Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1562492
MD5:62999b3ca5005da29eb4d0853c5fa789
SHA1:8512b3a7ac2f37b19b0a75586859d724b857b6c6
SHA256:0fd8b2570b5b38cb65325116d2ea01d414876f903cf72c26a1733a1d6f35bd22
Tags:exeHealeruser-Bitsight
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Hides threads from debuggers
Machine Learning detection for sample
Modifies windows update settings
PE file contains section with special chars
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Entry point lies outside standard sections
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 7272 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 62999B3CA5005DA29EB4D0853C5FA789)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeReversingLabs: Detection: 42%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: file.exeJoe Sandbox ML: detected
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: file.exe, 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmp, file.exe, 00000005.00000003.1279993226.0000000004BC0000.00000004.00001000.00020000.00000000.sdmp

System Summary

barindex
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0113E19A5_2_0113E19A
Source: file.exe, 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000005.00000002.1415544313.000000000096E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
Source: file.exeBinary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: classification engineClassification label: mal100.evad.winEXE@1/1@0/0
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.logJump to behavior
Source: C:\Users\user\Desktop\file.exeMutant created: NULL
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeReversingLabs: Detection: 42%
Source: file.exeString found in binary or memory: 3The file %s is missing. Please, re-install this application
Source: file.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: file.exeStatic file information: File size 2813440 > 1048576
Source: file.exeStatic PE information: Raw size of vfzorowi is bigger than: 0x100000 < 0x2a8e00
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: file.exe, 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmp, file.exe, 00000005.00000003.1279993226.0000000004BC0000.00000004.00001000.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 5.2.file.exe.fb0000.0.unpack :EW;.rsrc:W;.idata :W;vfzorowi:EW;ahyfouxz:EW;.taggant:EW; vs :ER;.rsrc:W;
Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
Source: file.exeStatic PE information: real checksum: 0x2b673e should be: 0x2b4d1b
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: file.exeStatic PE information: section name: vfzorowi
Source: file.exeStatic PE information: section name: ahyfouxz
Source: file.exeStatic PE information: section name: .taggant
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0114B303 push edx; mov dword ptr [esp], ecx5_2_0114E3B4
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0114B303 push esi; mov dword ptr [esp], ecx5_2_0114F67D
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FBE6F5 push eax; mov dword ptr [esp], ebp5_2_00FBF5AB
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0113D7A8 push eax; mov dword ptr [esp], 7F5EA5DEh5_2_0113D7BE
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0113D7A8 push 5AB1CBC9h; mov dword ptr [esp], ebx5_2_0113D7FF
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0113D7A8 push ebx; mov dword ptr [esp], 7FDFF500h5_2_0113D823
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0113D7A8 push 17F3F8EBh; mov dword ptr [esp], edx5_2_0113D8DE
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0113D635 push ecx; mov dword ptr [esp], ebx5_2_0113D675
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0113D635 push ecx; mov dword ptr [esp], edi5_2_0113D6CF
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0114A6D2 push ebp; mov dword ptr [esp], eax5_2_0114A6EB
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_01141B07 push ecx; ret 5_2_01141C49
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FC10F8 push esi; mov dword ptr [esp], ecx5_2_00FC1B0E
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0114A100 push ebp; mov dword ptr [esp], 7D7B1445h5_2_0114A14A
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FC10DB push 5286BDE7h; mov dword ptr [esp], ebp5_2_00FC3B34
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_01146133 push ecx; mov dword ptr [esp], eax5_2_01146143
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FBF0CE push edi; mov dword ptr [esp], edx5_2_00FBF0EF
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00FC10A1 push 7DC382D4h; mov dword ptr [esp], esi5_2_00FC10A7
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0114B17F push 42AB8620h; mov dword ptr [esp], eax5_2_0114C348
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0114B17F push ecx; mov dword ptr [esp], edx5_2_0114D0C8
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0114A16A push esi; mov dword ptr [esp], 37FA07B9h5_2_0114A16B
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0114A16A push 00EEC0DAh; mov dword ptr [esp], eax5_2_0114A178
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0113E19A push 29A32291h; mov dword ptr [esp], edx5_2_0113E1AB
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0113E19A push ebx; mov dword ptr [esp], ecx5_2_0113E1DF
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0113E19A push ebx; mov dword ptr [esp], eax5_2_0113E2B2
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0113E19A push ebp; mov dword ptr [esp], esp5_2_0113E2CC
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_011D818F push ecx; mov dword ptr [esp], eax5_2_011D8227
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_011D818F push ebx; mov dword ptr [esp], ecx5_2_011D8242
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0114A186 push 384B9DD1h; mov dword ptr [esp], ecx5_2_0114FCD5
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0113E187 push 29A32291h; mov dword ptr [esp], edx5_2_0113E1AB
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0113E187 push ebx; mov dword ptr [esp], ecx5_2_0113E1DF
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0113E187 push ebx; mov dword ptr [esp], eax5_2_0113E2B2
Source: file.exeStatic PE information: section name: entropy: 7.793247849511672

Boot Survival

barindex
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FBDD8B second address: FBDDA4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F18B8B86245h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FBDDA4 second address: FBDDB7 instructions: 0x00000000 rdtsc 0x00000002 js 00007F18B9954E46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: FBDDB7 second address: FBDDC1 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F18B8B86236h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113D498 second address: 113D4A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F18B9954E4Bh 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113D64D second address: 113D653 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113D653 second address: 113D65C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113D65C second address: 113D666 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F18B8B86236h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113D666 second address: 113D66A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113D903 second address: 113D910 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 jbe 00007F18B8B86236h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 114156A second address: FBDD8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 add dword ptr [esp], 0C146347h 0x0000000c mov dl, ah 0x0000000e push dword ptr [ebp+122D1611h] 0x00000014 mov dword ptr [ebp+122D2220h], esi 0x0000001a add edi, dword ptr [ebp+122D3C5Fh] 0x00000020 call dword ptr [ebp+122D207Ch] 0x00000026 pushad 0x00000027 pushad 0x00000028 js 00007F18B9954E48h 0x0000002e sbb edx, 17B4E6AFh 0x00000034 popad 0x00000035 xor eax, eax 0x00000037 mov dword ptr [ebp+122D1CF1h], ecx 0x0000003d mov edx, dword ptr [esp+28h] 0x00000041 pushad 0x00000042 movzx ebx, di 0x00000045 xor bh, 0000006Ah 0x00000048 popad 0x00000049 mov dword ptr [ebp+122D3BFBh], eax 0x0000004f jno 00007F18B9954E4Ch 0x00000055 mov esi, 0000003Ch 0x0000005a jmp 00007F18B9954E54h 0x0000005f add esi, dword ptr [esp+24h] 0x00000063 jno 00007F18B9954E47h 0x00000069 sub dword ptr [ebp+122D1CF1h], ecx 0x0000006f lodsw 0x00000071 jo 00007F18B9954E5Fh 0x00000077 pushad 0x00000078 jmp 00007F18B9954E53h 0x0000007d mov ax, 2DC1h 0x00000081 popad 0x00000082 add eax, dword ptr [esp+24h] 0x00000086 xor dword ptr [ebp+122D1CF1h], edx 0x0000008c mov dword ptr [ebp+122D1EEFh], ecx 0x00000092 mov ebx, dword ptr [esp+24h] 0x00000096 jmp 00007F18B9954E4Fh 0x0000009b nop 0x0000009c push eax 0x0000009d push edx 0x0000009e jmp 00007F18B9954E50h 0x000000a3 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11415B8 second address: 1141616 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B8B86244h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F18B8B8623Bh 0x0000000e popad 0x0000000f push eax 0x00000010 jno 00007F18B8B86244h 0x00000016 nop 0x00000017 mov esi, dword ptr [ebp+122D3C8Fh] 0x0000001d cld 0x0000001e push 00000000h 0x00000020 and dh, FFFFFF90h 0x00000023 push D91468BCh 0x00000028 pushad 0x00000029 jmp 00007F18B8B8623Ah 0x0000002e jc 00007F18B8B8623Ch 0x00000034 push eax 0x00000035 push edx 0x00000036 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1141616 second address: 11416B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 add dword ptr [esp], 26EB97C4h 0x0000000c mov dword ptr [ebp+122D2184h], ecx 0x00000012 mov dx, si 0x00000015 push 00000003h 0x00000017 push 00000000h 0x00000019 push edi 0x0000001a call 00007F18B9954E48h 0x0000001f pop edi 0x00000020 mov dword ptr [esp+04h], edi 0x00000024 add dword ptr [esp+04h], 00000016h 0x0000002c inc edi 0x0000002d push edi 0x0000002e ret 0x0000002f pop edi 0x00000030 ret 0x00000031 or esi, 5C18251Bh 0x00000037 push 00000000h 0x00000039 mov ecx, dword ptr [ebp+122D21BCh] 0x0000003f push 00000003h 0x00000041 or dword ptr [ebp+122D1E19h], edx 0x00000047 push 6425324Eh 0x0000004c jmp 00007F18B9954E54h 0x00000051 add dword ptr [esp], 5BDACDB2h 0x00000058 jo 00007F18B9954E4Ch 0x0000005e lea ebx, dword ptr [ebp+124574B5h] 0x00000064 mov esi, ebx 0x00000066 push eax 0x00000067 pushad 0x00000068 pushad 0x00000069 jmp 00007F18B9954E52h 0x0000006e pushad 0x0000006f popad 0x00000070 popad 0x00000071 push eax 0x00000072 push edx 0x00000073 push eax 0x00000074 push edx 0x00000075 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11416B1 second address: 11416B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1141704 second address: 114172D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 js 00007F18B9954E59h 0x0000000b jmp 00007F18B9954E53h 0x00000010 popad 0x00000011 push eax 0x00000012 jbe 00007F18B9954E4Eh 0x00000018 push edi 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 114172D second address: 11417DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 nop 0x00000006 add edi, 46AB6E99h 0x0000000c push 00000000h 0x0000000e push 00000000h 0x00000010 push eax 0x00000011 call 00007F18B8B86238h 0x00000016 pop eax 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b add dword ptr [esp+04h], 00000014h 0x00000023 inc eax 0x00000024 push eax 0x00000025 ret 0x00000026 pop eax 0x00000027 ret 0x00000028 mov dl, ch 0x0000002a and dh, 00000041h 0x0000002d push 6C4D9A8Fh 0x00000032 pushad 0x00000033 jmp 00007F18B8B8623Fh 0x00000038 jmp 00007F18B8B8623Ch 0x0000003d popad 0x0000003e xor dword ptr [esp], 6C4D9A0Fh 0x00000045 mov esi, dword ptr [ebp+122D3BE3h] 0x0000004b push 00000003h 0x0000004d jmp 00007F18B8B86241h 0x00000052 add edx, 23189316h 0x00000058 push 00000000h 0x0000005a mov dword ptr [ebp+122D2A76h], ebx 0x00000060 push 00000003h 0x00000062 add dword ptr [ebp+122D2A76h], edx 