eax, dword ptr [eax] 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 106F990 second address: 106F994 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 106F994 second address: 106F998 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 106F998 second address: 106F99E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 106F99E second address: 106F9A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 106FA45 second address: 106FAA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FBC40C70F3Dh 0x0000000a jmp 00007FBC40C70F37h 0x0000000f popad 0x00000010 push eax 0x00000011 jmp 00007FBC40C70F38h 0x00000016 mov eax, dword ptr [esp+04h] 0x0000001a jmp 00007FBC40C70F33h 0x0000001f mov eax, dword ptr [eax] 0x00000021 pushad 0x00000022 pushad 0x00000023 pushad 0x00000024 popad 0x00000025 pushad 0x00000026 popad 0x00000027 popad 0x00000028 pushad 0x00000029 push eax 0x0000002a push edx 0x0000002b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1074993 second address: 107499E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007FBC40C6A886h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 107499E second address: 10749A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1073B98 second address: 1073B9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1073B9C second address: 1073BA2 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1073BA2 second address: 1073BB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jg 00007FBC40C6A88Eh 0x0000000e jns 00007FBC40C6A886h 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1074053 second address: 1074074 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C70F39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c pop eax 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1074074 second address: 107407E instructions: 0x00000000 rdtsc 0x00000002 jo 00007FBC40C6A886h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 107407E second address: 1074083 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1074083 second address: 1074089 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 107435B second address: 107435F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10744C6 second address: 10744D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FBC40C6A886h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10744D0 second address: 1074510 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C70F35h 0x00000007 jmp 00007FBC40C70F2Fh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e je 00007FBC40C70F2Ch 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FBC40C70F2Ah 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1074510 second address: 1074514 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1074657 second address: 1074661 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10747C8 second address: 10747CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10747CC second address: 10747D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10747D2 second address: 10747D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10747D8 second address: 10747FC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007FBC40C70F2Ch 0x00000008 jng 00007FBC40C70F26h 0x0000000e pop edi 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FBC40C70F2Ch 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 107CF1E second address: 107CF27 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 107CF27 second address: 107CF2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 107BAEF second address: 107BB36 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FBC40C6A893h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push ebx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e pop ebx 0x0000000f pushad 0x00000010 jmp 00007FBC40C6A890h 0x00000015 pushad 0x00000016 popad 0x00000017 popad 0x00000018 pushad 0x00000019 jmp 00007FBC40C6A892h 0x0000001e push ebx 0x0000001f pop ebx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 107BCA4 second address: 107BCB4 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jl 00007FBC40C70F2Eh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 107BE29 second address: 107BE3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 ja 00007FBC40C6A886h 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 107C5AB second address: 107C5B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 107CBC5 second address: 107CBCB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 107CBCB second address: 107CBD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 107CBD1 second address: 107CBE9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C6A893h 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 107CBE9 second address: 107CBEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 107CBEF second address: 107CC0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FBC40C6A886h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e jns 00007FBC40C6A88Ah 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 107CC0D second address: 107CC1C instructions: 0x00000000 rdtsc 0x00000002 jng 00007FBC40C70F26h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 107CC1C second address: 107CC25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 push edx 0x00000008 pop edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10824B5 second address: 10824B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10824B9 second address: 10824C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1081319 second address: 108133A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FBC40C70F38h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 108133A second address: 1081354 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FBC40C6A886h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FBC40C6A890h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1043944 second address: 1043949 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1043949 second address: 104398A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FBC40C6A88Ch 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jnl 00007FBC40C6A890h 0x00000012 mov eax, dword ptr [esp+04h] 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FBC40C6A897h 0x0000001e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104398A second address: 1043995 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1043995 second address: 10439A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov eax, dword ptr [eax] 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10439A2 second address: 10439B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBC40C70F2Ch 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10439B3 second address: 10439E8 instructions: 0x00000000 rdtsc 0x00000002 je 00007FBC40C6A888h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp+04h], eax 0x00000010 jmp 00007FBC40C6A893h 0x00000015 pop eax 0x00000016 mov edx, dword ptr [ebp+122D37FBh] 0x0000001c push 1D5C9C9Dh 0x00000021 push eax 0x00000022 push edx 0x00000023 push ecx 0x00000024 pushad 0x00000025 popad 0x00000026 pop ecx 0x00000027 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10439E8 second address: 10439EE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10439EE second address: 10439F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1043B77 second address: 1043B7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1043C1E second address: 1043C23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1043E3F second address: 1043E43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1043E43 second address: 1043E47 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1043E47 second address: 1043E58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jc 00007FBC40C70F28h 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1043E58 second address: 1043E5E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104441C second address: 104445C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 jmp 00007FBC40C70F32h 0x0000000c popad 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 push edx 0x00000012 jo 00007FBC40C70F2Ch 0x00000018 je 00007FBC40C70F26h 0x0000001e pop edx 0x0000001f mov eax, dword ptr [eax] 0x00000021 push ecx 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007FBC40C70F2Fh 0x00000029 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104445C second address: 1044460 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1044460 second address: 1044489 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jmp 00007FBC40C70F39h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1044489 second address: 104448E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104448E second address: 1044494 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1044494 second address: 1044498 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1044561 second address: 104456E instructions: 0x00000000 rdtsc 0x00000002 jg 00007FBC40C70F26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 104456E second address: 10445E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 popad 0x00000008 push eax 0x00000009 jne 00007FBC40C6A89Bh 0x0000000f nop 0x00000010 call 00007FBC40C6A88Ah 0x00000015 mov edi, dword ptr [ebp+122D2BA6h] 0x0000001b pop edi 0x0000001c lea eax, dword ptr [ebp+1248A06Bh] 0x00000022 push 00000000h 0x00000024 push ecx 0x00000025 call 00007FBC40C6A888h 0x0000002a pop ecx 0x0000002b mov dword ptr [esp+04h], ecx 0x0000002f add dword ptr [esp+04h], 0000001Ah 0x00000037 inc ecx 0x00000038 push ecx 0x00000039 ret 0x0000003a pop ecx 0x0000003b ret 0x0000003c and ecx, 77B2DB45h 0x00000042 nop 0x00000043 jo 00007FBC40C6A89Ch 0x00000049 push eax 0x0000004a push edx 0x0000004b jmp 00007FBC40C6A88Ah 0x00000050 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10445E5 second address: 10445E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10445E9 second address: 102AA2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push ecx 0x00000008 push ecx 0x00000009 jmp 00007FBC40C6A899h 0x0000000e pop ecx 0x0000000f pop ecx 0x00000010 nop 0x00000011 push 00000000h 0x00000013 push ecx 0x00000014 call 00007FBC40C6A888h 0x00000019 pop ecx 0x0000001a mov dword ptr [esp+04h], ecx 0x0000001e add dword ptr [esp+04h], 00000018h 0x00000026 inc ecx 0x00000027 push ecx 0x00000028 ret 0x00000029 pop ecx 0x0000002a ret 0x0000002b lea eax, dword ptr [ebp+1248A027h] 0x00000031 movzx edx, dx 0x00000034 nop 0x00000035 jmp 00007FBC40C6A897h 0x0000003a push eax 0x0000003b jc 00007FBC40C6A89Ah 0x00000041 jne 00007FBC40C6A894h 0x00000047 nop 0x00000048 jmp 00007FBC40C6A898h 0x0000004d call dword ptr [ebp+122D3718h] 0x00000053 jo 00007FBC40C6A8B1h 0x00000059 js 00007FBC40C6A89Fh 0x0000005f jmp 00007FBC40C6A893h 0x00000064 jno 00007FBC40C6A886h 0x0000006a pushad 0x0000006b jno 00007FBC40C6A886h 0x00000071 push edi 0x00000072 pop edi 0x00000073 pushad 0x00000074 popad 0x00000075 popad 0x00000076 push eax 0x00000077 push edx 0x00000078 push eax 0x00000079 push edx 0x0000007a jno 00007FBC40C6A886h 0x00000080 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 102AA2D second address: 102AA52 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FBC40C70F26h 0x00000008 jmp 00007FBC40C70F2Dh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jne 00007FBC40C70F2Eh 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10816C9 second address: 10816CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1081E1B second address: 1081E23 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1081E23 second address: 1081E2A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10820F1 second address: 10820F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10820F5 second address: 10820F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10820F9 second address: 1082102 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 108B3D6 second address: 108B3DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 108A0DD second address: 108A0EA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 js 00007FBC40C70F26h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 108A0EA second address: 108A0F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jng 00007FBC40C6A886h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 108A0F7 second address: 108A0FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 108A752 second address: 108A758 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 108A758 second address: 108A76E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jmp 00007FBC40C70F2Fh 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 108A76E second address: 108A77C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 108A77C second address: 108A78E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jl 00007FBC40C70F28h 0x0000000c push eax 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 pop eax 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 108AA31 second address: 108AA35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 108AA35 second address: 108AA39 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 108AA39 second address: 108AA6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jnp 00007FBC40C6A886h 0x0000000d pop ebx 0x0000000e push ecx 0x0000000f jmp 00007FBC40C6A88Ah 0x00000014 push esi 0x00000015 pop esi 0x00000016 pop ecx 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FBC40C6A895h 0x0000001e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 108F132 second address: 108F148 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jng 00007FBC40C70F31h 0x0000000b jmp 00007FBC40C70F2Bh 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1003B8A second address: 1003B90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10915FB second address: 10915FF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10978CE second address: 10978D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FBC40C6A886h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1097BA2 second address: 1097BA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1097CEA second address: 1097D20 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jne 00007FBC40C6A897h 0x00000010 jmp 00007FBC40C6A891h 0x00000015 jmp 00007FBC40C6A895h 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1097D20 second address: 1097D28 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1097D28 second address: 1097D3C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jl 00007FBC40C6A886h 0x0000000e jno 00007FBC40C6A886h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1097D3C second address: 1097D40 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1097E6F second address: 1097E8C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jl 00007FBC40C6A886h 0x00000009 push edi 0x0000000a pop edi 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push ecx 0x00000015 jl 00007FBC40C6A886h 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1097E8C second address: 1097E96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1097E96 second address: 1097E9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1098008 second address: 109800D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 109800D second address: 109802D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FBC40C6A894h 0x00000008 pop ecx 0x00000009 jnp 00007FBC40C6A88Eh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 109817C second address: 109818A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jne 00007FBC40C70F26h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 109C2D7 second address: 109C2DD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 109C2DD second address: 109C2E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 109C2E6 second address: 109C2EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 109F3B5 second address: 109F3CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FBC40C70F2Bh 0x0000000d push edi 0x0000000e pop edi 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 109F3CA second address: 109F3E2 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edi 0x00000009 js 00007FBC40C6A8B4h 0x0000000f pushad 0x00000010 jo 00007FBC40C6A886h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 109F710 second address: 109F714 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 109FA39 second address: 109FA64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FBC40C6A88Ch 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FBC40C6A890h 0x00000013 jnc 00007FBC40C6A886h 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10A5544 second address: 10A554B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10A56CE second address: 10A56D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10A56D6 second address: 10A56DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10A56DB second address: 10A5705 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FBC40C6A8A4h 0x00000008 jmp 00007FBC40C6A894h 0x0000000d jmp 00007FBC40C6A88Ah 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10A5705 second address: 10A5720 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBC40C70F37h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10A6561 second address: 10A6565 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10A6565 second address: 10A658F instructions: 0x00000000 rdtsc 0x00000002 jc 00007FBC40C70F26h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jns 00007FBC40C70F2Ch 0x00000012 pushad 0x00000013 pushad 0x00000014 popad 0x00000015 jmp 00007FBC40C70F2Dh 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10A6E7C second address: 10A6E84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10A6E84 second address: 10A6E8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10A713B second address: 10A714E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jp 00007FBC40C6A886h 0x0000000b jp 00007FBC40C6A886h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10AFB60 second address: 10AFBA9 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FBC40C70F26h 0x00000008 jmp 00007FBC40C70F2Fh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jnp 00007FBC40C70F2Eh 0x00000015 pop eax 0x00000016 push ecx 0x00000017 pushad 0x00000018 jmp 00007FBC40C70F2Bh 0x0000001d jmp 00007FBC40C70F32h 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10AFD0A second address: 10AFD14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10AFD14 second address: 10AFD7D instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FBC40C70F26h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jmp 00007FBC40C70F2Fh 0x00000012 jmp 00007FBC40C70F39h 0x00000017 pop eax 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007FBC40C70F38h 0x00000020 jmp 00007FBC40C70F38h 0x00000025 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10AFEEE second address: 10AFEF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B01A0 second address: 10B01B6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 popad 0x00000009 push edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jno 00007FBC40C70F26h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B01B6 second address: 10B01BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B0316 second address: 10B031F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B031F second address: 10B0325 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B0325 second address: 10B0329 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B0633 second address: 10B0647 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FBC40C6A886h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jg 00007FBC40C6A886h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B8713 second address: 10B8721 