0x00000068 mov edx, dword ptr [ebp+122D39FFh] 0x0000006e push E8EFCBB0h 0x00000073 push eax 0x00000074 push edx 0x00000075 jo 00007F18B8B8624Eh 0x0000007b jmp 00007F18B8B86248h 0x00000080 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11417DF second address: 11417E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11418F6 second address: 1141905 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a push edx 0x0000000b pop edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1141905 second address: 114191D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F18B9954E54h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 114191D second address: 114199F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B8B8623Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f jmp 00007F18B8B8623Bh 0x00000014 mov eax, dword ptr [eax] 0x00000016 pushad 0x00000017 jmp 00007F18B8B86240h 0x0000001c push ebx 0x0000001d jmp 00007F18B8B86249h 0x00000022 pop ebx 0x00000023 popad 0x00000024 mov dword ptr [esp+04h], eax 0x00000028 pushad 0x00000029 jmp 00007F18B8B86241h 0x0000002e push eax 0x0000002f push edx 0x00000030 jmp 00007F18B8B86249h 0x00000035 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 114199F second address: 1141A33 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B9954E54h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a pop eax 0x0000000b push 00000000h 0x0000000d push edi 0x0000000e call 00007F18B9954E48h 0x00000013 pop edi 0x00000014 mov dword ptr [esp+04h], edi 0x00000018 add dword ptr [esp+04h], 0000001Ch 0x00000020 inc edi 0x00000021 push edi 0x00000022 ret 0x00000023 pop edi 0x00000024 ret 0x00000025 adc edi, 7F19AE72h 0x0000002b sub dword ptr [ebp+122D20C9h], edx 0x00000031 push 00000003h 0x00000033 movzx edi, cx 0x00000036 push 00000000h 0x00000038 jmp 00007F18B9954E4Eh 0x0000003d push 00000003h 0x0000003f push 00000000h 0x00000041 push ebx 0x00000042 call 00007F18B9954E48h 0x00000047 pop ebx 0x00000048 mov dword ptr [esp+04h], ebx 0x0000004c add dword ptr [esp+04h], 00000017h 0x00000054 inc ebx 0x00000055 push ebx 0x00000056 ret 0x00000057 pop ebx 0x00000058 ret 0x00000059 sub dword ptr [ebp+122D2104h], edx 0x0000005f call 00007F18B9954E49h 0x00000064 push eax 0x00000065 push edx 0x00000066 push edi 0x00000067 push eax 0x00000068 push edx 0x00000069 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1141A33 second address: 1141A38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1141A38 second address: 1141A4F instructions: 0x00000000 rdtsc 0x00000002 jng 00007F18B9954E4Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c pushad 0x0000000d push edi 0x0000000e pop edi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1141A4F second address: 1141AE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F18B8B8623Bh 0x0000000a popad 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f pushad 0x00000010 push esi 0x00000011 pushad 0x00000012 popad 0x00000013 pop esi 0x00000014 push esi 0x00000015 jmp 00007F18B8B8623Ah 0x0000001a pop esi 0x0000001b popad 0x0000001c mov eax, dword ptr [eax] 0x0000001e jp 00007F18B8B86240h 0x00000024 pushad 0x00000025 jp 00007F18B8B86236h 0x0000002b pushad 0x0000002c popad 0x0000002d popad 0x0000002e mov dword ptr [esp+04h], eax 0x00000032 jmp 00007F18B8B86248h 0x00000037 pop eax 0x00000038 je 00007F18B8B8623Ch 0x0000003e mov dword ptr [ebp+122D2284h], edi 0x00000044 lea ebx, dword ptr [ebp+124574C9h] 0x0000004a push 00000000h 0x0000004c push eax 0x0000004d call 00007F18B8B86238h 0x00000052 pop eax 0x00000053 mov dword ptr [esp+04h], eax 0x00000057 add dword ptr [esp+04h], 0000001Ah 0x0000005f inc eax 0x00000060 push eax 0x00000061 ret 0x00000062 pop eax 0x00000063 ret 0x00000064 movzx edx, bx 0x00000067 push eax 0x00000068 push ebx 0x00000069 push eax 0x0000006a push edx 0x0000006b pushad 0x0000006c popad 0x0000006d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 115338B second address: 115338F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1160C04 second address: 1160C08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1160D5E second address: 1160D62 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1160D62 second address: 1160D66 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1160D66 second address: 1160D8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F18B9954E57h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jno 00007F18B9954E46h 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1160D8E second address: 1160D92 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1160D92 second address: 1160D98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1161043 second address: 1161090 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push edx 0x00000006 jmp 00007F18B8B86243h 0x0000000b pop edx 0x0000000c popad 0x0000000d pushad 0x0000000e pushad 0x0000000f jbe 00007F18B8B86236h 0x00000015 jmp 00007F18B8B8623Ah 0x0000001a jmp 00007F18B8B8623Fh 0x0000001f popad 0x00000020 jmp 00007F18B8B8623Bh 0x00000025 push edx 0x00000026 push esi 0x00000027 pop esi 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1161325 second address: 1161348 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F18B9954E4Bh 0x0000000b jmp 00007F18B9954E52h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1161348 second address: 116135C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B8B86240h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116135C second address: 1161370 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F18B9954E4Dh 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11614F6 second address: 11614FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11617A2 second address: 11617B0 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F18B9954E46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11617B0 second address: 11617B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11617B4 second address: 11617B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11617B8 second address: 11617BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 115864F second address: 1158666 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F18B9954E51h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1158666 second address: 115866B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 115866B second address: 1158675 instructions: 0x00000000 rdtsc 0x00000002 je 00007F18B9954E4Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1161EA5 second address: 1161EAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11623D8 second address: 11623DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11623DC second address: 11623ED instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jbe 00007F18B8B86236h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1162657 second address: 1162675 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F18B9954E58h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1162675 second address: 1162691 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F18B8B86236h 0x0000000a popad 0x0000000b jng 00007F18B8B8623Eh 0x00000011 push ebx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11627BD second address: 11627D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F18B9954E4Fh 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11627D2 second address: 11627D6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1162A2B second address: 1162A31 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1132147 second address: 113215D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F18B8B8623Dh 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113215D second address: 1132161 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116872F second address: 1168742 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F18B8B86238h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1168742 second address: 1168746 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1168746 second address: 116874C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1168B1A second address: 1168B1E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1168B1E second address: 1168B24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1168B24 second address: 1168B2E instructions: 0x00000000 rdtsc 0x00000002 jo 00007F18B9954E4Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116E924 second address: 116E928 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116E928 second address: 116E93B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 pushad 0x0000000a popad 0x0000000b push edi 0x0000000c pop edi 0x0000000d pop esi 0x0000000e pop edi 0x0000000f push ebx 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116E93B second address: 116E941 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116EC10 second address: 116EC4D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B9954E50h 0x00000007 pushad 0x00000008 jmp 00007F18B9954E57h 0x0000000d jmp 00007F18B9954E51h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116ED86 second address: 116ED8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116ED8E second address: 116ED94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116ED94 second address: 116EDD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 pushad 0x00000007 popad 0x00000008 jmp 00007F18B8B86241h 0x0000000d pop eax 0x0000000e pushad 0x0000000f jmp 00007F18B8B86249h 0x00000014 js 00007F18B8B86236h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116EF1D second address: 116EF33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F18B9954E4Bh 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11709BB second address: 11709C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11709C1 second address: 11709C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1170B10 second address: 1170B15 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1170C56 second address: 1170C89 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F18B9954E58h 0x00000008 jmp 00007F18B9954E4Eh 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1170C89 second address: 1170C8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1170C8D second address: 1170C91 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1170C91 second address: 1170C97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11712CE second address: 11712D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11712D2 second address: 1171326 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F18B8B86236h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b mov dword ptr [esp], ebx 0x0000000e jl 00007F18B8B8623Ch 0x00000014 jns 00007F18B8B86236h 0x0000001a nop 0x0000001b pushad 0x0000001c jmp 00007F18B8B86241h 0x00000021 jmp 00007F18B8B86245h 0x00000026 popad 0x00000027 push eax 0x00000028 push ebx 0x00000029 pushad 0x0000002a jmp 00007F18B8B8623Ch 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1171482 second address: 1171487 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1171487 second address: 117148D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117148D second address: 1171491 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11726E5 second address: 11726EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1173FCE second address: 1173FDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 je 00007F18B9954E4Ch 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1174C9B second address: 1174D0C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push ecx 0x00000010 call 00007F18B8B86238h 0x00000015 pop ecx 0x00000016 mov dword ptr [esp+04h], ecx 0x0000001a add dword ptr [esp+04h], 00000019h 0x00000022 inc ecx 0x00000023 push ecx 0x00000024 ret 0x00000025 pop ecx 0x00000026 ret 0x00000027 mov edi, dword ptr [ebp+122D3A6Fh] 0x0000002d push 00000000h 0x0000002f push 00000000h 0x00000031 push edx 0x00000032 call 00007F18B8B86238h 0x00000037 pop edx 0x00000038 mov dword ptr [esp+04h], edx 0x0000003c add dword ptr [esp+04h], 00000017h 0x00000044 inc edx 0x00000045 push edx 0x00000046 ret 0x00000047 pop edx 0x00000048 ret 0x00000049 cmc 0x0000004a push 00000000h 0x0000004c mov si, bx 0x0000004f push eax 0x00000050 push eax 0x00000051 push edx 0x00000052 push eax 0x00000053 push edx 0x00000054 jmp 00007F18B8B86241h 0x00000059 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1174A68 second address: 1174A6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1174D0C second address: 1174D12 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1174A6C second address: 1174A70 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1174D12 second address: 1174D1C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F18B8B86236h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1174A70 second address: 1174A7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a push edx 0x0000000b pop edx 0x0000000c pop ebx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1175FC8 second address: 1175FCE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117AB07 second address: 117AB0C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117C11F second address: 117C123 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117C123 second address: 117C129 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117B200 second address: 117B212 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F18B8B8623Eh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117C129 second address: 117C130 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117D132 second address: 117D140 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F18B8B8623Ah 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117D140 second address: 117D166 instructions: 0x00000000 rdtsc 0x00000002 je 00007F18B9954E46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F18B9954E57h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117C2CC second address: 117C39D instructions: 0x00000000 rdtsc 0x00000002 jne 00007F18B8B86248h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d movzx edi, si 0x00000010 push dword ptr fs:[00000000h] 0x00000017 push esi 0x00000018 movsx ebx, ax 0x0000001b pop edi 0x0000001c mov dword ptr fs:[00000000h], esp 0x00000023 push 00000000h 0x00000025 push edi 0x00000026 call 00007F18B8B86238h 0x0000002b pop edi 0x0000002c mov dword ptr [esp+04h], edi 0x00000030 add dword ptr [esp+04h], 0000001Bh 0x00000038 inc edi 0x00000039 push edi 0x0000003a ret 0x0000003b pop edi 0x0000003c ret 0x0000003d mov bl, 42h 0x0000003f call 00007F18B8B86243h 0x00000044 adc bx, EEC4h 0x00000049 pop ebx 0x0000004a mov eax, dword ptr [ebp+122D0EA5h] 0x00000050 jmp 00007F18B8B8623Bh 0x00000055 push FFFFFFFFh 0x00000057 push 00000000h 0x00000059 push ebp 0x0000005a call 00007F18B8B86238h 0x0000005f pop ebp 0x00000060 mov dword ptr [esp+04h], ebp 0x00000064 add dword ptr [esp+04h], 0000001Ch 0x0000006c inc ebp 0x0000006d push ebp 0x0000006e ret 0x0000006f pop ebp 0x00000070 ret 0x00000071 sub edi, 531ABD3Ah 0x00000077 nop 0x00000078 pushad 0x00000079 js 00007F18B8B8623Ch 0x0000007f push eax 0x00000080 push edx 0x00000081 jmp 00007F18B8B86241h 0x00000086 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117D166 second address: 117D1DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B9954E53h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push ebx 0x0000000d call 00007F18B9954E48h 0x00000012 pop ebx 0x00000013 mov dword ptr [esp+04h], ebx 0x00000017 add dword ptr [esp+04h], 00000015h 0x0000001f inc ebx 0x00000020 push ebx 0x00000021 ret 0x00000022 pop ebx 0x00000023 ret 0x00000024 or dword ptr [ebp+122D1E19h], ebx 0x0000002a push 00000000h 0x0000002c mov di, cx 0x0000002f push 00000000h 0x00000031 push 00000000h 0x00000033 push ebx 0x00000034 call 00007F18B9954E48h 0x00000039 pop ebx 0x0000003a mov dword ptr [esp+04h], ebx 0x0000003e add dword ptr [esp+04h], 0000001Bh 0x00000046 inc ebx 0x00000047 push ebx 0x00000048 ret 0x00000049 pop ebx 0x0000004a ret 0x0000004b or dword ptr [ebp+122D2104h], esi 0x00000051 xchg eax, esi 0x00000052 push ecx 0x00000053 jc 00007F18B9954E4Ch 0x00000059 push eax 0x0000005a push edx 0x0000005b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117D1DB second address: 117D1EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 jp 00007F18B8B86244h 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f pop esi 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117D1EB second address: 117D1EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117E0E8 second address: 117E180 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B8B86248h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edi 0x0000000b jmp 00007F18B8B86243h 0x00000010 pop edi 0x00000011 nop 0x00000012 push 00000000h 0x00000014 push ebx 0x00000015 call 00007F18B8B86238h 0x0000001a pop ebx 0x0000001b mov dword ptr [esp+04h], ebx 0x0000001f add dword ptr [esp+04h], 00000014h 0x00000027 inc ebx 0x00000028 push ebx 0x00000029 ret 0x0000002a pop ebx 0x0000002b ret 0x0000002c jns 00007F18B8B8623Ch 0x00000032 push 00000000h 0x00000034 push 00000000h 0x00000036 push esi 0x00000037 call 00007F18B8B86238h 0x0000003c pop esi 0x0000003d mov dword ptr [esp+04h], esi 0x00000041 add dword ptr [esp+04h], 00000015h 0x00000049 inc esi 0x0000004a push esi 0x0000004b ret 0x0000004c pop esi 0x0000004d ret 0x0000004e mov dword ptr [ebp+1245ED30h], ebx 0x00000054 push 00000000h 0x00000056 sub ebx, dword ptr [ebp+122D1E54h] 0x0000005c movzx edi, ax 0x0000005f push eax 0x00000060 push eax 0x00000061 push edx 0x00000062 pushad 0x00000063 push esi 0x00000064 pop esi 0x00000065 jnc 00007F18B8B86236h 0x0000006b popad 0x0000006c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117E180 second address: 117E18A instructions: 0x00000000 rdtsc 0x00000002 jc 00007F18B9954E4Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117F1D2 second address: 117F1D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117F1D6 second address: 117F1DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117E404 second address: 117E408 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117F4B2 second address: 117F4C4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B9954E4Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117F4C4 second address: 117F4CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117F4CA second address: 117F4CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11803B7 second address: 11803BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 118048A second address: 1180490 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1180490 second address: 1180494 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 118156F second address: 118157D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 118157D second address: 1181583 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1182440 second address: 1182444 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1184313 second address: 1184319 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1184319 second address: 118431F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 118251B second address: 1182525 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 118431F second address: 1184331 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F18B9954E46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1184331 second address: 118433C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F18B8B86236h 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 118433C second address: 1184343 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1185352 second address: 11853A6 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F18B8B86236h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ebx 0x0000000b mov dword ptr [esp], eax 0x0000000e mov ebx, edx 0x00000010 push 00000000h 0x00000012 push 00000000h 0x00000014 push ebx 0x00000015 call 00007F18B8B86238h 0x0000001a pop ebx 0x0000001b mov dword ptr [esp+04h], ebx 0x0000001f add dword ptr [esp+04h], 00000014h 0x00000027 inc ebx 0x00000028 push ebx 0x00000029 ret 0x0000002a pop ebx 0x0000002b ret 0x0000002c pushad 0x0000002d or dword ptr [ebp+122D1CF1h], edi 0x00000033 mov ax, 39E4h 0x00000037 popad 0x00000038 mov dword ptr [ebp+122D3242h], edx 0x0000003e push 00000000h 0x00000040 pushad 0x00000041 mov cx, 6A1Eh 0x00000045 mov dword ptr [ebp+122D23BDh], ecx 0x0000004b popad 0x0000004c xchg eax, esi 0x0000004d pushad 0x0000004e push eax 0x0000004f push edx 0x00000050 push esi 0x00000051 pop esi 0x00000052 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1185673 second address: 1185678 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1188710 second address: 1188714 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1186767 second address: 118676B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1188714 second address: 118871A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1183623 second address: 1183629 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1183629 second address: 118362F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 118362F second address: 1183633 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 118BB29 second address: 118BB2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 118A885 second address: 118A8A5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B9954E57h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push esi 0x0000000b pop esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 118A95D second address: 118A962 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 118F826 second address: 118F835 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push edx 0x00000007 pop edx 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 118F835 second address: 118F83B instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1129C59 second address: 1129C5F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 119BE0F second address: 119BE1B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jng 00007F18B8B86236h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 119BE1B second address: 119BE24 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ecx 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113736E second address: 1137374 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 119B948 second address: 119B99E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 push esi 0x0000000a pop esi 0x0000000b jl 00007F18B9954E46h 0x00000011 jmp 00007F18B9954E55h 0x00000016 jmp 00007F18B9954E54h 0x0000001b popad 0x0000001c push ecx 0x0000001d jmp 00007F18B9954E59h 0x00000022 pop ecx 0x00000023 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 119B99E second address: 119B9A3 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A1EC8 second address: 11A1ECE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A1ECE second address: 11A1EE1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 js 00007F18B8B86240h 0x0000000f push eax 0x00000010 push edx 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A1EE1 second address: 11A1EFE instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F18B9954E50h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A1EFE second address: 11A1F3B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B8B86246h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a mov eax, dword ptr [eax] 0x0000000c pushad 0x0000000d jnc 00007F18B8B8623Ch 0x00000013 jg 00007F18B8B86236h 0x00000019 pushad 0x0000001a push edi 0x0000001b pop edi 0x0000001c jc 00007F18B8B86236h 0x00000022 popad 0x00000023 popad 0x00000024 mov dword ptr [esp+04h], eax 0x00000028 push ebx 0x00000029 pushad 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A1F3B second address: 11A1F41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A1FDD second address: 11A1FE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A1FE6 second address: 11A1FEA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A8CD6 