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B689C second address: 10B68A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B68A1 second address: 10B68A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B68A7 second address: 10B68AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B6E02 second address: 10B6E2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FBC40C70F45h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B70DE second address: 10B70EB instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FBC40C6A886h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B70EB second address: 10B70F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B70F0 second address: 10B7106 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C6A88Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B72A0 second address: 10B72E1 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FBC40C70F26h 0x00000008 jng 00007FBC40C70F26h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push edx 0x00000011 jmp 00007FBC40C70F34h 0x00000016 jno 00007FBC40C70F26h 0x0000001c pop edx 0x0000001d popad 0x0000001e jg 00007FBC40C70F5Ch 0x00000024 push eax 0x00000025 push edx 0x00000026 ja 00007FBC40C70F26h 0x0000002c jc 00007FBC40C70F26h 0x00000032 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B747B second address: 10B747F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B747F second address: 10B7485 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B7485 second address: 10B7494 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jnc 00007FBC40C6A886h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B7494 second address: 10B74A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 js 00007FBC40C70F32h 0x0000000c jng 00007FBC40C70F2Ch 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B7601 second address: 10B7605 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B7759 second address: 10B775D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B775D second address: 10B7771 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jl 00007FBC40C6A886h 0x0000000e ja 00007FBC40C6A886h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B6414 second address: 10B6418 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10BFC82 second address: 10BFCB5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C6A88Ah 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007FBC40C6A88Eh 0x00000010 push eax 0x00000011 push edx 0x00000012 jnl 00007FBC40C6A886h 0x00000018 jmp 00007FBC40C6A88Dh 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10BF823 second address: 10BF83F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C70F38h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10CB12A second address: 10CB131 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10CB131 second address: 10CB15C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C70F37h 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FBC40C70F30h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF7E0F second address: FF7E15 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FF7E15 second address: FF7E19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10D6037 second address: 10D606A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 push eax 0x00000007 pop eax 0x00000008 pushad 0x00000009 popad 0x0000000a jl 00007FBC40C6A886h 0x00000010 popad 0x00000011 popad 0x00000012 pushad 0x00000013 jo 00007FBC40C6A89Ch 0x00000019 jmp 00007FBC40C6A890h 0x0000001e jbe 00007FBC40C6A886h 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10D606A second address: 10D6070 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10D6070 second address: 10D6074 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10DDD1B second address: 10DDD26 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10DDBAF second address: 10DDBB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10DDBB3 second address: 10DDBBC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10DFF8D second address: 10DFF91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10E78AC second address: 10E78BB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C70F2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10E67F3 second address: 10E67F9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10E75E7 second address: 10E760A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBC40C70F39h 0x00000009 pop ebx 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10EC158 second address: 10EC15E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10EC15E second address: 10EC16F instructions: 0x00000000 rdtsc 0x00000002 jng 00007FBC40C70F26h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10EC16F second address: 10EC17F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBC40C6A88Bh 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FFCFD0 second address: FFCFD5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FFCFD5 second address: FFD00A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBC40C6A899h 0x00000009 jmp 00007FBC40C6A898h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10EBD56 second address: 10EBD84 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FBC40C70F2Ah 0x00000008 pushad 0x00000009 popad 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c pop edx 0x0000000d pop eax 0x0000000e je 00007FBC40C70F52h 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FBC40C70F38h 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10EBD84 second address: 10EBD88 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10EBD88 second address: 10EBD91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10FC1C9 second address: 10FC1E5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C6A88Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a jbe 00007FBC40C6A890h 0x00000010 push eax 0x00000011 push edx 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10FA5AE second address: 10FA5BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 push eax 0x00000006 pop eax 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop ecx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10FA5BB second address: 10FA5C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1109D95 second address: 1109DAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jnl 00007FBC40C70F32h 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 110D2E3 second address: 110D2EA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 110D2EA second address: 110D30B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 jmp 00007FBC40C70F33h 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 110D30B second address: 110D30F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1124226 second address: 1124245 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FBC40C70F26h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FBC40C70F2Fh 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1123556 second address: 11235A6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C6A899h 0x00000007 jmp 00007FBC40C6A896h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jg 00007FBC40C6A89Bh 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11235A6 second address: 11235AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1123B8F second address: 1123BAD instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FBC40C6A886h 0x00000008 jbe 00007FBC40C6A886h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jno 00007FBC40C6A886h 0x00000018 jo 00007FBC40C6A886h 0x0000001e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1123D09 second address: 1123D14 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pushad 0x00000007 push eax 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1123D14 second address: 1123D52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBC40C6A894h 0x00000009 push esi 0x0000000a pop esi 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FBC40C6A88Fh 0x00000015 pushad 0x00000016 jmp 00007FBC40C6A88Ah 0x0000001b pushad 0x0000001c popad 0x0000001d push ecx 0x0000001e pop ecx 0x0000001f popad 0x00000020 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1123ED1 second address: 1123F0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edi 0x00000007 push edi 0x00000008 pushad 0x00000009 popad 0x0000000a jng 00007FBC40C70F26h 0x00000010 pop edi 0x00000011 jmp 00007FBC40C70F36h 0x00000016 popad 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FBC40C70F30h 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1123F0C second address: 1123F1F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBC40C6A88Fh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1123F1F second address: 1123F3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FBC40C70F33h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1123F3B second address: 1123F41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1123F41 second address: 1123F60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 jmp 00007FBC40C70F33h 0x0000000d popad 0x0000000e push ecx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 112599D second address: 1125A10 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jmp 00007FBC40C6A898h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b je 00007FBC40C6A8A1h 0x00000011 push edi 0x00000012 pop edi 0x00000013 jmp 00007FBC40C6A899h 0x00000018 pushad 0x00000019 jmp 00007FBC40C6A892h 0x0000001e pushad 0x0000001f popad 0x00000020 push ebx 0x00000021 pop ebx 0x00000022 popad 0x00000023 popad 0x00000024 push ecx 0x00000025 ja 00007FBC40C6A896h 0x0000002b push eax 0x0000002c push edx 0x0000002d push eax 0x0000002e push edx 0x0000002f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1125A10 second address: 1125A14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1128577 second address: 112857C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 112863B second address: 112863F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 112863F second address: 11286FC instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push ebp 0x0000000c call 00007FBC40C6A888h 0x00000011 pop ebp 0x00000012 mov dword ptr [esp+04h], ebp 0x00000016 add dword ptr [esp+04h], 0000001Ah 0x0000001e inc ebp 0x0000001f push ebp 0x00000020 ret 0x00000021 pop ebp 0x00000022 ret 0x00000023 je 00007FBC40C6A888h 0x00000029 mov edx, ecx 0x0000002b push 00000004h 0x0000002d add dh, FFFFFFC1h 0x00000030 call 00007FBC40C6A889h 0x00000035 jmp 00007FBC40C6A894h 0x0000003a push eax 0x0000003b jmp 00007FBC40C6A88Ch 0x00000040 mov eax, dword ptr [esp+04h] 0x00000044 pushad 0x00000045 jmp 00007FBC40C6A88Eh 0x0000004a jmp 00007FBC40C6A890h 0x0000004f popad 0x00000050 mov eax, dword ptr [eax] 0x00000052 jmp 00007FBC40C6A892h 0x00000057 mov dword ptr [esp+04h], eax 0x0000005b pushad 0x0000005c jmp 00007FBC40C6A896h 0x00000061 jc 00007FBC40C6A88Ch 0x00000067 push eax 0x00000068 push edx 0x00000069 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 112B837 second address: 112B88A instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FBC40C70F26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a ja 00007FBC40C70F2Eh 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 jp 00007FBC40C70F3Ch 0x00000019 jl 00007FBC40C70F3Ch 0x0000001f jmp 00007FBC40C70F36h 0x00000024 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 112B88A second address: 112B890 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 112B890 second address: 112B894 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 112B3D5 second address: 112B3DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 112B3DB second address: 112B3E6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: E8CAE6 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 10637FB instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 1043453 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 10C57F9 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 2868Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 5884Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
Source: file.exe, file.exe, 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
Source: file.exe, 00000005.00000002.1346187098.00000000016FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBn<
Source: file.exe, 00000005.00000002.1346187098.00000000016FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: file.exe, 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
Source: file.exe, 00000005.00000002.1346187098.00000000016B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: regmonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: gbdyllo
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: procmon_window_class
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: ollydbg
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: filemonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeFile opened: NTICE
Source: C:\Users\user\Desktop\file.exeFile opened: SICE
Source: C:\Users\user\Desktop\file.exeFile opened: SIWVID
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E6DF70 LdrInitializeThunk,5_2_00E6DF70
Source: file.exe, file.exe, 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpBinary or memory string: sProgram Manager
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
DLL Side-Loading
1
Process Injection
24
Virtualization/Sandbox Evasion
OS Credential Dumping631
Security Software Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory24
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
Obfuscated Files or Information
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive13
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
Software Packing
NTDS223
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe50%VirustotalBrowse
file.exe100%AviraTR/Crypt.TPM.Gen
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://frogs-severz.sbs/w100%Avira URL Cloudmalware
https://frogs-severz.sbs/api100%Avira URL Cloudmalware
https://frogs-severz.sbs/apin100%Avira URL Cloudmalware
http://crl.microsoftb0%Avira URL Cloudsafe
https://frogs-severz.sbs/100%Avira URL Cloudmalware
https://frogs-severz.sbs/2%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
frogs-severz.sbs
104.21.88.250
truefalse
    high
    property-imper.sbs
    unknown
    unknownfalse
      high
      NameMaliciousAntivirus DetectionReputation
      https://frogs-severz.sbs/apitrue
      • Avira URL Cloud: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://frogs-severz.sbs/wfile.exe, 00000005.00000003.1345252759.000000000174A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000005.00000002.1346505388.000000000174A000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      https://frogs-severz.sbs/apinfile.exe, 00000005.00000002.1346187098.00000000016E6000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      https://frogs-severz.sbs/file.exe, 00000005.00000003.1345252759.000000000174A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000005.00000002.1346505388.000000000174A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000005.00000002.1346187098.00000000016FA000.00000004.00000020.00020000.00000000.sdmpfalse
      • 2%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://crl.microsoftbfile.exe, 00000005.00000003.1345252759.000000000173F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000005.00000002.1346505388.0000000001742000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      104.21.88.250
      frogs-severz.sbsUnited States
      13335CLOUDFLARENETUSfalse
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1562030
      Start date and time:2024-11-25 05:45:14 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 45s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:12
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:file.exe
      Detection:MAL
      Classification:mal100.evad.winEXE@1/0@2/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:Failed
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      TimeTypeDescription
      23:46:19API Interceptor3x Sleep call for process: file.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      104.21.88.250injector V2.5.exeGet hashmaliciousLummaC StealerBrowse
        SystemCoreHelper.dllGet hashmaliciousLummaC StealerBrowse
          b.exeGet hashmaliciousLummaC StealerBrowse
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            frogs-severz.sbsAquantia_Installer.exeGet hashmaliciousLummaC StealerBrowse
            • 172.67.155.47
            arcaneloader.exeGet hashmaliciousLummaC StealerBrowse
            • 172.67.155.47
            xLauncher.exeGet hashmaliciousLummaC StealerBrowse
            • 172.67.155.47
            injector V2.5.exeGet hashmaliciousLummaC StealerBrowse
            • 104.21.88.250
            SystemCoreHelper.dllGet hashmaliciousLummaC StealerBrowse
            • 104.21.88.250
            b.exeGet hashmaliciousLummaC StealerBrowse
            • 104.21.88.250
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 193.143.1.19
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            CLOUDFLARENETUShttps://glorydaysaheadnnowx.us:443/verify/?verify'Get hashmaliciousUnknownBrowse
            • 172.67.196.133
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 172.67.162.84
            file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, VidarBrowse
            • 172.67.162.84
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 172.67.162.84
            New shipment AWB NO - 09804480383.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
            • 172.67.177.134
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 104.21.33.116
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 172.67.162.84
            FGQ-667893.pdfGet hashmaliciousUnknownBrowse
            • 104.18.95.41
            file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
            • 172.64.41.3
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 172.67.162.84
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaC StealerBrowse
            • 104.21.88.250
            file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, VidarBrowse
            • 104.21.88.250
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 104.21.88.250
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 104.21.88.250
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 104.21.88.250
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 104.21.88.250
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 104.21.88.250
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 104.21.88.250
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 104.21.88.250
            file.exeGet hashmaliciousUnknownBrowse
            • 104.21.88.250
            No context
            No created / dropped files found
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):7.948243247939989
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:file.exe
            File size:1'879'040 bytes
            MD5:8453f1d8df8f15f1bbc160bd225b7df3
            SHA1:4b62adaf743ed29ba865c424d24f73259fd08d5f
            SHA256:52eada2c59ecea03387a3b6fa6a1e557cd5f32ebfc4f478c2e6800f56e25eef0
            SHA512:487adc7f8578d58b453316c468e8bb259c03f94fbdf069abf5bc26876db04e205bc22d9e66d955586bc9714aec84f6ec644499ad28d9029bdd41d044e8d64281
            SSDEEP:24576:rvB1VD6ieihvrjLBxN3kfh9kaYb59f9RD4RuaLTbcIFXjVYhqEnswk9TG8C0+bZA:DzN69iPX0piDD4R3LcU5YP89TGN5U0
            TLSH:5B9533C5FE135A09E0892FF56FE76BB31200755724BAA084D9ED45F302BAF7E5249E08
            File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...Q<?g..............................J...........@...........................J.....6.....@.................................\...p..