second address: 11A8CDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A7FE3 second address: 11A8001 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B9954E50h 0x00000007 ja 00007F18B9954E46h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A8830 second address: 11A8839 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A8839 second address: 11A885E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 jmp 00007F18B9954E4Fh 0x0000000e push ecx 0x0000000f jmp 00007F18B9954E4Ah 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A89D1 second address: 11A89E3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B8B8623Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A89E3 second address: 11A89EE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007F18B9954E46h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A8B62 second address: 11A8B7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push ebx 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c pop ebx 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 push edi 0x00000011 pushad 0x00000012 popad 0x00000013 pop edi 0x00000014 push eax 0x00000015 push edx 0x00000016 je 00007F18B8B86236h 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A8B7E second address: 11A8B82 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A8B82 second address: 11A8B88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11AF1AA second address: 11AF1C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F18B9954E4Dh 0x00000009 popad 0x0000000a jo 00007F18B9954E4Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11AF1C4 second address: 11AF1C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11AE251 second address: 11AE255 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11AE255 second address: 11AE25B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11AE25B second address: 11AE265 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F18B9954E52h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11AE265 second address: 11AE283 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F18B8B86236h 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007F18B8B8623Fh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11AE6DB second address: 11AE6F6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B9954E52h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11AEBC4 second address: 11AEBD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 jne 00007F18B8B86236h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11AEBD2 second address: 11AEBF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F18B9954E56h 0x0000000a push eax 0x0000000b push edx 0x0000000c jnl 00007F18B9954E46h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B497B second address: 11B4981 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1177CAB second address: 1177CAF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1177CAF second address: 1177D05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push ebx 0x0000000d call 00007F18B8B86238h 0x00000012 pop ebx 0x00000013 mov dword ptr [esp+04h], ebx 0x00000017 add dword ptr [esp+04h], 0000001Bh 0x0000001f inc ebx 0x00000020 push ebx 0x00000021 ret 0x00000022 pop ebx 0x00000023 ret 0x00000024 lea eax, dword ptr [ebp+1248D9CCh] 0x0000002a mov dword ptr [ebp+122D1D0Bh], edx 0x00000030 nop 0x00000031 push eax 0x00000032 push edx 0x00000033 jl 00007F18B8B8624Ah 0x00000039 jmp 00007F18B8B86244h 0x0000003e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1177D05 second address: 115864F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B9954E4Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F18B9954E4Bh 0x0000000f nop 0x00000010 or dword ptr [ebp+122D27FFh], edi 0x00000016 call dword ptr [ebp+122D2058h] 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f jmp 00007F18B9954E52h 0x00000024 pushad 0x00000025 popad 0x00000026 push edx 0x00000027 pop edx 0x00000028 popad 0x00000029 pushad 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1178251 second address: 1178256 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11783A2 second address: 11783A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11783A8 second address: 11783AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11783AE second address: 11783B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11783B2 second address: 11783B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11783B6 second address: 11783C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11783C4 second address: FBDD8B instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 nop 0x00000008 mov ecx, dword ptr [ebp+122D3C03h] 0x0000000e push dword ptr [ebp+122D1611h] 0x00000014 xor edx, 3B777033h 0x0000001a jns 00007F18B8B8623Bh 0x00000020 call dword ptr [ebp+122D207Ch] 0x00000026 pushad 0x00000027 pushad 0x00000028 js 00007F18B8B86238h 0x0000002e pushad 0x0000002f popad 0x00000030 sbb edx, 17B4E6AFh 0x00000036 popad 0x00000037 xor eax, eax 0x00000039 mov dword ptr [ebp+122D1CF1h], ecx 0x0000003f mov edx, dword ptr [esp+28h] 0x00000043 pushad 0x00000044 movzx ebx, di 0x00000047 xor bh, 0000006Ah 0x0000004a popad 0x0000004b mov dword ptr [ebp+122D3BFBh], eax 0x00000051 jno 00007F18B8B8623Ch 0x00000057 mov esi, 0000003Ch 0x0000005c jmp 00007F18B8B86244h 0x00000061 add esi, dword ptr [esp+24h] 0x00000065 jno 00007F18B8B86237h 0x0000006b sub dword ptr [ebp+122D1CF1h], ecx 0x00000071 lodsw 0x00000073 jo 00007F18B8B8624Fh 0x00000079 pushad 0x0000007a jmp 00007F18B8B86243h 0x0000007f mov ax, 2DC1h 0x00000083 popad 0x00000084 add eax, dword ptr [esp+24h] 0x00000088 xor dword ptr [ebp+122D1CF1h], edx 0x0000008e mov dword ptr [ebp+122D1EEFh], ecx 0x00000094 mov ebx, dword ptr [esp+24h] 0x00000098 jmp 00007F18B8B8623Fh 0x0000009d nop 0x0000009e push eax 0x0000009f push edx 0x000000a0 jmp 00007F18B8B86240h 0x000000a5 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117846B second address: 11784BB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 jmp 00007F18B9954E52h 0x0000000c pop esi 0x0000000d popad 0x0000000e mov eax, dword ptr [esp+04h] 0x00000012 jmp 00007F18B9954E59h 0x00000017 mov eax, dword ptr [eax] 0x00000019 push eax 0x0000001a push edx 0x0000001b jg 00007F18B9954E54h 0x00000021 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11784BB second address: 11784DF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F18B8B8623Ah 0x00000008 jmp 00007F18B8B8623Bh 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov dword ptr [esp+04h], eax 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11784DF second address: 11784E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11784E3 second address: 11784E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11784E7 second address: 117851C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F18B9954E55h 0x0000000b popad 0x0000000c pop eax 0x0000000d mov dword ptr [ebp+122D38F2h], ecx 0x00000013 mov cx, si 0x00000016 push 0AAF7606h 0x0000001b push eax 0x0000001c push edx 0x0000001d ja 00007F18B9954E48h 0x00000023 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11785C0 second address: 11785C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117878B second address: 11787B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push esi 0x00000006 jmp 00007F18B9954E55h 0x0000000b pop esi 0x0000000c popad 0x0000000d push eax 0x0000000e pushad 0x0000000f push ecx 0x00000010 pushad 0x00000011 popad 0x00000012 pop ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 jl 00007F18B9954E46h 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1178D28 second address: 1178D8A instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F18B8B86238h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push ebp 0x0000000e call 00007F18B8B86238h 0x00000013 pop ebp 0x00000014 mov dword ptr [esp+04h], ebp 0x00000018 add dword ptr [esp+04h], 00000014h 0x00000020 inc ebp 0x00000021 push ebp 0x00000022 ret 0x00000023 pop ebp 0x00000024 ret 0x00000025 call 00007F18B8B86247h 0x0000002a mov ecx, dword ptr [ebp+12467E99h] 0x00000030 pop edi 0x00000031 push 0000001Eh 0x00000033 nop 0x00000034 push ebx 0x00000035 jmp 00007F18B8B86240h 0x0000003a pop ebx 0x0000003b push eax 0x0000003c push edx 0x0000003d push eax 0x0000003e push edx 0x0000003f pushad 0x00000040 popad 0x00000041 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1179019 second address: 1179023 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F18B9954E46h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1179023 second address: 1179043 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c push ebx 0x0000000d jmp 00007F18B8B8623Ch 0x00000012 pop ebx 0x00000013 mov eax, dword ptr [eax] 0x00000015 pushad 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11790CE second address: 1179159 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jp 00007F18B9954E48h 0x0000000c popad 0x0000000d nop 0x0000000e sub edx, dword ptr [ebp+122D2099h] 0x00000014 lea eax, dword ptr [ebp+1248DA10h] 0x0000001a mov edi, dword ptr [ebp+1247C15Ch] 0x00000020 push eax 0x00000021 jmp 00007F18B9954E4Ah 0x00000026 mov dword ptr [esp], eax 0x00000029 push 00000000h 0x0000002b push edi 0x0000002c call 00007F18B9954E48h 0x00000031 pop edi 0x00000032 mov dword ptr [esp+04h], edi 0x00000036 add dword ptr [esp+04h], 0000001Dh 0x0000003e inc edi 0x0000003f push edi 0x00000040 ret 0x00000041 pop edi 0x00000042 ret 0x00000043 xor dword ptr [ebp+12470756h], edi 0x00000049 lea eax, dword ptr [ebp+1248D9CCh] 0x0000004f push 00000000h 0x00000051 push ebx 0x00000052 call 00007F18B9954E48h 0x00000057 pop ebx 0x00000058 mov dword ptr [esp+04h], ebx 0x0000005c add dword ptr [esp+04h], 00000016h 0x00000064 inc ebx 0x00000065 push ebx 0x00000066 ret 0x00000067 pop ebx 0x00000068 ret 0x00000069 sub edx, dword ptr [ebp+122D3C37h] 0x0000006f push eax 0x00000070 push eax 0x00000071 push edx 0x00000072 pushad 0x00000073 push eax 0x00000074 push edx 0x00000075 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1179159 second address: 1179160 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1179160 second address: 1159193 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B9954E4Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c jl 00007F18B9954E48h 0x00000012 movzx ecx, di 0x00000015 call dword ptr [ebp+122D1E73h] 0x0000001b push eax 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f popad 0x00000020 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1159193 second address: 1159197 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1159197 second address: 11591A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B3B01 second address: 11B3B05 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B3B05 second address: 11B3B0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B3B0B second address: 11B3B26 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F18B8B86246h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B3B26 second address: 11B3B2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B3C8A second address: 11B3CA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F18B8B86249h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B3CA7 second address: 11B3CAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B3CAB second address: 11B3CC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 jmp 00007F18B8B86242h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B3CC6 second address: 11B3CCB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B3DFF second address: 11B3E05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B3E05 second address: 11B3E0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B3E0D second address: 11B3E1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 pushad 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a jnp 00007F18B8B86236h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B4561 second address: 11B4567 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B964C second address: 11B9652 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B9652 second address: 11B9656 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B9656 second address: 11B965C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11BE1B8 second address: 11BE1C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11BE1C3 second address: 11BE1C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11BE465 second address: 11BE4B2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B9954E55h 0x00000007 pushad 0x00000008 jmp 00007F18B9954E4Fh 0x0000000d jnp 00007F18B9954E46h 0x00000013 jmp 00007F18B9954E55h 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b pushad 0x0000001c pushad 0x0000001d pushad 0x0000001e popad 0x0000001f pushad 0x00000020 popad 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11BE4B2 second address: 11BE4B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11BE62F second address: 11BE633 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11BE633 second address: 11BE642 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F18B8B86236h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11BE642 second address: 11BE647 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11BE77C second address: 11BE788 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F18B8B8623Eh 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11BE8CB second address: 11BE8D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11BEA33 second address: 11BEA65 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jno 00007F18B8B86236h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jp 00007F18B8B86238h 0x00000012 jns 00007F18B8B8623Eh 0x00000018 popad 0x00000019 je 00007F18B8B8624Ah 0x0000001f pushad 0x00000020 jng 00007F18B8B86236h 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11BEBE4 second address: 11BEBF8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 je 00007F18B9954E46h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jc 00007F18B9954E4Ch 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11BED62 second address: 11BED90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jp 00007F18B8B86259h 0x0000000b jmp 00007F18B8B8623Bh 0x00000010 jmp 00007F18B8B86248h 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11BDA8C second address: 11BDA90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11C6077 second address: 11C60B6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B8B86243h 0x00000007 jmp 00007F18B8B86244h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jbe 00007F18B8B86242h 0x00000016 jnc 00007F18B8B86236h 0x0000001c jnp 00007F18B8B86236h 0x00000022 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11C60B6 second address: 11C60C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007F18B9954E46h 0x0000000a je 00007F18B9954E46h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11C60C6 second address: 11C60CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11C5C42 second address: 11C5C69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F18B9954E58h 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e ja 00007F18B9954E46h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11C5C69 second address: 11C5C6D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11C947F second address: 11C9487 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11C9487 second address: 11C948B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11C948B second address: 11C949B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jo 00007F18B9954E46h 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11C949B second address: 11C94C7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ecx 0x0000000b pushad 0x0000000c popad 0x0000000d pop ecx 0x0000000e pushad 0x0000000f jmp 00007F18B8B86246h 0x00000014 ja 00007F18B8B86236h 0x0000001a popad 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11C94C7 second address: 11C94E4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F18B9954E52h 0x00000008 jl 00007F18B9954E46h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11C8CEA second address: 11C8CF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11C8E90 second address: 11C8EAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 jmp 00007F18B9954E51h 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11C8EAF second address: 11C8EB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11C8EB5 second address: 11C8EB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11C8EB9 second address: 11C8ED1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F18B8B86240h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11C8ED1 second address: 11C8EDB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F18B9954E46h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11C9036 second address: 11C9042 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jc 00007F18B8B86236h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11C91A0 second address: 11C91A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11CEA34 second address: 11CEA38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11CEA38 second address: 11CEA3E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11CEE18 second address: 11CEE1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1178BC8 second address: 1178BCC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1178BCC second address: 1178BD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11CF258 second address: 11CF25C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11CF25C second address: 11CF265 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D36C0 second address: 11D36D7 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F18B9954E51h 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D36D7 second address: 11D36EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F18B8B86242h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D3A23 second address: 11D3A45 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B9954E4Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jnp 00007F18B9954E54h 0x0000000f pushad 0x00000010 jc 00007F18B9954E46h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D810D second address: 11D8127 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F18B8B86236h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F18B8B8623Bh 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D79CE second address: 11D79DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F18B9954E4Bh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D79DD second address: 11D79E2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D7E24 second address: 11D7E51 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F18B9954E55h 0x00000008 jmp 00007F18B9954E50h 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D7E51 second address: 11D7E96 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B8B86240h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jmp 00007F18B8B86246h 0x00000013 jmp 00007F18B8B86243h 0x00000018 pushad 0x00000019 popad 0x0000001a popad 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D7E96 second address: 11D7E9B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D7E9B second address: 11D7EA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11DFC5A second address: 11DFC5F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11DDEC4 second address: 11DDED1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnp 00007F18B8B86236h 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11DE2FE second address: 11DE309 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11DE309 second address: 11DE30D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11DEB5A second address: 11DEB5E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11DEB5E second address: 11DEB6A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F18B8B86236h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11E5147 second address: 11E5156 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b popad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11E5C83 second address: 11E5C87 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11E5C87 second address: 11E5CAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F18B9954E55h 0x0000000e jns 00007F18B9954E46h 0x00000014 popad 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11E5CAC second address: 11E5CB1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11EABDC second address: 11EAC0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 jmp 00007F18B9954E59h 0x0000000b js 00007F18B9954E46h 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 popad 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 jl 00007F18B9954E4Ch 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11EAC0F second address: 11EAC19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push esi 0x00000007 pop esi 0x00000008 push edx 0x00000009 pop edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11EAC19 second address: 11EAC1F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11EAC1F second address: 11EAC29 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F18B8B8623Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11EAC29 second address: 11EAC30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11EAC30 second address: 11EAC36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F2A5F second address: 11F2A63 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F2A63 second address: 11F2A73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F18B8B86236h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f pop eax 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F2A73 second address: 11F2A7D instructions: 0x00000000 rdtsc 0x00000002 jne 00007F18B9954E46h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F2A7D second address: 11F2A89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F2D29 second address: 11F2D2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F2D2D second address: 11F2D31 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F2D31 second address: 11F2D37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F2D37 second address: 11F2D3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F2D3D second address: 11F2D73 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B9954E51h 0x00000007 jmp 00007F18B9954E58h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jbe 00007F18B9954E62h 0x00000014 push esi 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F2D73 second address: 11F2D87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 jnp 00007F18B8B86236h 0x0000000c jl 00007F18B8B86236h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F2EA2 second address: 11F2ED3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F18B9954E52h 0x00000009 popad 0x0000000a pop eax 0x0000000b pushad 0x0000000c js 00007F18B9954E4Eh 0x00000012 jc 00007F18B9954E46h 0x00000018 push edi 0x00000019 pop edi 0x0000001a pushad 0x0000001b push esi 0x0000001c pop esi 0x0000001d push edi 0x0000001e pop edi 0x0000001f popad 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F2ED3 second address: 11F2ED9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F2ED9 second address: 11F2EDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F2081 second address: 11F20AE instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F18B8B8623Ch 0x00000008 jnl 00007F18B8B86236h 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F18B8B86247h 0x00000015 jnp 00007F18B8B86236h 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F9A76 second address: 11F9A93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F18B9954E58h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F9A93 second address: 11F9A99 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F9A99 second address: 11F9A9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F9BC2 second address: 