            Icon Hash:00928e8e8686b000
            Entrypoint:0x8a9000
            Entrypoint Section:.taggant
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
            Time Stamp:0x673F3C51 [Thu Nov 21 13:57:37 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:6
            OS Version Minor:0
            File Version Major:6
            File Version Minor:0
            Subsystem Version Major:6
            Subsystem Version Minor:0
            Import Hash:2eabe9054cad5152567f0699947a2c5b
            Instruction
            jmp 00007FBC4121BAAAh
            jp 00007FBC4121BAC2h
            add byte ptr [eax], al
            jmp 00007FBC4121DAA5h
            add byte ptr [ecx], al
            or al, byte ptr [eax]
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], dh
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add bh, bh
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x5805c0x70.idata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x570000x2b0.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x581f80x8.idata
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            0x10000x560000x26200810508f668a379934483f9bc06802656False0.9992443647540984data7.9830267729782625IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x570000x2b00x2009a376f1cd17208da04a05162a06cb801False0.794921875data6.031787524514728IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .idata 0x580000x10000x200c92ced077364b300efd06b14c70a61dcFalse0.15625data1.1194718105633323IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            0x590000x2ae0000x20010869768e89c236aafa50f0177557c79unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            rujnmhpu0x3070000x1a10000x1a0e006c72583257f4df10a048cfbf33c75861False0.9942296429910045data7.953499321906515IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            bfyrfdky0x4a80000x10000x400a7fafe2f826090725f1d3f5bfcbe070dFalse0.779296875data6.079655072219222IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .taggant0x4a90000x30000x22008f0b13c08819fe56feaddd35f4398c81False0.0546875DOS executable (COM)0.654428562184932IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_MANIFEST0x4a79e80x256ASCII text, with CRLF line terminators0.5100334448160535
            DLLImport
            kernel32.dlllstrcpy
            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
            2024-11-25T05:46:21.953434+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749705104.21.88.250443TCP
            2024-11-25T05:46:22.681227+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.749705104.21.88.250443TCP
            2024-11-25T05:46:22.681227+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.749705104.21.88.250443TCP
            2024-11-25T05:46:23.939996+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749707104.21.88.250443TCP
            TimestampSource PortDest PortSource IPDest IP
            Nov 25, 2024 05:46:20.681462049 CET49705443192.168.2.7104.21.88.250
            Nov 25, 2024 05:46:20.681493998 CET44349705104.21.88.250192.168.2.7
            Nov 25, 2024 05:46:20.681678057 CET49705443192.168.2.7104.21.88.250
            Nov 25, 2024 05:46:20.685146093 CET49705443192.168.2.7104.21.88.250
            Nov 25, 2024 05:46:20.685158968 CET44349705104.21.88.250192.168.2.7
            Nov 25, 2024 05:46:21.953368902 CET44349705104.21.88.250192.168.2.7
            Nov 25, 2024 05:46:21.953433990 CET49705443192.168.2.7104.21.88.250
            Nov 25, 2024 05:46:21.957576036 CET49705443192.168.2.7104.21.88.250
            Nov 25, 2024 05:46:21.957591057 CET44349705104.21.88.250192.168.2.7
            Nov 25, 2024 05:46:21.957880020 CET44349705104.21.88.250192.168.2.7
            Nov 25, 2024 05:46:22.002418995 CET49705443192.168.2.7104.21.88.250
            Nov 25, 2024 05:46:22.021745920 CET49705443192.168.2.7104.21.88.250
            Nov 25, 2024 05:46:22.021790028 CET49705443192.168.2.7104.21.88.250
            Nov 25, 2024 05:46:22.021832943 CET44349705104.21.88.250192.168.2.7
            Nov 25, 2024 05:46:22.680773973 CET44349705104.21.88.250192.168.2.7
            Nov 25, 2024 05:46:22.680891037 CET44349705104.21.88.250192.168.2.7
            Nov 25, 2024 05:46:22.681127071 CET49705443192.168.2.7104.21.88.250
            Nov 25, 2024 05:46:22.682605028 CET49705443192.168.2.7104.21.88.250
            Nov 25, 2024 05:46:22.682605028 CET49705443192.168.2.7104.21.88.250
            Nov 25, 2024 05:46:22.682621956 CET44349705104.21.88.250192.168.2.7
            Nov 25, 2024 05:46:22.682636976 CET44349705104.21.88.250192.168.2.7
            Nov 25, 2024 05:46:22.733652115 CET49707443192.168.2.7104.21.88.250
            Nov 25, 2024 05:46:22.733680964 CET44349707104.21.88.250192.168.2.7
            Nov 25, 2024 05:46:22.733875036 CET49707443192.168.2.7104.21.88.250
            Nov 25, 2024 05:46:22.734177113 CET49707443192.168.2.7104.21.88.250
            Nov 25, 2024 05:46:22.734196901 CET44349707104.21.88.250192.168.2.7
            Nov 25, 2024 05:46:23.939996004 CET49707443192.168.2.7104.21.88.250
            TimestampSource PortDest PortSource IPDest IP
            Nov 25, 2024 05:46:19.967453003 CET5738853192.168.2.71.1.1.1
            Nov 25, 2024 05:46:20.205487967 CET53573881.1.1.1192.168.2.7
            Nov 25, 2024 05:46:20.212950945 CET6147353192.168.2.71.1.1.1
            Nov 25, 2024 05:46:20.674906015 CET53614731.1.1.1192.168.2.7
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Nov 25, 2024 05:46:19.967453003 CET192.168.2.71.1.1.10xfe05Standard query (0)property-imper.sbsA (IP address)IN (0x0001)false
            Nov 25, 2024 05:46:20.212950945 CET192.168.2.71.1.1.10x7fbStandard query (0)frogs-severz.sbsA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Nov 25, 2024 05:46:20.205487967 CET1.1.1.1192.168.2.70xfe05Name error (3)property-imper.sbsnonenoneA (IP address)IN (0x0001)false
            Nov 25, 2024 05:46:20.674906015 CET1.1.1.1192.168.2.70x7fbNo error (0)frogs-severz.sbs104.21.88.250A (IP address)IN (0x0001)false
            Nov 25, 2024 05:46:20.674906015 CET1.1.1.1192.168.2.70x7fbNo error (0)frogs-severz.sbs172.67.155.47A (IP address)IN (0x0001)false
            • frogs-severz.sbs
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.749705104.21.88.250443320C:\Users\user\Desktop\file.exe
            TimestampBytes transferredDirectionData
            2024-11-25 04:46:22 UTC263OUTPOST /api HTTP/1.1
            Connection: Keep-Alive
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
            Content-Length: 8
            Host: frogs-severz.sbs
            2024-11-25 04:46:22 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
            Data Ascii: act=life
            2024-11-25 04:46:22 UTC1003INHTTP/1.1 200 OK
            Date: Mon, 25 Nov 2024 04:46:22 GMT
            Content-Type: text/html; charset=UTF-8
            Transfer-Encoding: chunked
            Connection: close
            Set-Cookie: PHPSESSID=rl0tf73tkv4eigv6j38d1skipq; expires=Thu, 20-Mar-2025 22:33:01 GMT; Max-Age=9999999; path=/
            Expires: Thu, 19 Nov 1981 08:52:00 GMT
            Cache-Control: no-store, no-cache, must-revalidate
            Pragma: no-cache
            cf-cache-status: DYNAMIC
            vary: accept-encoding
            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PBFwvJU1AfNvZt7A3vXwjKyzQhlQ8MlPK8LA185FI48paTj6GsMrDuj38kM%2B7W3fC8bmhcyCY7rrs3qEixMj8WV1DtkErXFzijXLYUHkbRCTaTKfj6qaxZncmbf4RfM4R1Ee"}],"group":"cf-nel","max_age":604800}
            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
            Server: cloudflare
            CF-RAY: 8e7efe9cff1f180d-EWR
            alt-svc: h3=":443"; ma=86400
            server-timing: cfL4;desc="?proto=TCP&rtt=3492&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2839&recv_bytes=907&delivery_rate=1887524&cwnd=201&unsent_bytes=0&cid=9017997a427cb167&ts=739&x=0"
            2024-11-25 04:46:22 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
            Data Ascii: 2ok
            2024-11-25 04:46:22 UTC5INData Raw: 30 0d 0a 0d 0a
            Data Ascii: 0


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Target ID:5
            Start time:23:46:16
            Start date:24/11/2024
            Path:C:\Users\user\Desktop\file.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\file.exe"
            Imagebase:0xe30000
            File size:1'879'040 bytes
            MD5 hash:8453F1D8DF8F15F1BBC160BD225B7DF3
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:3%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:66.2%
              Total number of Nodes:234
              Total number of Limit Nodes:14