11F9BF5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B8B86244h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jbe 00007F18B8B8624Bh 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F9BF5 second address: 11F9BFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 12064B6 second address: 12064D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F18B8B86236h 0x0000000a jmp 00007F18B8B86248h 0x0000000f popad 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 120A1C4 second address: 120A1DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jmp 00007F18B9954E53h 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 120A1DD second address: 120A1F7 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F18B8B86236h 0x00000008 jp 00007F18B8B86236h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push ebx 0x00000013 pushad 0x00000014 pushad 0x00000015 popad 0x00000016 push edi 0x00000017 pop edi 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 120A1F7 second address: 120A20B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F18B9954E46h 0x0000000a popad 0x0000000b pushad 0x0000000c jnl 00007F18B9954E46h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1209B67 second address: 1209B8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 ja 00007F18B8B86236h 0x0000000e push edi 0x0000000f pop edi 0x00000010 jmp 00007F18B8B86242h 0x00000015 popad 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1209B8A second address: 1209BA3 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jnl 00007F18B9954E46h 0x00000009 push edi 0x0000000a pop edi 0x0000000b pop ebx 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 js 00007F18B9954E46h 0x00000017 push edx 0x00000018 pop edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1209BA3 second address: 1209BA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1209D1E second address: 1209D31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 jl 00007F18B9954E52h 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 push edx 0x00000012 pop edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 120BBEC second address: 120BBF1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 120BA7B second address: 120BA89 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jng 00007F18B9954E52h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 120BA89 second address: 120BA8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1212345 second address: 121235A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F18B9954E4Fh 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 121235A second address: 121235F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1212490 second address: 12124A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F18B9954E4Dh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 121C44E second address: 121C45E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 jbe 00007F18B8B86236h 0x0000000f pop edi 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 121C2F0 second address: 121C2FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 121C2FB second address: 121C301 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 121C301 second address: 121C305 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 122341B second address: 1223420 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1223420 second address: 122343F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 je 00007F18B9954E46h 0x00000009 jmp 00007F18B9954E54h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 122343F second address: 122349A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F18B8B86246h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jnc 00007F18B8B86238h 0x00000014 pushad 0x00000015 jmp 00007F18B8B86243h 0x0000001a jmp 00007F18B8B86242h 0x0000001f pushad 0x00000020 popad 0x00000021 jmp 00007F18B8B8623Bh 0x00000026 popad 0x00000027 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1223D63 second address: 1223D77 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F18B9954E50h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 12280DB second address: 12280DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1228222 second address: 1228241 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jp 00007F18B9954E46h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F18B9954E51h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1237268 second address: 123726E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 123726E second address: 1237272 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 124C2D9 second address: 124C2DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 112B756 second address: 112B76A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F18B9954E50h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 124B59D second address: 124B5BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F18B8B86248h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 124B9BD second address: 124B9C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 124B9C1 second address: 124B9C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 124BE30 second address: 124BE3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 124BE3D second address: 124BE41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 124BE41 second address: 124BE45 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 124BE45 second address: 124BE50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 124BE50 second address: 124BE56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1255FB2 second address: 1255FB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1255FFE second address: 1256002 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1256002 second address: 125600C instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F18B8B86236h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 125600C second address: 1256011 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1256011 second address: 1256028 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F18B8B86236h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edi 0x0000000f push eax 0x00000010 push edx 0x00000011 jp 00007F18B8B86236h 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1257BC3 second address: 1257BC9 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 124F52B second address: 124F533 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 124F533 second address: 124F539 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 124F810 second address: 124F816 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 124F816 second address: 124F820 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F18B9954E46h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 124F820 second address: 124F824 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 12507D4 second address: 12507D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117343D second address: 1173442 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1173442 second address: 1173469 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F18B9954E59h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1173469 second address: 117346F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: FBDE21 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: FBDCFE instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 11687F5 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 118BB95 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeMemory allocated: 4EC0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 4EC0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 6EC0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0113D635 rdtsc 5_2_0113D635
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 7496Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0119F258 GetSystemInfo,VirtualAlloc,5_2_0119F258
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: file.exe, file.exe, 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
Source: file.exe, 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: regmonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: gbdyllo
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: procmon_window_class
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: ollydbg
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: filemonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeFile opened: NTICE
Source: C:\Users\user\Desktop\file.exeFile opened: SICE
Source: C:\Users\user\Desktop\file.exeFile opened: SIWVID
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0113D635 rdtsc 5_2_0113D635
Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior
Source: file.exe, file.exe, 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpBinary or memory string: UProgram Manager
Source: C:\Users\user\Desktop\file.exeCode function: 5_2_01194DC8 GetSystemTime,GetFileTime,5_2_01194DC8

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\Desktop\file.exeRegistry key value created / modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications DisableNotifications 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableIOAVProtection 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableRealtimeMonitoring 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\NotificationsRegistry value created: DisableNotifications 1Jump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry value created: TamperProtection 0Jump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AUOptionsJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AutoInstallMinorUpdatesJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate DoNotConnectToWindowsUpdateInternetLocationsJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
41
Disable or Modify Tools
LSASS Memory641
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
Bypass User Account Control
261
Virtualization/Sandbox Evasion
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS261
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets24
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
Software Packing
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
Bypass User Account Control
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe42%ReversingLabsWin32.Infostealer.Tinba
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1562492
Start date and time:2024-11-25 16:21:09 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 10s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:12
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal100.evad.winEXE@1/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, ctldl.windowsupdate.com, time.windows.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • VT rate limit hit for: file.exe
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\file.exe
File Type:CSV text
Category:dropped
Size (bytes):226
Entropy (8bit):5.360398796477698
Encrypted:false
SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
MD5:3A8957C6382192B71471BD14359D0B12
SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
Malicious:true
Reputation:high, very likely benign file
Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.499952362890072
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:file.exe
File size:2'813'440 bytes
MD5:62999b3ca5005da29eb4d0853c5fa789
SHA1:8512b3a7ac2f37b19b0a75586859d724b857b6c6
SHA256:0fd8b2570b5b38cb65325116d2ea01d414876f903cf72c26a1733a1d6f35bd22
SHA512:acb504dc190caf3789758c035e8522b057f601e5f8c6d5deb5968d3e248b9cc68e3e804bba8783bce6800b8cf9f6f9a3b1f1c02e82641d76ed17259cc635750e
SSDEEP:49152:j9210JI1IUwJRaXjgkZPzMLJ01CDkyCTqsiz:x210JItwJRaX0uPzMuJg
TLSH:65D54C52BC45B1CBE48A1BB5512BCE829D2D07F90B3504C7AC6DB5BE7E63CC511BAC28
File Content Preview:MZ......................@...........z...................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P(,e.........."...0..$...........`+.. ...`....@.. ........................+.....>g+...`................................