              execution_graph 6975 e3de02 6977 e3de30 6975->6977 6976 e3de9e 6977->6976 6979 e6df70 LdrInitializeThunk 6977->6979 6979->6976 6694 e389a0 6695 e389af 6694->6695 6696 e38cb3 ExitProcess 6695->6696 6697 e38cae 6695->6697 6702 e3ce80 CoInitializeEx 6695->6702 6703 e6deb0 6697->6703 6706 e6f460 6703->6706 6705 e6deb5 FreeLibrary 6705->6696 6707 e6f469 6706->6707 6707->6705 6708 e51960 6709 e519d8 6708->6709 6714 e49530 6709->6714 6711 e51a84 6712 e49530 LdrInitializeThunk 6711->6712 6713 e51b29 6712->6713 6715 e49560 6714->6715 6715->6715 6726 e70480 6715->6726 6717 e49756 6722 e496ca 6717->6722 6724 e49783 6717->6724 6730 e70880 6717->6730 6718 e4974b 6736 e707b0 6718->6736 6719 e4962e 6719->6717 6719->6718 6720 e70480 LdrInitializeThunk 6719->6720 6719->6722 6719->6724 6720->6719 6722->6711 6724->6722 6740 e6df70 LdrInitializeThunk 6724->6740 6727 e704a0 6726->6727 6727->6727 6728 e705be 6727->6728 6741 e6df70 LdrInitializeThunk 6727->6741 6728->6719 6731 e708b0 6730->6731 6734 e708fe 6731->6734 6742 e6df70 LdrInitializeThunk 6731->6742 6732 e709ae 6732->6724 6734->6732 6743 e6df70 LdrInitializeThunk 6734->6743 6737 e707e0 6736->6737 6737->6737 6738 e7082e 6737->6738 6744 e6df70 LdrInitializeThunk 6737->6744 6738->6717 6740->6722 6741->6728 6742->6734 6743->6732 6744->6738 6745 e6b7e0 6746 e6b800 6745->6746 6746->6746 6747 e6b83f RtlAllocateHeap 6746->6747 6748 e3cf05 6749 e3cf20 6748->6749 6754 e69030 6749->6754 6751 e3cf7a 6752 e69030 5 API calls 6751->6752 6753 e3d3ca 6752->6753 6755 e69090 6754->6755 6756 e691b1 SysAllocString 6755->6756 6759 e6966a 6755->6759 6758 e691df 6756->6758 6757 e6969c GetVolumeInformationW 6763 e696ba 6757->6763 6758->6759 6760 e691ea CoSetProxyBlanket 6758->6760 6759->6757 6760->6759 6761 e6920a 6760->6761 6762 e69658 SysFreeString SysFreeString 6761->6762 6762->6759 6763->6751 6764 e6bce0 6765 e6bd5a 6764->6765 6766 e6bcf2 6764->6766 6766->6765 6767 e6bd52 6766->6767 6772 e6df70 LdrInitializeThunk 6766->6772 6767->6767 6769 e6bede 6767->6769 6773 e6df70 LdrInitializeThunk 6767->6773 6769->6765 6774 e6df70 LdrInitializeThunk 6769->6774 6772->6767 6773->6769 6774->6765 6970 e702c0 6972 e702e0 6970->6972 6971 e7041e 6972->6971 6974 e6df70 LdrInitializeThunk 6972->6974 6974->6971 6980 e70a00 6981 e70a30 6980->6981 6984 e70a7e 6981->6984 6986 e6df70 LdrInitializeThunk 6981->6986 6982 e70b2e 6984->6982 6987 e6df70 LdrInitializeThunk 6984->6987 6986->6984 6987->6982 6993 e3c32b 6994 e6ded0 RtlAllocateHeap 6993->6994 6995 e3c338 6994->6995 6944 e3e88f 6945 e3e88e 6944->6945 6945->6944 6947 e3e89c 6945->6947 6950 e6df70 LdrInitializeThunk 6945->6950 6949 e3e948 6947->6949 6951 e6df70 LdrInitializeThunk 6947->6951 6950->6947 6951->6949 6691 e3ceb3 CoInitializeSecurity 6692 e3d7d3 CoUninitialize 6693 e3d7da 6692->6693 6952 e3dc33 6953 e3dcd0 6952->6953 6953->6953 6954 e3dd4e 6953->6954 6956 e6df70 LdrInitializeThunk 6953->6956 6956->6954 6957 e3e970 6958 e3e8b8 6957->6958 6960 e3e948 6958->6960 6961 e6df70 LdrInitializeThunk 6958->6961 6960->6960 6961->6960 6962 e49130 6963 e6b8e0 2 API calls 6962->6963 6964 e49158 6963->6964 6996 e4db30 6997 e4db70 6996->6997 6997->6997 7000 e3b210 6997->7000 7001 e3b2a0 7000->7001 7001->7001 7002 e6ded0 RtlAllocateHeap 7001->7002 7003 e3b2d6 7001->7003 7002->7001 6775 e3e0d8 6776 e3e100 6775->6776 6778 e3e16e 6776->6778 6791 e6df70 LdrInitializeThunk 6776->6791 6780 e3e22e 6778->6780 6792 e6df70 LdrInitializeThunk 6778->6792 6793 e55e90 6780->6793 6782 e3e29d 6801 e56190 6782->6801 6784 e3e2bd 6811 e57e20 6784->6811 6788 e3e2e6 6831 e58c90 6788->6831 6790 e3e2ef 6791->6778 6792->6780 6798 e55f30 6793->6798 6794 e56026 6834 e51790 6794->6834 6796 e56020 6796->6782 6797 e560b5 6799 e51790 2 API calls 6797->6799 6798->6794 6798->6796 6798->6797 6840 e70f60 6798->6840 6799->6796 6802 e5619e 6801->6802 6873 e70b70 6802->6873 6804 e70f60 2 API calls 6805 e55fe0 6804->6805 6805->6804 6806 e56020 6805->6806 6807 e56026 6805->6807 6808 e560b5 6805->6808 6806->6784 6807->6807 6810 e51790 2 API calls 6807->6810 6808->6808 6809 e51790 2 API calls 6808->6809 6809->6806 6810->6808 6812 e580a0 6811->6812 6815 e57e4c 6811->6815 6817 e580d7 6811->6817 6821 e3e2dd 6811->6821 6878 e6ded0 6812->6878 6813 e70f60 2 API calls 6813->6815 6815->6812 6815->6813 6816 e70b70 LdrInitializeThunk 6815->6816 6815->6817 6815->6821 6816->6815 6818 e70b70 LdrInitializeThunk 6817->6818 6817->6821 6822 e6df70 LdrInitializeThunk 6817->6822 6882 e70c80 6817->6882 6890 e71580 6817->6890 6818->6817 6823 e58770 6821->6823 6822->6817 6824 e587a0 6823->6824 6825 e5882e 6824->6825 6902 e6df70 LdrInitializeThunk 6824->6902 6827 e6b7e0 RtlAllocateHeap 6825->6827 6830 e5895e 6825->6830 6828 e588b1 6827->6828 6828->6830 6903 e6df70 LdrInitializeThunk 6828->6903 6830->6788 6904 e58cb0 6831->6904 6833 e58c99 6833->6790 6835 e517a0 6834->6835 6836 e5183e 6835->6836 6838 e51861 6835->6838 6848 e70610 6835->6848 6836->6797 6838->6836 6838->6838 6852 e53d70 6838->6852 6842 e70f90 6840->6842 6841 e70fde 6843 e6b7e0 RtlAllocateHeap 6841->6843 6847 e710ae 6841->6847 6842->6841 6871 e6df70 LdrInitializeThunk 6842->6871 6845 e7101f 6843->6845 6845->6847 6872 e6df70 LdrInitializeThunk 6845->6872 6847->6798 6847->6847 6849 e70630 6848->6849 6850 e7075e 6849->6850 6864 e6df70 LdrInitializeThunk 6849->6864 6850->6838 6853 e70480 LdrInitializeThunk 6852->6853 6854 e53db0 6853->6854 6859 e544c3 6854->6859 6865 e6b7e0 6854->6865 6856 e53dee 6863 e53e7c 6856->6863 6868 e6df70 LdrInitializeThunk 6856->6868 6858 e6b7e0 RtlAllocateHeap 6858->6863 6859->6836 6860 e54427 6860->6859 6870 e6df70 LdrInitializeThunk 6860->6870 6863->6858 6863->6860 6869 e6df70 LdrInitializeThunk 6863->6869 6864->6850 6866 e6b800 6865->6866 6866->6866 6867 e6b83f RtlAllocateHeap 6866->6867 6867->6856 6868->6856 6869->6863 6870->6860 6871->6841 6872->6847 6875 e70b90 6873->6875 6874 e70c4f 6874->6805 6875->6874 6877 e6df70 LdrInitializeThunk 6875->6877 6877->6874 6879 e6df3e 6878->6879 6881 e6deea 6878->6881 6880 e6b7e0 RtlAllocateHeap 6879->6880 6880->6881 6881->6817 6883 e70cb0 6882->6883 6884 e70cfe 6883->6884 6898 e6df70 LdrInitializeThunk 6883->6898 6886 e6b7e0 RtlAllocateHeap 6884->6886 6889 e70e0f 6884->6889 6887 e70d8b 6886->6887 6887->6889 6899 e6df70 LdrInitializeThunk 6887->6899 6889->6817 6889->6889 6891 e71591 6890->6891 6892 e7163e 6891->6892 6900 e6df70 LdrInitializeThunk 6891->6900 6894 e6b7e0 RtlAllocateHeap 6892->6894 6896 e717de 6892->6896 6895 e716ae 6894->6895 6895->6896 6901 e6df70 LdrInitializeThunk 6895->6901 6896->6817 6898->6884 6899->6889 6900->6892 6901->6896 6902->6825 6903->6830 6905 e58d10 6904->6905 6905->6905 6914 e6b8e0 6905->6914 6907 e58d6d 6907->6833 6909 e58d45 6909->6907 6912 e58e66 6909->6912 6922 e6bb20 6909->6922 6926 e6c040 6909->6926 6913 e58ece 6912->6913 6934 e6bfa0 6912->6934 6913->6833 6915 e6b900 6914->6915 6916 e6b93e 6915->6916 6938 e6df70 LdrInitializeThunk 6915->6938 6918 e6b7e0 RtlAllocateHeap 6916->6918 6921 e6ba1f 6916->6921 6919 e6b9c5 6918->6919 6919->6921 6939 e6df70 LdrInitializeThunk 6919->6939 6921->6909 6923 e6bbce 6922->6923 6924 e6bb31 6922->6924 6923->6909 6924->6923 6940 e6df70 LdrInitializeThunk 6924->6940 6928 e6c090 6926->6928 6927 e6c73e 6927->6909 6930 e6c0d8 6928->6930 6941 e6df70 LdrInitializeThunk 6928->6941 6930->6927 6931 e6c6cf 6930->6931 6933 e6df70 LdrInitializeThunk 6930->6933 6931->6927 6942 e6df70 LdrInitializeThunk 6931->6942 6933->6930 6936 e6bfc0 6934->6936 6935 e6c00e 6935->6912 6936->6935 6943 e6df70 LdrInitializeThunk 6936->6943 6938->6916 6939->6921 6940->6923 6941->6930 6942->6927 6943->6935

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 e69030-e69089 1 e69090-e690c6 0->1 1->1 2 e690c8-e690e4 1->2 4 e690e6 2->4 5 e690f1-e6913f 2->5 4->5 7 e69145-e69177 5->7 8 e6968c-e696b8 call e6f9a0 GetVolumeInformationW 5->8 9 e69180-e691af 7->9 13 e696bc-e696df call e50650 8->13 14 e696ba 8->14 9->9 11 e691b1-e691e4 SysAllocString 9->11 17 e69674-e69688 11->17 18 e691ea-e69204 CoSetProxyBlanket 11->18 22 e696e0-e696e8 13->22 14->13 17->8 20 e6966a-e69670 18->20 21 e6920a-e69225 18->21 20->17 24 e69230-e69262 21->24 22->22 25 e696ea-e696ec 22->25 24->24 26 e69264-e692df 24->26 27 e696fe-e6972d call e50650 25->27 28 e696ee-e696fb call e38330 25->28 36 e692e0-e6930b 26->36 35 e69730-e69738 27->35 28->27 35->35 37 e6973a-e6973c 35->37 36->36 38 e6930d-e6933d 36->38 39 e6974e-e6977d call e50650 37->39 40 e6973e-e6974b call e38330 37->40 48 e69343-e69365 38->48 49 e69658-e69668 SysFreeString * 2 38->49 46 e69780-e69788 39->46 40->39 46->46 50 e6978a-e6978c 46->50 57 e6964b-e69655 48->57 58 e6936b-e6936e 48->58 49->20 51 e6979e-e697cb call e50650 50->51 52 e6978e-e6979b call e38330 50->52 61 e697d0-e697d8 51->61 52->51 57->49 58->57 60 e69374-e69379 58->60 60->57 62 e6937f-e693cf 60->62 61->61 63 e697da-e697dc 61->63 69 e693d0-e69416 62->69 65 e697ee-e697f5 63->65 66 e697de-e697eb call e38330 63->66 66->65 69->69 71 e69418-e6942d 69->71 72 e69431-e69433 71->72 73 e69636-e69647 72->73 74 e69439-e6943f 72->74 73->57 74->73 75 e69445-e69452 74->75 77 e69454-e69459 75->77 78 e6948d 75->78 80 e6946c-e69470 77->80 79 e6948f-e694b7 call e382b0 78->79 90 e694bd-e694cb 79->90 91 e695e8-e695f9 79->91 81 e69472-e6947b 80->81 82 e69460 80->82 86 e69482-e69486 81->86 87 e6947d-e69480 81->87 85 e69461-e6946a 82->85 85->79 85->80 86->85 89 e69488-e6948b 86->89 87->85 89->85 90->91 92 e694d1-e694d5 90->92 93 e69600-e6960c 91->93 94 e695fb 91->94 97 e694e0-e694ea 92->97 95 e69613-e69633 call e382e0 call e382c0 93->95 96 e6960e 93->96 94->93 95->73 96->95 99 e69500-e69506 97->99 100 e694ec-e694f1 97->100 103 e69525-e69533 99->103 104 e69508-e6950b 99->104 102 e69590-e69596 100->102 109 e69598-e6959e 102->109 106 e69535-e69538 103->106 107 e695aa-e695b3 103->107 104->103 105 e6950d-e69523 104->105 105->102 106->107 110 e6953a-e69581 106->110 113 e695b5-e695b7 107->113 114 e695b9-e695bc 107->114 109->91 112 e695a0-e695a2 109->112 110->102 112->97 115 e695a8 112->115 113->109 116 e695e4-e695e6 114->116 117 e695be-e695e2 114->117 115->91 116->102 117->102
              APIs
              • SysAllocString.OLEAUT32(13C511C2), ref: 00E691B7
              • CoSetProxyBlanket.COMBASE(0000FDFC,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00E691FD
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID: AllocBlanketProxyString
              • String ID: =3$C$E!q#$E!q#$Lgfe$\$IK
              • API String ID: 900851650-4011188741
              • Opcode ID: 229e752c00c24ac527d7f1cc505db7054177b54d53376bd433bf0fda8d8e9687
              • Instruction ID: 17557c5b8530424e35997adadb016908cae13b5420b863184fa9e22391b767a2
              • Opcode Fuzzy Hash: 229e752c00c24ac527d7f1cc505db7054177b54d53376bd433bf0fda8d8e9687
              • Instruction Fuzzy Hash: E72255715483009FE324CF20DC81B6BBBEAEF95794F149A1CF495AB282D774E905CB92

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 118 e3cf05-e3cf12 119 e3cf20-e3cf5c 118->119 119->119 120 e3cf5e-e3cfa5 call e38930 call e69030 119->120 125 e3cfb0-e3cffc 120->125 125->125 126 e3cffe-e3d06b 125->126 127 e3d070-e3d097 126->127 127->127 128 e3d099-e3d0aa 127->128 129 e3d0cb-e3d0d3 128->129 130 e3d0ac-e3d0b3 128->130 131 e3d0d5-e3d0d6 129->131 132 e3d0eb-e3d0f8 129->132 133 e3d0c0-e3d0c9 130->133 134 e3d0e0-e3d0e9 131->134 135 e3d11b-e3d123 132->135 136 e3d0fa-e3d101 132->136 133->129 133->133 134->132 134->134 138 e3d125-e3d126 135->138 139 e3d13b-e3d266 135->139 137 e3d110-e3d119 136->137 137->135 137->137 140 e3d130-e3d139 138->140 141 e3d270-e3d2ce 139->141 140->139 140->140 141->141 142 e3d2d0-e3d2ff 141->142 143 e3d300-e3d31a 142->143 143->143 144 e3d31c-e3d36b call e3b960 143->144 147 e3d370-e3d3ac 144->147 147->147 148 e3d3ae-e3d3c5 call e38930 call e69030 147->148 152 e3d3ca-e3d3eb 148->152 153 e3d3f0-e3d43c 152->153 153->153 154 e3d43e-e3d4ab 153->154 155 e3d4b0-e3d4d7 154->155 155->155 156 e3d4d9-e3d4ea 155->156 157 e3d4fb-e3d503 156->157 158 e3d4ec-e3d4ef 156->158 160 e3d505-e3d506 157->160 161 e3d51b-e3d528 157->161 159 e3d4f0-e3d4f9 158->159 159->157 159->159 164 e3d510-e3d519 160->164 162 e3d54b-e3d557 161->162 163 e3d52a-e3d531 161->163 166 e3d56b-e3d696 162->166 167 e3d559-e3d55a 162->167 165 e3d540-e3d549 163->165 164->161 164->164 165->162 165->165 169 e3d6a0-e3d6fe 166->169 168 e3d560-e3d569 167->168 168->166 168->168 169->169 170 e3d700-e3d72f 169->170 171 e3d730-e3d74a 170->171 171->171 172 e3d74c-e3d791 call e3b960 171->172
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: ()$+S7U$,_"Q$0C%E$7W"i$;[*]$<KuM$D9B2DC9EC2647CA1D7CBBD6DF28D3732$N3F5$S7HI$frogs-severz.sbs$y?O1$c]e$gy
              • API String ID: 0-3052796164
              • Opcode ID: 6e6cf4ff8221a4f0888b6d6db03cdccfc2501523a95990412661b0bef9904ce2
              • Instruction ID: 021f5159e14ca52c3fb2d71a23b9f023171e2148f19553974922848e3a77d5bc
              • Opcode Fuzzy Hash: 6e6cf4ff8221a4f0888b6d6db03cdccfc2501523a95990412661b0bef9904ce2
              • Instruction Fuzzy Hash: A812ECB154C3C18ED3358F25D895BEFBFA1ABD2308F19995CC4DA6B252C771090ACB92

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 203 e389a0-e389b1 call e6cb70 206 e38cb3-e38cbb ExitProcess 203->206 207 e389b7-e389cf call e66620 203->207 211 e389d5-e389fb 207->211 212 e38cae call e6deb0 207->212 216 e38a01-e38bda 211->216 217 e389fd-e389ff 211->217 212->206 219 e38be0-e38c50 216->219 220 e38c8a-e38ca2 call e39ed0 216->220 217->216 221 e38c52-e38c54 219->221 222 e38c56-e38c88 219->222 220->212 225 e38ca4 call e3ce80 220->225 221->222 222->220 227 e38ca9 call e3b930 225->227 227->212
              APIs
              • ExitProcess.KERNEL32(00000000), ref: 00E38CB6
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID: ExitProcess
              • String ID:
              • API String ID: 621844428-0
              • Opcode ID: 2f6c0bbec6fe4c91385b967dfee1af7ab35b369b92beabde4d6531c78faf7b8d
              • Instruction ID: 2c3c6924ff06765aed8145fc9ff71a686e710be16df367e975d87709450ae172
              • Opcode Fuzzy Hash: 2f6c0bbec6fe4c91385b967dfee1af7ab35b369b92beabde4d6531c78faf7b8d
              • Instruction Fuzzy Hash: BC710773B547040BC708DEBADD9235BFAD6ABC8714F09D83D6884D7390EE789C054685

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 234 e6df70-e6dfa2 LdrInitializeThunk
              APIs
              • LdrInitializeThunk.NTDLL(00E6BA46,?,00000010,00000005,00000000,?,00000000,?,?,00E49158,?,?,00E419B4), ref: 00E6DF9E
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
              • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
              • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
              • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 229 e6b7e0-e6b7ff 230 e6b800-e6b83d 229->230 230->230 231 e6b83f-e6b85b RtlAllocateHeap 230->231
              APIs
              • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 00E6B84E
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID: AllocateHeap
              • String ID:
              • API String ID: 1279760036-0
              • Opcode ID: b6ce81b347496cfb7bd8852b33fdc3635c7017ba90dce25284ccbc2a488a8350
              • Instruction ID: a97d7eb39479135e24cd629f1df110fcceccd8cd29828e1216a300366d39c503
              • Opcode Fuzzy Hash: b6ce81b347496cfb7bd8852b33fdc3635c7017ba90dce25284ccbc2a488a8350
              • Instruction Fuzzy Hash: 90017633A457080BC300AF7CDC9464ABB96EFD9228F2A063CE5D4873D0DA31990A8295

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 233 e3ceb3-e3cee2 CoInitializeSecurity
              APIs
              • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 00E3CEC6
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID: InitializeSecurity
              • String ID:
              • API String ID: 640775948-0
              • Opcode ID: da4ed4538f83c56d6022bceef83535088b79e1bbdef556529e101f6874a8b647
              • Instruction ID: 7f1669a531693172991595b6a436a4afea0c671ce97beebee718ed8ca679a8d4
              • Opcode Fuzzy Hash: da4ed4538f83c56d6022bceef83535088b79e1bbdef556529e101f6874a8b647
              • Instruction Fuzzy Hash: 05D0C9313D5742BAF9688608AC57F1023058705F28F700A08B33AFE6D1C8D071868508

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 232 e3ce80-e3ceb0 CoInitializeEx
              APIs
              • CoInitializeEx.COMBASE(00000000,00000002), ref: 00E3CE94
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID: Initialize
              • String ID:
              • API String ID: 2538663250-0
              • Opcode ID: e76df691197ce0501bb0ff4bc699e0a0d9b6de3a8b2e48820cc49e18c12573a6
              • Instruction ID: dc48199ae6377c75a7eaf4e949f486d473f33077cbde34b3dbe824988918caa5
              • Opcode Fuzzy Hash: e76df691197ce0501bb0ff4bc699e0a0d9b6de3a8b2e48820cc49e18c12573a6
              • Instruction Fuzzy Hash: ADD097212A06083BE120F21DEC03F23320CC302318F000626A266CA2C2D940681A8062

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 265 e3d7d3-e3d7d8 CoUninitialize 266 e3d7da-e3d7e1 265->266
              APIs
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID: Uninitialize
              • String ID:
              • API String ID: 3861434553-0
              • Opcode ID: ac182a29f7778ec3e96ed7aafa761fa61ff5335c33c0d0418291c0a831a8ba52
              • Instruction ID: 64c1c76747dac98cf07f7ee528d8371df797e86caa126fa0fe462e79efaf3032
              • Opcode Fuzzy Hash: ac182a29f7778ec3e96ed7aafa761fa61ff5335c33c0d0418291c0a831a8ba52
              • Instruction Fuzzy Hash: 09A02437F10014445F4000F47C010DDF310D1C00377100373C31CC1400D533113501C1
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID: AllocateHeap
              • String ID: $!@$,$9$:$;$`$`$`$e$e$e$f$f$f$g$g$g$n
              • API String ID: 1279760036-1524723224
              • Opcode ID: 756cae51e5dabd804b61128ea5ec64beb015f71fa009e2b42eef4a1e46a419f6
              • Instruction ID: 3a2d5ce90e5e63f8dbda7293c3c78e3f93f387cbd3add630026ae397f6d11d66
              • Opcode Fuzzy Hash: 756cae51e5dabd804b61128ea5ec64beb015f71fa009e2b42eef4a1e46a419f6
              • Instruction Fuzzy Hash: B0228CB150C3808FD3218F28C4943AEBBE1AB95319F185D2DE9D9A73D2D7758889CB53
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: n[$8$=86o$BDZF$N$RHL9$SD]z$ZS$_CYG$f)2s$mmi.$p8Bb$txfF$u{{h
              • API String ID: 0-1787199350
              • Opcode ID: 4f528f0c90cc623b71a293a4037b626f3364ba5f16f27244a2274f38ff2d6f74
              • Instruction ID: d8c1acb77c9ec90413a8a7ccd4f184485a458c5f42e665f19baf0fd684221886
              • Opcode Fuzzy Hash: 4f528f0c90cc623b71a293a4037b626f3364ba5f16f27244a2274f38ff2d6f74
              • Instruction Fuzzy Hash: 65B1D47010C3818FD3158F2980647ABBFE1AFD7348F1849ADE4D59B392D779880ACB92
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: D9B2DC9EC2647CA1D7CBBD6DF28D3732$DG$Ohs,$chs,$fhnf$fhnf$xy$su${}
              • API String ID: 0-2454128424
              • Opcode ID: 04e708169fc7380b767c1a7e29e4b6bbce197e83742ac603d5e56d0b25e9aef8
              • Instruction ID: de44587bf23cde0bb1d29f9317fdadcfef5f9e92811492df8a605d40d6e6eab0
              • Opcode Fuzzy Hash: 04e708169fc7380b767c1a7e29e4b6bbce197e83742ac603d5e56d0b25e9aef8
              • Instruction Fuzzy Hash: 52E15972A483504BD328CF35C85536BBFE2ABD1314F198A2DE5E59B391D774C805CB82
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: 79a$9 Z$aZi$d0}$l7hg$rC~o$#X$pm
              • API String ID: 0-1266458809
              • Opcode ID: 314474f1fd7befe75535946a940b2ecee59a01f7daae4d017b62480509b170a2
              • Instruction ID: 0a7ddbd1b1f40fa6f3bc68eab96f19893345c304781425187bf6bbab1f0db89e
              • Opcode Fuzzy Hash: 314474f1fd7befe75535946a940b2ecee59a01f7daae4d017b62480509b170a2
              • Instruction Fuzzy Hash: EAB2E5F39082049FE3046E2DEC8567AFBE9EF94720F16493DEAC4C3744EA3599058697
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: &@k&$&`w{$4i{E$E*({$k#|$oBo$r[
              • API String ID: 0-1902940930
              • Opcode ID: 7e785d0fefb37d9b3b9bc7b60580254cfc7e570ec78df2784b08e885756b2ad6
              • Instruction ID: c9b6f3b4f927d0378c8ba10012db2886d66aa71594a22ec5ff92f138a3cb4407
              • Opcode Fuzzy Hash: 7e785d0fefb37d9b3b9bc7b60580254cfc7e570ec78df2784b08e885756b2ad6
              • Instruction Fuzzy Hash: 0FB2D5F360C204AFE704AE29EC8577ABBE5EF94720F16893DEAC4C3744E63558058697
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: !G_$"vn$'6/$-RH$D8!:$%t<$%vO
              • API String ID: 0-1399670969
              • Opcode ID: 149545dbb6a37ec9943927fe04d0b79339d4cc97c3ce202b2ba5cba2ddba7851
              • Instruction ID: eb5f6c41e430d5e8ea195d6056285892c825c49e80672d0f011cd2ca4494965e
              • Opcode Fuzzy Hash: 149545dbb6a37ec9943927fe04d0b79339d4cc97c3ce202b2ba5cba2ddba7851
              • Instruction Fuzzy Hash: 45A218F36082049FE304AE2DEC8567ABBE9EFD4720F1A893DE6C4C7744E53558058796
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: FG`s$Vr{{$WZsm$dY?$6u{$?