Icon Hash:00928e8e8686b000
Entrypoint:0x6b6000
Entrypoint Section:.taggant
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE
Time Stamp:0x652C2850 [Sun Oct 15 17:58:40 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:2eabe9054cad5152567f0699947a2c5b
Instruction
jmp 00007F18B884765Ah
bswap esp
sub al, byte ptr [eax]
add byte ptr [eax], al
add byte ptr [eax], al
jmp 00007F18B8849655h
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [edx+02h], bl
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
lahf
add byte ptr [eax], 00000000h
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
jnle 00007F18B88475D2h
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
aam 04h
add byte ptr [eax], al
or byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
lahf
add byte ptr [eax], 00000000h
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add dword ptr [eax+00000000h], 00000000h
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x80550x69.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000x59c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x81f80x8.idata
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
0x20000x40000x1200dde5b4630e986a378539c56d51becd33False0.9327256944444444data7.793247849511672IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x60000x59c0x600aae15e30898a02f09cc86ed48aa06b09False0.4140625data4.036947054771808IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata 0x80000x20000x200ec9cb51e8cb4ea49a56ee3cf434fb69eFalse0.1484375data0.9342685949460681IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
vfzorowi0xa0000x2aa0000x2a8e00d93316814d17c13ebf4a3de996f2dfccunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
ahyfouxz0x2b40000x20000x400d8ec53fc4087893fa8aef6c0d8256f9cFalse0.78125data5.987408728722672IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.taggant0x2b60000x40000x22001362755e1008c957bd85911f5e591016False0.06881893382352941DOS executable (COM)0.7585848594105997IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x60900x30cdata0.42948717948717946
RT_MANIFEST0x63ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
DLLImport
kernel32.dlllstrcpy
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:5
Start time:10:22:06
Start date:25/11/2024
Path:C:\Users\user\Desktop\file.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\file.exe"
Imagebase:0xfb0000
File size:2'813'440 bytes
MD5 hash:62999B3CA5005DA29EB4D0853C5FA789
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:5.7%
    Dynamic/Decrypted Code Coverage:4.2%
    Signature Coverage:5.1%
    Total number of Nodes:312
    Total number of Limit Nodes:19
    execution_graph 8150 119f258 GetSystemInfo 8151 119f2b6 VirtualAlloc 8150->8151 8153 119f278 8150->8153 8165 119f5a4 8151->8165 8153->8151 8154 119f3d2 8157 119f3ee GetModuleFileNameA VirtualProtect 8154->8157 8164 119f396 8154->8164 8155 119f2fd 8155->8154 8156 119f5a4 VirtualAlloc GetModuleFileNameA VirtualProtect 8155->8156 8158 119f327 8156->8158 8157->8164 8158->8154 8159 119f5a4 VirtualAlloc GetModuleFileNameA VirtualProtect 8158->8159 8160 119f351 8159->8160 8160->8154 8161 119f5a4 VirtualAlloc GetModuleFileNameA VirtualProtect 8160->8161 8162 119f37b 8161->8162 8162->8154 8163 119f5a4 VirtualAlloc GetModuleFileNameA VirtualProtect 8162->8163 8162->8164 8163->8154 8167 119f5ac 8165->8167 8168 119f5d8 8167->8168 8169 119f5c0 8167->8169 8171 119f470 2 API calls 8168->8171 8175 119f470 8169->8175 8172 119f5e9 8171->8172 8177 119f5fb 8172->8177 8180 119f478 8175->8180 8178 119f60c VirtualAlloc 8177->8178 8179 119f5f7 8177->8179 8178->8179 8181 119f48b 8180->8181 8183 119f4ce 8181->8183 8184 119fac3 8181->8184 8186 119faca 8184->8186 8187 119fb14 8186->8187 8189 119f9d1 8186->8189 8193 119fc84 8186->8193 8187->8183 8192 119f9e6 8189->8192 8190 119faa6 8190->8186 8191 119fa70 GetModuleFileNameA 8191->8192 8192->8190 8192->8191 8195 119fc98 8193->8195 8194 119fcb0 8194->8186 8195->8194 8196 119fdd3 VirtualProtect 8195->8196 8196->8195 8197 70a1308 8198 70a1349 ImpersonateLoggedOnUser 8197->8198 8199 70a1376 8198->8199 8200 70a0d48 8201 70a0d93 OpenSCManagerW 8200->8201 8203 70a0ddc 8201->8203 8455 119293d 8456 1190c7b GetCurrentThreadId 8455->8456 8457 1192949 8456->8457 8458 1192967 8457->8458 8459 119138d 2 API calls 8457->8459 8460 1192998 GetModuleHandleExA 8458->8460 8461 119296f 8458->8461 8459->8458 8460->8461 8204 fbf63d 8205 fbf9af VirtualAlloc 8204->8205 8208 11a025c 8210 11a0268 8208->8210 8211 11a027a 8210->8211 8216 11922da 8211->8216 8214 11a02a2 8224 1192341 8216->8224 8218 11922ef 8218->8214 8219 119fe19 8218->8219 8221 119fead 8219->8221 8223 119fe2a 8219->8223 8220 119fac3 2 API calls 8220->8223 8221->8214 8222 119fc84 VirtualProtect 8222->8223 8223->8220 8223->8221 8223->8222 8226 119234e 8224->8226 8228 1192364 8226->8228 8227 1192389 8243 1190c7b GetCurrentThreadId 8227->8243 8228->8227 8238 119236c 8228->8238 8249 11a04cb 8228->8249 8229 1192439 8271 1192179 8229->8271 8230 119244c 8234 119246a LoadLibraryExA 8230->8234 8235 1192456 LoadLibraryExW 8230->8235 8242 1192410 8234->8242 8235->8242 8236 119238e 8245 119138d 8236->8245 8238->8229 8238->8230 8240 11923cd 8251 1191cb9 8240->8251 8244 1190c93 8243->8244 8244->8236 8246 11913db 8245->8246 8247 119139e 8245->8247 8246->8238 8246->8240 8247->8246 8275 119122e 8247->8275 8295 11a04da 8249->8295 8252 1191cdf 8251->8252 8253 1191cd5 8251->8253 8303 119150c 8252->8303 8253->8242 8260 1191d2f 8261 1191d5c 8260->8261 8268 1191dd9 8260->8268 8313 11916ea 8260->8313 8317 1191985 8261->8317 8264 1191d67 8264->8268 8322 11918fc 8264->8322 8267 1191dbc 8267->8268 8270 119fe19 2 API calls 8267->8270 8268->8253 8330 11924cb 8268->8330 8270->8268 8272 1192184 8271->8272 8273 11921a5 LoadLibraryExA 8272->8273 8274 1192194 8272->8274 8273->8274 8274->8242 8276 119125b 8275->8276 8277 1191289 PathAddExtensionA 8276->8277 8278 11912a4 8276->8278 8285 1191361 8276->8285 8277->8278 8280 11912c6 8278->8280 8287 1190ecf 8278->8287 8281 119130f 8280->8281 8283 1190ecf lstrcmpiA 8280->8283 8280->8285 8282 1191338 8281->8282 8284 1190ecf lstrcmpiA 8281->8284 8281->8285 8282->8285 8286 1190ecf lstrcmpiA 8282->8286 8283->8281 8284->8282 8285->8247 8286->8285 8289 1190eed 8287->8289 8288 1190f04 8288->8280 8289->8288 8291 1190e4c 8289->8291 8293 1190e77 8291->8293 8292 1190ebf 8292->8288 8293->8292 8294 1190ea9 lstrcmpiA 8293->8294 8294->8292 8296 11a04ea 8295->8296 8297 1190c7b GetCurrentThreadId 8296->8297 8302 11a053c 8296->8302 8298 11a0552 8297->8298 8299 119138d 2 API calls 8298->8299 8300 11a0564 8299->8300 8301 119138d 2 API calls 8300->8301 8300->8302 8301->8302 8304 1191528 8303->8304 8305 1191581 8303->8305 8304->8305 8306 1191558 VirtualAlloc 8304->8306 8305->8253 8307 11915b2 VirtualAlloc 8305->8307 8306->8305 8308 11915f7 8307->8308 8308->8268 8309 119162f 8308->8309 8312 1191657 8309->8312 8310 11916ce 8310->8260 8311 1191670 VirtualAlloc 8311->8310 8311->8312 8312->8310 8312->8311 8314 119170a 8313->8314 8315 1191705 8313->8315 8314->8315 8316 119173d lstrcmpiA 8314->8316 8315->8261 8316->8314 8316->8315 8319 1191a91 8317->8319 8320 11919b2 8317->8320 