              • API String ID: 0-4235601579
              • Opcode ID: 1d196ecea3e5b1385a4ece3196b0bc5901730ebd1ba965b6f63cc1001da235bd
              • Instruction ID: 688364e8395030fa5791cd75180e9b51cc35cc318b7d9085f3a3da761cb5b7ba
              • Opcode Fuzzy Hash: 1d196ecea3e5b1385a4ece3196b0bc5901730ebd1ba965b6f63cc1001da235bd
              • Instruction Fuzzy Hash: 42B2F4F360C6009FE304AE29EC8567AFBE5EFD4720F1A893DE6C4C7744E63598458692
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: 5[Y$8$CN$Lw$}~$SRQ$_]
              • API String ID: 0-3274379026
              • Opcode ID: 31e5590f62b0cb9bfc6fe2b6262e0b4f497e437a71171874b36b46383a3fc3c1
              • Instruction ID: f7bc1b455fa0a9256fb119a38c59016df1ecaa92b96aca2b808f32c0d507d4df
              • Opcode Fuzzy Hash: 31e5590f62b0cb9bfc6fe2b6262e0b4f497e437a71171874b36b46383a3fc3c1
              • Instruction Fuzzy Hash: 515147719183518BD320CF25C8902ABB7F2FFD2315F18995CE8C19B255EB74890AC792
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: ,T$2L$@O$bK$bM$zQ
              • API String ID: 0-303244978
              • Opcode ID: b2e4ca3b130420b22101fb1f6def8a3632690e19b9a7832178b83fea4cc68322
              • Instruction ID: c802195d4db4773dc322513745e0c85369c678afae5ba8d1361fa7f0a97749a5
              • Opcode Fuzzy Hash: b2e4ca3b130420b22101fb1f6def8a3632690e19b9a7832178b83fea4cc68322
              • Instruction Fuzzy Hash: A3424676608301DFD704CF29D89475ABBE1BF88355F04886CE8999B3A1D7B5D988CF82
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: $vv$/=}_$hJ=g$vI%8
              • API String ID: 0-714454905
              • Opcode ID: 43cb31ad5deecab7c7ef47719aa1b655dcde26c47dd447d5ddf144e36823600c
              • Instruction ID: d7677ad499ab8787f2705000533d81b2ee811a15d4cf0ee4f17d4f77e518fa04
              • Opcode Fuzzy Hash: 43cb31ad5deecab7c7ef47719aa1b655dcde26c47dd447d5ddf144e36823600c
              • Instruction Fuzzy Hash: 63B219F36082049FE304AE2DEC8567ABBE9EFD4720F168A3DE6C4C3744E93559058697
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: ":_$,z~/$5?Jz$SP|-
              • API String ID: 0-521415662
              • Opcode ID: fdb9cc3672ee1df37f1679fcc35ef837adc296e4ff23f4423e6f81582d2b6843
              • Instruction ID: 93c9646e424a8fea76bfc46acb94432e6dab0b51ff1ee356224ff0c41568bb15
              • Opcode Fuzzy Hash: fdb9cc3672ee1df37f1679fcc35ef837adc296e4ff23f4423e6f81582d2b6843
              • Instruction Fuzzy Hash: B0B22BF3A0C2049FE308AE2DEC8567AB7E9EF94720F16453DEAC5D3744EA3558018697
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: -Oz$Kvrw$]hmo$s{_
              • API String ID: 0-3072104240
              • Opcode ID: 09ef36092a7904ed29d0432aa413620f3f168d09498074adbd0f37f2536e1fb6
              • Instruction ID: 0ebb609bd89e7a0326a13cafd47c217a0d36ef86d9c82e1c977ef41bcce39b6b
              • Opcode Fuzzy Hash: 09ef36092a7904ed29d0432aa413620f3f168d09498074adbd0f37f2536e1fb6
              • Instruction Fuzzy Hash: 14B206F3A0C214AFE304AE2DDC8567ABBE9EF94720F16493DEAC4C7744E63558018796
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: Lk$U\$Zb$frogs-severz.sbs$r
              • API String ID: 0-2060998389
              • Opcode ID: 079a35e63325f2e30cf7d8af275224eaa62f735f71b83ec5233fdeaf99334438
              • Instruction ID: 6cefe15e9d187484b0a5164a96d89ef55ee707c065e5b633c6f325d4446c286a
              • Opcode Fuzzy Hash: 079a35e63325f2e30cf7d8af275224eaa62f735f71b83ec5233fdeaf99334438
              • Instruction Fuzzy Hash: 8DA1AC7010C3D18AD7758F25C4987EBBFE1AB93308F189A9CD0E95B282DB394506CB57
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: )=+4$57$7514$84*6$N
              • API String ID: 0-4020838272
              • Opcode ID: be85e90a30f89c364b58cec467ad0dcda84538ec37489d1a8be0575a1ed0ed84
              • Instruction ID: 63a7b4c8d2f20fae46ae3be8122a5f5fa35bea33de4fe91b7ad6dca6a1af3b9e
              • Opcode Fuzzy Hash: be85e90a30f89c364b58cec467ad0dcda84538ec37489d1a8be0575a1ed0ed84
              • Instruction Fuzzy Hash: 2B71B57110C3C28BD315CB29C4A437BFFE19FA2309F18599DE4D65B282D7B9890AC752
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: +2/?$=79$BBSH$GZE^
              • API String ID: 0-3392023846
              • Opcode ID: ac8bef0bceb8bddc6f311b1ec6df6366006626790c564ce37448f18e7080ccee
              • Instruction ID: fbd780e702a4be1e667e66abf7bb9db8a6e755d2989d42587d6ed93d989bddaa
              • Opcode Fuzzy Hash: ac8bef0bceb8bddc6f311b1ec6df6366006626790c564ce37448f18e7080ccee
              • Instruction Fuzzy Hash: A152E270504B418FC735CF39C890766BBE1BF96314F149A6DD8E69BB92CB35A80ACB50
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: H{D}$TgXy$_o]a$=>?
              • API String ID: 0-2004217480
              • Opcode ID: 06a2db13f6102a99b693d2a72c500e1a46e6237b264280a67fbe92d876f2360e
              • Instruction ID: 47e474a8dc08d8d0c03c757fa6243f56ba9a8ec6b06fc1fe685c83f61f976413
              • Opcode Fuzzy Hash: 06a2db13f6102a99b693d2a72c500e1a46e6237b264280a67fbe92d876f2360e
              • Instruction Fuzzy Hash: 0E1256B1610B01CFE324CF26D895B97BBF5FB45314F048A1DD5AA9BAA0CB74A449CF80
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: =:;8$=:;8$a{$kp
              • API String ID: 0-2717198472
              • Opcode ID: b32ae7c69a0897e0c27ddd5bc35d6612b9232a968b4cab5e6f42f65e21397c5a
              • Instruction ID: a920c5e52c36f559c760bbed42c82075f9dfa62ecfb17dbc0578275d0665f3f0
              • Opcode Fuzzy Hash: b32ae7c69a0897e0c27ddd5bc35d6612b9232a968b4cab5e6f42f65e21397c5a
              • Instruction Fuzzy Hash: C2E1CDB550C340CFE320CF25D98176BBBE1FBC9308F14982CE999AB295DB749849CB42
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: @A$lPLN$svfZ$IK
              • API String ID: 0-1806543684
              • Opcode ID: 87e407169746dd959c9b5daf58865a25a0f8bb22fd34b8196b69965dcc3ccf1c
              • Instruction ID: d881822ae5c780e346505ff153c4fde86bfad1d01a2f555fd4124dcb499f641c
              • Opcode Fuzzy Hash: 87e407169746dd959c9b5daf58865a25a0f8bb22fd34b8196b69965dcc3ccf1c
              • Instruction Fuzzy Hash: 9CC1387164D3848BD3288E2484A53AFBFE2EBC2704F18D92CE5E65B341D7758C09DB82
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: Ps^$lM0l$rjn_
              • API String ID: 0-60988864
              • Opcode ID: ef754bc86a1c52c794b513632a3c18bc270bdf7bc4f2d221acc1015c0f54649d
              • Instruction ID: 006fc08be63ad18bd429a90ec7e5933dd1f7cb4b65d8176015e372a877164f54
              • Opcode Fuzzy Hash: ef754bc86a1c52c794b513632a3c18bc270bdf7bc4f2d221acc1015c0f54649d
              • Instruction Fuzzy Hash: 63B218F3A0C2009FE7046E2DED8567ABBE9EF94320F1A863DE6C5C3744E93559018796
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: @J$KP$VD$ra
              • API String ID: 0-3014653992
              • Opcode ID: 4ac9666c7c4b3cb0f0ea9e6bd6da1894190e24b235d9d6625115f957e4716573
              • Instruction ID: c40a8632b223b6a75fbd96af12662d8ccd64c8271b594768ae109860cc71a7d4
              • Opcode Fuzzy Hash: 4ac9666c7c4b3cb0f0ea9e6bd6da1894190e24b235d9d6625115f957e4716573
              • Instruction Fuzzy Hash: E991A772704B019FD720CF68DC81BABBBB1FB81300F14552CE599AB781C374A85ACB92
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: )$)$IEND
              • API String ID: 0-588110143
              • Opcode ID: bcd52bcbb2e425e3ebf4e851f112801b677176d097a59a3a3b08ff6bfb1a7dea
              • Instruction ID: 5463efea5249853590209e43d01af102a3dce34eebc4c60b6a5f3373fe401047
              • Opcode Fuzzy Hash: bcd52bcbb2e425e3ebf4e851f112801b677176d097a59a3a3b08ff6bfb1a7dea
              • Instruction Fuzzy Hash: 31F1E0B1A087019BE314CF28D85976ABBE0BB94308F04462DFA95AB3D1D775E954CB82
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: 6D?$>}*
              • API String ID: 0-3552628623
              • Opcode ID: 5e39d163df8393aef952a99e7b54cb1f5b051e6c4379a608398254d37c51b04e
              • Instruction ID: f84e116bb9f7bbb01256e00278ddb73998b1b7e5573d164de8ddccd5a27ccbce
              • Opcode Fuzzy Hash: 5e39d163df8393aef952a99e7b54cb1f5b051e6c4379a608398254d37c51b04e
              • Instruction Fuzzy Hash: A1B2E7F3A082049FE314AE2DDC8567AF7E9EFD4720F1A853DEAC4C3744EA3558058696
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: 0$8$Y
              • API String ID: 0-3650831924
              • Opcode ID: 6f737f6340e13ef49a3d5b974dcf4f392b7c6a4f235c82b8911dc55fb894fa78
              • Instruction ID: 0c6c8b17ddeb6c4c2a966dbbaf018e096782fd734f5d61a01c39ab287c39230c
              • Opcode Fuzzy Hash: 6f737f6340e13ef49a3d5b974dcf4f392b7c6a4f235c82b8911dc55fb894fa78
              • Instruction Fuzzy Hash: 7DA11276608780DFD320CF28D844B9EBBE1AB89304F14895CE9C8A7362C775E959CF52
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: 0$8$Y
              • API String ID: 0-3650831924
              • Opcode ID: 495e0fa332bccf81244257bdd10a6a81930add0cda713be1a96c081289ab208d
              • Instruction ID: 00cca85641d7c875acb82b5b7e0fcc1801a5d856cd2a512a5e89a12882679b94
              • Opcode Fuzzy Hash: 495e0fa332bccf81244257bdd10a6a81930add0cda713be1a96c081289ab208d
              • Instruction Fuzzy Hash: 97A11176608780DFD320CF28D84479ABBE1AB89314F18895CE9C8A7362C775E959CF52
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: !K$*FB$7t
              • API String ID: 0-3951377313
              • Opcode ID: e48a824712e86bd67eebfc584c38dbc1103c5cd1722a953b5bf8bc35b819d423
              • Instruction ID: d39b05998a3004bf3fad2e52367cf69fb9279f1611a0aaa6b29c800575cc5165
              • Opcode Fuzzy Hash: e48a824712e86bd67eebfc584c38dbc1103c5cd1722a953b5bf8bc35b819d423
              • Instruction Fuzzy Hash: BD51F4F3F083145BE354AE2DEC8476BB6D6DBD4320F2B853DDA8893784E8395C058696
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: PQ$A_$IG
              • API String ID: 0-2179527320
              • Opcode ID: d003608c9667f9de01e6e485e949a5350e674ee48f1ea8b65024d406ae1d940c
              • Instruction ID: b32ace5013efac155250a6c2b60363b238dc3796e76ba45d17397e7fc0788555
              • Opcode Fuzzy Hash: d003608c9667f9de01e6e485e949a5350e674ee48f1ea8b65024d406ae1d940c
              • Instruction Fuzzy Hash: A6419BB000C341CAC714CF21D85666BBBF0FF96758F24AA0DE0C5AB6A5E774C586CB4A
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: :du}$<cl$]g
              • API String ID: 0-881795885
              • Opcode ID: 5e88716f653b6ce6960107b8ee8f2bb06ea4e31e0559e4454d830772cca2edfb
              • Instruction ID: d30286d23177a9f8aaa2f9bedbdf6915b2509b7144c607acd9320f9900f98e14
              • Opcode Fuzzy Hash: 5e88716f653b6ce6960107b8ee8f2bb06ea4e31e0559e4454d830772cca2edfb
              • Instruction Fuzzy Hash: B45110B220C704AFD301AE2AED4553EF7E9EFC4720F19892EE5C587604EA3285408B47
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: cC$jC
              • API String ID: 0-2055910567
              • Opcode ID: 3e418006ec1862f6e5283bc9b253e6247b0bd136d5b561d90c21663c75f20daf
              • Instruction ID: 8c24fdf02b360d308e9438df9f1f6ced4a3087a909245ee9ad30039133f6c59b
              • Opcode Fuzzy Hash: 3e418006ec1862f6e5283bc9b253e6247b0bd136d5b561d90c21663c75f20daf
              • Instruction Fuzzy Hash: BD420F32B04211CFDB08CF69E8906AEB7F2FB89311F1E957DC95AA7391C6349945CB81
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID: f$
              • API String ID: 2994545307-508322865
              • Opcode ID: 1365fba0dc9f1f249ece80276999a5edae0467d6ceb216bf8d714d9f5b36cf32
              • Instruction ID: 95ae44577adb121641ded755ac4695f0379c0240ffb67bdfb286c996b78715f2
              • Opcode Fuzzy Hash: 1365fba0dc9f1f249ece80276999a5edae0467d6ceb216bf8d714d9f5b36cf32
              • Instruction Fuzzy Hash: D912F47064C3418FD714CF29D890A3BBBE2AFC5358F24AA2CE5D5A72A2D731D845CB52
              Strings
              • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899, xrefs: 00E62591
              • 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ, xrefs: 00E625D2
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ
              • API String ID: 0-2492670020
              • Opcode ID: bab237cf513fdf0c25049fa373ea91226e474a219cb2a937e224baaf1344813a
              • Instruction ID: 434e86e609170e2f38c24b932ba40a6abd8231f617669a4310c6538e76e60122
              • Opcode Fuzzy Hash: bab237cf513fdf0c25049fa373ea91226e474a219cb2a937e224baaf1344813a
              • Instruction Fuzzy Hash: D0815C33A48A914BCB24CD3CAC512ED7B925F573B0B2D93ADD672BB3D5C1248D058351
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: #f/f$Rq~W
              • API String ID: 0-3899423331
              • Opcode ID: d487f34b8f39c39e844f24b151e1ebd611a0f4763f642cc3ccaeb15ed8e9687c
              • Instruction ID: 49042ed0f0eea2969d3f7920741c4241cb95801702fe5087129a4030cbc3a1cb
              • Opcode Fuzzy Hash: d487f34b8f39c39e844f24b151e1ebd611a0f4763f642cc3ccaeb15ed8e9687c
              • Instruction Fuzzy Hash: 81514AF360D2049FE30CAA2DEC9577AF7DAEBD4320F26463ED68583380DD7558054256
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: efg`$efg`
              • API String ID: 0-3010568471
              • Opcode ID: 130b3fa59292ea1ca94779bceb641b38feac21539070d473c795949311fb1d59
              • Instruction ID: 9db426b69dd78fe5c6e0e87825169085f0b9fc0ca02f8ae70918a4fb7e0f5316
              • Opcode Fuzzy Hash: 130b3fa59292ea1ca94779bceb641b38feac21539070d473c795949311fb1d59
              • Instruction Fuzzy Hash: 3531B632A083508BD328DF51D59569FBBA2BFD4304F5A642CE9C677355CA309D0AC7D2
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: st@
              • API String ID: 0-3741395493
              • Opcode ID: e31093b00da9e08712d051382d32c190fec2a872ae0a0f692c710407bc07f919
              • Instruction ID: 700941fcc424289fa20fbe02de75076f6e723a888577960ced1ef08c86c127b7
              • Opcode Fuzzy Hash: e31093b00da9e08712d051382d32c190fec2a872ae0a0f692c710407bc07f919
              • Instruction Fuzzy Hash: C4F146B150C381CFD304CF25D85026BBBE2AF9A304F18986DE9C5A7292D775D94DCB92
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID: =:;8
              • API String ID: 2994545307-508151936
              • Opcode ID: 3546e43f811631f6784454959e9fbe29d35522a4796066690923b76d16a21da8
              • Instruction ID: 3e597c9c7d75bf0670de353f43264b3aaf9d033e45ddefd97fc597c7d0e1cb27
              • Opcode Fuzzy Hash: 3546e43f811631f6784454959e9fbe29d35522a4796066690923b76d16a21da8
              • Instruction Fuzzy Hash: 19D16F72A483118BD714CA24CD81277B792EFC5309F19A97DDC857B392DE749C0AC791
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: o8}w
              • API String ID: 0-1015639877
              • Opcode ID: 1c199de8f72f27c5cded275929a5da253b536c9c7586918782628200b7368b40
              • Instruction ID: 159981a168494526df62885b7484b5ba4129f8f00cd0ea578d4d521dab8ccdf5
              • Opcode Fuzzy Hash: 1c199de8f72f27c5cded275929a5da253b536c9c7586918782628200b7368b40
              • Instruction Fuzzy Hash: 1AE1E2F3A086009FE300AE69EC8576AB7E5EF94720F1A493DEAC4C3744E63598158797
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: efg`
              • API String ID: 0-115929991
              • Opcode ID: c30ad75b30a5c567b35b637067ece4a4f2f60f1dde51f784ef5788e9774544fd
              • Instruction ID: 377f5d6291b9ddc8d53696ffc4eafa365f26143d5484248c0cde59594ff5b976
              • Opcode Fuzzy Hash: c30ad75b30a5c567b35b637067ece4a4f2f60f1dde51f784ef5788e9774544fd
              • Instruction Fuzzy Hash: 80C12471900215CFCB28CF68EC92ABB73B4FF49318F195158E956B7292F734A945C7A0
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID: _^]\
              • API String ID: 2994545307-3116432788
              • Opcode ID: eb7b43fb4e854e24130688f28f17468acf3192ce2b3cdfce21a79f93136331cb
              • Instruction ID: d28564550494d6d50aaac2fff7f55460f3bf295ce661e30b4e25b559d4ee0ef4
              • Opcode Fuzzy Hash: eb7b43fb4e854e24130688f28f17468acf3192ce2b3cdfce21a79f93136331cb
              • Instruction Fuzzy Hash: 4981AD352083418BC718DF1CD890A2AB7F2FF99754F05A5ACE989AB365D731EC51CB82
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: ,
              • API String ID: 0-3772416878
              • Opcode ID: 8b04fab32ec0b8383da590e4bd15150657e1dcf751765b097a457d664c512576
              • Instruction ID: d611ec7cb4e26a3642ff6e87250c22554a08fb4f6164ea3c0b08e99b69743c03
              • Opcode Fuzzy Hash: 8b04fab32ec0b8383da590e4bd15150657e1dcf751765b097a457d664c512576
              • Instruction Fuzzy Hash: 9DB148701083819FD321CF68C89465BFFE0AFA9708F448E2DE5D997342D671E918CBA6
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID: 5|iL
              • API String ID: 2994545307-1880071150
              • Opcode ID: 0a43f8c81a63b8acc659770154f2ce5fc5747d149df4951edca50fa0442393ba
              • Instruction ID: 17909b09808c5099915c6fb9277bc02cfb698fb2d8c143eda0b7db1e92e9a00f
              • Opcode Fuzzy Hash: 0a43f8c81a63b8acc659770154f2ce5fc5747d149df4951edca50fa0442393ba
              • Instruction Fuzzy Hash: 04710A32B483108FC7148F299C80667B7B6EBC5364F15A66CE995FB265C371DC828BD1
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID: efg`
              • API String ID: 2994545307-115929991
              • Opcode ID: 0e18b220f3d375be1b04d33828698356e20ca3a7d00553381fd757fe00d6b71e
              • Instruction ID: 9f24d5f898e2acbe9797bdc6a0ab405e98a65343425d06531148c2a2654ab608
              • Opcode Fuzzy Hash: 0e18b220f3d375be1b04d33828698356e20ca3a7d00553381fd757fe00d6b71e
              • Instruction Fuzzy Hash: 57512772A043504BD720EB619C867AF7AA3AFD0304F196828E98D77352DF306A06C7D3
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: jA~_
              • API String ID: 0-1324300177
              • Opcode ID: c739209aa920682ba37ee5c00bd2cf78334728c505c7ee444a0e2cce1248f737
              • Instruction ID: d6f95add69c52098d1d816ee8396e7eb2ec77c5d50f57d553fa7151daf7fbc82
              • Opcode Fuzzy Hash: c739209aa920682ba37ee5c00bd2cf78334728c505c7ee444a0e2cce1248f737
              • Instruction Fuzzy Hash: BD4138F3E082045BE30C9A2CEC597B3BACAD7D4720F1A823EEA45D77C4F97619058295
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: mmo
              • API String ID: 0-2826062500
              • Opcode ID: 74a25d17a427e975090f488ef07b3d612a79ee15df0703cc2b3bf007dd3d5c7f
              • Instruction ID: ebdc019680bedf9a44466324cc0e98341f286feb7eabd7b1ce27fbab30be763f
              • Opcode Fuzzy Hash: 74a25d17a427e975090f488ef07b3d612a79ee15df0703cc2b3bf007dd3d5c7f
              • Instruction Fuzzy Hash: 1F4128F37082045BE314AE29EC8577FF7D9EB94320F1A863DEAC5C3740E939A8158656
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID: D
              • API String ID: 0-2746444292
              • Opcode ID: 8dabe60ac504a56925d4d20c84bc4e0c8c3ba50412e13717db14213367105ab6
              • Instruction ID: 8ddfd35a8bad07c376738f5e3fa92e80e864487d1f368adb33d21965f57b99ed
              • Opcode Fuzzy Hash: 8dabe60ac504a56925d4d20c84bc4e0c8c3ba50412e13717db14213367105ab6
              • Instruction Fuzzy Hash: 965100B05493818AE7208F12C86575BBBF1FF91748F20980CE6D92B3A4D7B59849CF87
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a9e56e85d3793a0f4e761ff8f8362607d8bf849bd197acd1c0af18c6b7dbfe6d
              • Instruction ID: a81b93cccdc9443b8b4b6b0182edd6b18dd6a9c4b56410f5817f700b09a4a239
              • Opcode Fuzzy Hash: a9e56e85d3793a0f4e761ff8f8362607d8bf849bd197acd1c0af18c6b7dbfe6d
              • Instruction Fuzzy Hash: A242047160C3158BC724DF28E8842AAB7E2FFC4308F25A92DD9D6A7385D734E855CB42
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bbf16c94d4b14380c07e174377fb8d98b1e35c67609cf3a53e43700734b5d4b5
              • Instruction ID: 9fcea55cbbc78f8088bdd9e285ada0a8edaaae1da709d096eb8be15e0d8037f9
              • Opcode Fuzzy Hash: bbf16c94d4b14380c07e174377fb8d98b1e35c67609cf3a53e43700734b5d4b5
              • Instruction Fuzzy Hash: A852D8B090CB889FEB34CB34C49C7A7BFE1EB91318F14681DD5D616782C2B9A985C751
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d399a6aeb5d2710f33bb9fa76c9c241e8b19409a1bbea50a3c8d594f13876128
              • Instruction ID: 6b4b7feec443e71a1789ef001c9e247f48d37c44090401725472c4386422fc00
              • Opcode Fuzzy Hash: d399a6aeb5d2710f33bb9fa76c9c241e8b19409a1bbea50a3c8d594f13876128
              • Instruction Fuzzy Hash: 0052C1315083458BCB15CF29C084AEABFE1FF88318F199A6DE8D96B351D774E949CB81
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 01ab492a140ffb345a3f4b495ae6f795da4c2eb4a85d8dcac45977b8f50b7863
              • Instruction ID: 22af86db3c1f42d26be40be9f849f32830a8c9087c934347e8f856ab2c9d371b
              • Opcode Fuzzy Hash: 01ab492a140ffb345a3f4b495ae6f795da4c2eb4a85d8dcac45977b8f50b7863
              • Instruction Fuzzy Hash: F44234B1914B108FC328CF29C594966BBF2BF85710B645A2ED697A7F90D736F940CB10
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 21a1d6e3d5ba60b3bd1d97c05962dbaf1adc3ce7802fd18f61ea84a3f4fb9068
              • Instruction ID: 19936ff30543274bee2f6129e7e44e2f5cc243ef8ba5104409657627af612a93
              • Opcode Fuzzy Hash: 21a1d6e3d5ba60b3bd1d97c05962dbaf1adc3ce7802fd18f61ea84a3f4fb9068
              • Instruction Fuzzy Hash: 33F19A712087419FC728CF28C885A6BBFE2EF94304F44992DE4D997792E731E944CB96
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 86e445ca3b438742181d2dbf2e8c100afcf3d334dfe90873b41fa4f189d33e65
              • Instruction ID: 9da0a8abc337f8cb26799520c1bae3e077b5fd17429393a035a34722ddd9b555
              • Opcode Fuzzy Hash: 86e445ca3b438742181d2dbf2e8c100afcf3d334dfe90873b41fa4f189d33e65
              • Instruction Fuzzy Hash: 55C18CB2A083418FC364CF78C89679BBBE1BF84318F088A2DD5DAD7341E678A545CB45
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5ba1380cb9152e7cdc994e456a920f27018b5a696dcda6c5b24acc876655b729
              • Instruction ID: fa0de87755476df21869175245b346e1d3eb3e5e8e01a1dd42f677cb894ae8ae
              • Opcode Fuzzy Hash: 5ba1380cb9152e7cdc994e456a920f27018b5a696dcda6c5b24acc876655b729
              • Instruction Fuzzy Hash: 92B12872D086D08FDB11CA7CC9843997FA26B97360F1DC395D9A5AB3CAC6354806C3A2
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 82118adb06de2fbc9cd38bb554e5e06f3087909789dbba6e9543369a05c84f21
              • Instruction ID: d171b290da4c6559c9bdc2fb529e898e10aaffe298bae4ef6c54f8e25e55b61a
              • Opcode Fuzzy Hash: 82118adb06de2fbc9cd38bb554e5e06f3087909789dbba6e9543369a05c84f21
              • Instruction Fuzzy Hash: 8681F27160C3418FD718DF68E850A2BB7E2EF89314F08987CE99AE7291E674DC45C792
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4f6072e1bed2d6b44526a78fad9467e880b81cfc41aba3bed047edfeb60b1bd4
              • Instruction ID: f0b813bf27a085d45c91a9f1a69da96483baa9e3151930cfa11a9c7dc7e0f067
              • Opcode Fuzzy Hash: 4f6072e1bed2d6b44526a78fad9467e880b81cfc41aba3bed047edfeb60b1bd4
              • Instruction Fuzzy Hash: 23A1233164C3904FC325CF28D49063ABBE2AFD6358F29C66DE4E59B392D634AC41CB52
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9d7599ad94e0edc555163e84f2b64188d765e4002c3c5e6bd98544d4921d658a
              • Instruction ID: 430704cd8fd01207989e516546f4fdf3fa3a6ad03d83dd6e655a64a2600172c6
              • Opcode Fuzzy Hash: 9d7599ad94e0edc555163e84f2b64188d765e4002c3c5e6bd98544d4921d658a
              • Instruction Fuzzy Hash: DE913C32E042614FC726CE28D85036ABBD1ABD5724F19C27DE8B9AB392D674CC46C3C1
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: f9ec390e38bfad25af3e826575af42d8ec77456e83127df17a37f1ad73a92a10
              • Instruction ID: 05944e08c4bc3ed386ffc26f99f46fa60b48d4c76ca8b7af6fc9239f2bea0407
              • Opcode Fuzzy Hash: f9ec390e38bfad25af3e826575af42d8ec77456e83127df17a37f1ad73a92a10
              • Instruction Fuzzy Hash: F0710335608341DBDB24DB28D850A2FB7E2FFD8714F19E92CE589EB264E7309851C742
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 39fd33168efe3bcd3b98e263152c7971aa97d4fedb0b190e03436ec8d3badd9e
              • Instruction ID: 29348db8ffb09a3f4cd2e1363327689efadcd5edcf5ad75c3e558c07e6e5afed
              • Opcode Fuzzy Hash: 39fd33168efe3bcd3b98e263152c7971aa97d4fedb0b190e03436ec8d3badd9e
              • Instruction Fuzzy Hash: B6716DB3B954904BCB1C897D6C122E9AA874BD237473ED37ADC75F73E1D9298D054240
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: daedd777f64b04972b3060de65de1daef88e1f7c66fd57610b903c5406cb70d6
              • Instruction ID: 779960acb6121418ae9acd2604bdc0d275d6db7e6f9349214e11c9f4544591ff
              • Opcode Fuzzy Hash: daedd777f64b04972b3060de65de1daef88e1f7c66fd57610b903c5406cb70d6
              • Instruction Fuzzy Hash: 297106F3A086008FF304AE2DDC8177AB7E6EF94310F1A893DDAC4C7784DA7998558646
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bc0af53631d5015b9857a7b510d6fb1167cc1e5916a193496ba68d716629d1bf
              • Instruction ID: ab17d96649fcb56753e3889204addafd007bf4724d0a06b3b632cfb38b00a265
              • Opcode Fuzzy Hash: bc0af53631d5015b9857a7b510d6fb1167cc1e5916a193496ba68d716629d1bf
              • Instruction Fuzzy Hash: 35716CF3E182105BE3045E3CDD947B7BBD5EB98360F2A853EEA84D7748E53998024396
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 94de03b9a85b20ee7e25aac868cd1cdb3acf4d4b8d7157f3d1a86b82af1c3e61
              • Instruction ID: 2c6f1d54d62f6228363011dcfc4084f0ab987d80c35c613701f37c07e30aebc6
              • Opcode Fuzzy Hash: 94de03b9a85b20ee7e25aac868cd1cdb3acf4d4b8d7157f3d1a86b82af1c3e61
              • Instruction Fuzzy Hash: E36106F3E085209BE3006A2CDD4476ABBD6EBD4320F1B863DEED893784E539590587C2
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4cf48ffc5dbf76bbad2d1903073c5bb2f3258699595fa9719451ba2461e91d78
              • Instruction ID: e32b91b575e21d7fb0615c825a771759686037a407f6732ff87115f2db7cb34e
              • Opcode Fuzzy Hash: 4cf48ffc5dbf76bbad2d1903073c5bb2f3258699595fa9719451ba2461e91d78
              • Instruction Fuzzy Hash: A46116F3B082045FE7096D7DDC8576AB7DAEBD8320F2A463DDA84C3384E97958058692
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: b8419c14db64e5e4099f0e1c9cc6c37ecd4bca5bcd3926b1a0ff0815880e5d63
              • Instruction ID: a8b80cf2ee0e1f175fc172558fe6b11f9291dd57e11b540b39817b742a11bc22
              • Opcode Fuzzy Hash: b8419c14db64e5e4099f0e1c9cc6c37ecd4bca5bcd3926b1a0ff0815880e5d63
              • Instruction Fuzzy Hash: 54514732A483108BD320DF29AC4066BB7A2EFD5764F29E62CD9D5B7355E3319C828781
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 44a42c4f60d8ae61d1d039d146cbf70fc64169243dc51a748f60dfae04f2015b
              • Instruction ID: e6781baa677abfab200be430eb4a6c503fdd0491809fb5f4fe12b7c4fc7b13d8
              • Opcode Fuzzy Hash: 44a42c4f60d8ae61d1d039d146cbf70fc64169243dc51a748f60dfae04f2015b
              • Instruction Fuzzy Hash: 96715BB3E1112547F3944D24DC583A27682ABA5320F2F42788E9CAB3C5D93F5D4A53C4
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 24e9c30039f59c7956cfefc276f63c0e2c2847ff724a5105235bb53487b4297c
              • Instruction ID: ae566f91e434e663a4a51368ed6d04324746ff3383d08917611a6bad5961cf14
              • Opcode Fuzzy Hash: 24e9c30039f59c7956cfefc276f63c0e2c2847ff724a5105235bb53487b4297c
              • Instruction Fuzzy Hash: 73517A37A0A9D04FC7248D3C1C112E95A530BEA334B3E576BECB4BB3E1C5668D0A9390
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fb93b99be6f86b36ff1d06472ce7ac0a94512138c376b9445d6efd9b3a12defb
              • Instruction ID: 0a3ac487cba31032fb88f88cd6198d736070b33dd83151143d6e0224e5dd7567
              • Opcode Fuzzy Hash: fb93b99be6f86b36ff1d06472ce7ac0a94512138c376b9445d6efd9b3a12defb
              • Instruction Fuzzy Hash: 615123F3E087284BE304BA6DDC8536AB6D5EB54320F2B453CEB8597780F979580187C6
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 02b14f4cb1dc7f7d77bb7720dda87e8b8f455269b68710110d1e8d76b95887b2
              • Instruction ID: fa0e0b21e463c8a34036ebc0d8ae327b6b25970b2782ff9c0619e04077c634b6
              • Opcode Fuzzy Hash: 02b14f4cb1dc7f7d77bb7720dda87e8b8f455269b68710110d1e8d76b95887b2
              • Instruction Fuzzy Hash: CE51F3F3A181009FE704AE29DC4577AB7E6EFD4320F26863DDBD483784DA3858448696
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bbd2adcb8e7b03a2462494b69697df4f6a0fa1ac647ae59fba19fc72d205ac19
              • Instruction ID: a2f8e2d84ccb041ece526b5a5f5d57afa27534ed1c551af7426daa46c455fbf1
              • Opcode Fuzzy Hash: bbd2adcb8e7b03a2462494b69697df4f6a0fa1ac647ae59fba19fc72d205ac19
              • Instruction Fuzzy Hash: 93415BB3E082149FF7146E79EC8577A77D9EB84320F1A463DEA84CB784F57A5C018282
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ec4f35c18a744dc0badb269d1405f78b6dc7789ffa19e1566ae0e333f6ad5e50
              • Instruction ID: 292b83036f152d80b41fa92ca36e9ca0b037b46d0ff176241669f8e631ff093b
              • Opcode Fuzzy Hash: ec4f35c18a744dc0badb269d1405f78b6dc7789ffa19e1566ae0e333f6ad5e50
              • Instruction Fuzzy Hash: 21413631B09344AFD314DF69AC82B5B7BE8EB8A318F04987DF949D3291D6349849C752
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 17c4ebac096dc4801c75c2a8d4d2968d16f16cdca899a32ccbf8c2cea1e1667a
              • Instruction ID: c9d45800fb29abb98d9018d93fd3dd30c4f91e779716d2a17fac6472d6e0d29c
              • Opcode Fuzzy Hash: 17c4ebac096dc4801c75c2a8d4d2968d16f16cdca899a32ccbf8c2cea1e1667a
              • Instruction Fuzzy Hash: B141A1F3A083049BE714BE29DCC576AB7E5EBD8310F16853CDBC487784EA7568048687
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 65caa3a383b369f6c914635bb7d7b7102519f6658dd6a74cbe6bc506dd94bc19
              • Instruction ID: cd4e275079b9bd436a68a95b1cb62d58d53567661433201beb05a28fe8ca5cc0
              • Opcode Fuzzy Hash: 65caa3a383b369f6c914635bb7d7b7102519f6658dd6a74cbe6bc506dd94bc19
              • Instruction Fuzzy Hash: EF4119F3E051009FE3006E29DC85B6AB796EBD5324F2F853DDAC893784E9395C058792
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 23ea625c9db1be0315bbb620a322891fcf28e3ed3ffdd13671137fab19214d32
              • Instruction ID: e80cb53150e1c3307131e2544a090b7eab845607d950fcd430b1e9df913b442b
              • Opcode Fuzzy Hash: 23ea625c9db1be0315bbb620a322891fcf28e3ed3ffdd13671137fab19214d32
              • Instruction Fuzzy Hash: B0817EB458A3848FC379CF15DA9D68BBBE4BBE9304F50991D898C6B350CBB01449CF96
              Memory Dump Source
              • Source File: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 183cabbb89790ec3d6ac9ac051da932962cd5022320c3c4251f7ef47c0dd02e4
              • Instruction ID: bec3f39beeb8b1f73c408bb04b1ca4e81f95460ee25d4e46b1289c27c884d381
              • Opcode Fuzzy Hash: 183cabbb89790ec3d6ac9ac051da932962cd5022320c3c4251f7ef47c0dd02e4
              • Instruction Fuzzy Hash: 6731C4B36086049FE3056E29DC45B7FBBE6EBD4720F0A492DE9C0C7704EA3598428793
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e1fd47e560d0badb8f74274cecbbd9133b49827162a38d0a2691935eab925e55
              • Instruction ID: aa054e07d37a6be18b5d065575b9c048966480998f73c9bf2ff8bce7b9b55893
              • Opcode Fuzzy Hash: e1fd47e560d0badb8f74274cecbbd9133b49827162a38d0a2691935eab925e55
              • Instruction Fuzzy Hash: CD11E737B256214BF364CE7AECD86576752FBC9314B1A013CEF85FB202C622E845D191
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a37e930d28a970ee30c6ba7cce94fe542c710425b5aa9c9eaa3b0aa9d1b10922
              • Instruction ID: 01a0474f6809b6cdf82d8fe9b64d10cde15dba69bd0742d1c83d393b25a86ef4
              • Opcode Fuzzy Hash: a37e930d28a970ee30c6ba7cce94fe542c710425b5aa9c9eaa3b0aa9d1b10922
              • Instruction Fuzzy Hash: 2EF0A77161C3815FD728CB25D89563FBBB1EB87614F10551CE3C6E3292EB61D8468B09
              Memory Dump Source
              • Source File: 00000005.00000002.1345435651.0000000000E31000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
              • Associated: 00000005.00000002.1345418655.0000000000E30000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345435651.0000000000E75000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345483018.0000000000E87000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000000E89000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001019000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.00000000010F3000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.000000000111F000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345498185.0000000001137000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345726488.0000000001138000.00000080.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345829724.00000000012D8000.00000040.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000005.00000002.1345858295.00000000012D9000.00000080.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_e30000_file.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5483426b551666e9571fc8dee49318e4b93d980574afb4e4f73a4b978d69e9d6
              • Instruction ID: 51a88377f5969e6c852d1403666853713d632066a1cbec0f3b9fd843aea48dca
              • Opcode Fuzzy Hash: 5483426b551666e9571fc8dee49318e4b93d980574afb4e4f73a4b978d69e9d6
              • Instruction Fuzzy Hash: CEB09250A042087F11289D0A8C45D7BB6BE96CB640B106008A408A3215D650EC0882FA