8319->8264 8320->8319 8332 1191497 8320->8332 8340 11925a8 8320->8340 8324 1191925 8322->8324 8323 119193d VirtualProtect 8323->8324 8325 1191966 8323->8325 8324->8323 8324->8325 8325->8267 8325->8268 8326 11a0120 8325->8326 8327 11a01ed 8326->8327 8328 11a013c 8326->8328 8327->8267 8328->8327 8329 119fc84 VirtualProtect 8328->8329 8329->8328 8365 11924d7 8330->8365 8333 11922da 17 API calls 8332->8333 8335 11914aa 8333->8335 8334 11914f0 8334->8320 8335->8334 8336 11914fc 8335->8336 8338 11914d3 8335->8338 8337 11924cb 2 API calls 8336->8337 8337->8334 8338->8334 8339 11924cb 2 API calls 8338->8339 8339->8334 8342 11925b1 8340->8342 8343 11925c0 8342->8343 8345 1190c7b GetCurrentThreadId 8343->8345 8347 11925c8 8343->8347 8344 11925f5 GetProcAddress 8350 11925eb 8344->8350 8346 11925d2 8345->8346 8346->8347 8348 11925e2 8346->8348 8347->8344 8351 1192009 8348->8351 8352 11920f5 8351->8352 8353 1192028 8351->8353 8352->8350 8353->8352 8354 1192065 lstrcmpiA 8353->8354 8355 119208f 8353->8355 8354->8353 8354->8355 8355->8352 8357 1191f52 8355->8357 8359 1191f63 8357->8359 8358 1191fee 8358->8352 8359->8358 8360 1191f93 lstrcpyn 8359->8360 8360->8358 8361 1191faf 8360->8361 8361->8358 8362 1191497 16 API calls 8361->8362 8363 1191fdd 8362->8363 8363->8358 8364 11925a8 16 API calls 8363->8364 8364->8358 8366 11924e6 8365->8366 8367 11924ee 8366->8367 8369 1190c7b GetCurrentThreadId 8366->8369 8368 119253c FreeLibrary 8367->8368 8370 1192523 8368->8370 8371 11924f8 8369->8371 8371->8367 8372 1192508 8371->8372 8374 1191eb9 8372->8374 8375 1191f1c 8374->8375 8376 1191edc 8374->8376 8375->8370 8376->8375 8378 1190a75 8376->8378 8379 1190a7e 8378->8379 8380 1190a96 8379->8380 8382 1190a5c 8379->8382 8380->8375 8383 11924cb GetCurrentThreadId FreeLibrary 8382->8383 8384 1190a69 8383->8384 8384->8379 8462 113d635 LoadLibraryA 8463 113d649 8462->8463 8464 11416bc 8465 11416c7 CreateFileA 8464->8465 8467 1141721 8464->8467 8466 11416d9 8465->8466 8468 11a01f2 8470 11a01fe 8468->8470 8471 11a0210 8470->8471 8472 119fe19 2 API calls 8471->8472 8473 11a0222 8472->8473 8385 1192492 8386 11922da 17 API calls 8385->8386 8387 11924a5 8386->8387 8474 11933b5 8476 11933cc 8474->8476 8475 11934c9 8476->8475 8477 1193435 CreateFileA 8476->8477 8478 119347a 8477->8478 8478->8475 8479 1192a94 CloseHandle 8478->8479 8479->8475 8388 fbe6f5 VirtualAlloc 8389 fbe707 8388->8389 8390 fc1572 8392 fc215a 8390->8392 8391 fc3238 8391->8391 8392->8391 8394 119f3f9 8392->8394 8397 119f407 8394->8397 8395 119f427 8395->8391 8397->8395 8398 119f6c9 8397->8398 8399 119f6d9 8398->8399 8401 119f6fc 8398->8401 8400 119fac3 2 API calls 8399->8400 8399->8401 8400->8401 8401->8397 8480 1194d36 8481 1190c7b GetCurrentThreadId 8480->8481 8482 1194d42 GetCurrentProcess 8481->8482 8483 1194d8e 8482->8483 8485 1194d52 8482->8485 8484 1194d93 DuplicateHandle 8483->8484 8488 1194d89 8484->8488 8485->8483 8486 1194d7d 8485->8486 8489 1192ad3 8486->8489 8491 1192afd 8489->8491 8490 1192b90 8490->8488 8491->8490 8492 1192abb CloseHandle 8491->8492 8492->8490 8493 11a02a8 8495 11a02b4 8493->8495 8496 11a02c6 8495->8496 8501 11922f3 8496->8501 8498 11a02d5 8499 11a02ee 8498->8499 8500 119fe19 GetModuleFileNameA VirtualProtect 8498->8500 8500->8499 8503 11922ff 8501->8503 8504 1192314 8503->8504 8505 1192341 17 API calls 8504->8505 8506 1192332 8504->8506 8505->8506 8402 1141b07 CreateFileA 8403 1141b2c 8402->8403 8404 119320a 8405 1193228 8404->8405 8409 1193392 8405->8409 8412 1192bd1 8405->8412 8407 1193387 8408 11939c6 3 API calls 8407->8408 8408->8409 8411 1193265 8411->8407 8418 11939c6 8411->8418 8414 1192bde 8412->8414 8413 1192c17 CreateFileA 8416 1192c63 8413->8416 8414->8413 8415 1192cd9 8414->8415 8415->8411 8416->8415 8420 1192a94 CloseHandle 8416->8420 8422 11939cf 8418->8422 8421 1192aa8 8420->8421 8421->8415 8423 1190c7b GetCurrentThreadId 8422->8423 8424 11939db 8423->8424 8425 1193a04 8424->8425 8426 11939f4 8424->8426 8428 1193a09 CloseHandle 8425->8428 8430 1192abb 8426->8430 8429 11939fa 8428->8429 8433 1190b26 8430->8433 8434 1190b3c 8433->8434 8436 1190b56 8434->8436 8437 1190b0a 8434->8437 8436->8429 8438 1192a94 CloseHandle 8437->8438 8439 1190b1a 8438->8439 8439->8436 8507 11927ea 8509 11927f6 8507->8509 8510 119280a 8509->8510 8512 1192832 8510->8512 8513 119284b 8510->8513 8515 1192854 8513->8515 8516 1192863 8515->8516 8517 1190c7b GetCurrentThreadId 8516->8517 8524 119286b 8516->8524 8520 1192875 8517->8520 8518 119291c GetModuleHandleA 8523 11928a3 8518->8523 8519 119290e GetModuleHandleW 8519->8523 8521 119138d 2 API calls 8520->8521 8522 1192890 8520->8522 8521->8522 8522->8523 8522->8524 8524->8518 8524->8519 8440 114b303 8441 114e702 8440->8441 8446 114e3ad 8440->8446 8442 114eac2 RegOpenKeyA 8441->8442 8443 114eae9 RegOpenKeyA 8441->8443 8442->8443 8444 114eadf 8442->8444 8445 114eb06 8443->8445 8444->8443 8445->8446 8447 114eb4a GetNativeSystemInfo 8445->8447 8447->8446 8448 114184d 8449 114183a CreateFileA 8448->8449 8451 1141877 8449->8451 8452 70a1510 8453 70a1558 ControlService 8452->8453 8454 70a158f 8453->8454 8525 70a10f0 8526 70a1131 8525->8526 8528 11939cf 3 API calls 8526->8528 8527 70a1151 8528->8527

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 144 119f258-119f272 GetSystemInfo 145 119f278-119f2b0 144->145 146 119f2b6-119f2ff VirtualAlloc call 119f5a4 144->146 145->146 150 119f3e5-119f3ea call 119f3ee 146->150 151 119f305-119f329 call 119f5a4 146->151 158 119f3ec-119f3ed 150->158 151->150 157 119f32f-119f353 call 119f5a4 151->157 157->150 161 119f359-119f37d call 119f5a4 157->161 161->150 164 119f383-119f390 161->164 165 119f3b6-119f3cd call 119f5a4 164->165 166 119f396-119f3b1 164->166 168 119f3d2-119f3d4 165->168 171 119f3e0 166->171 168->150 170 119f3da 168->170 170->171 171->158
    APIs
    • GetSystemInfo.KERNELBASE(?,-11315FEC), ref: 0119F264
    • VirtualAlloc.KERNELBASE(00000000,00004000,00001000,00000004), ref: 0119F2C5
    Memory Dump Source
    • Source File: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: AllocInfoSystemVirtual
    • String ID:
    • API String ID: 3440192736-0
    • Opcode ID: 5cdb997830d5eabcfdba823fb9d7220baba6bb1d66dc5eebfd447d5d3c197c15
    • Instruction ID: ef6bddb1f2bba01aa18c386a14170b928369e8c8e36e4056e1f6bf8168620a24
    • Opcode Fuzzy Hash: 5cdb997830d5eabcfdba823fb9d7220baba6bb1d66dc5eebfd447d5d3c197c15
    • Instruction Fuzzy Hash: 264112B6D44207ABE729DF64C855F96BBACFF08741F0040A2A712CD982D77495D5CBE0

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 205 113d635-113d63a LoadLibraryA 206 113d649-113d7a2 205->206 209 113d7a3 206->209 209->209
    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID:
    • API String ID: 1029625771-0
    • Opcode ID: 0da1d4874948244da89ff930396d9228992ca054dadf5661e5a00858bf25b72f
    • Instruction ID: e42f8df1565c3d265bb022504d232ede151373c137b6f3cb7f9d26ed0bd32d22
    • Opcode Fuzzy Hash: 0da1d4874948244da89ff930396d9228992ca054dadf5661e5a00858bf25b72f
    • Instruction Fuzzy Hash: 98417FF610C300AFE705AE09ED816BAFBE9EF84360F16892DE6C582610D73559409BA7

    Control-flow Graph

    APIs
    • LoadLibraryExW.KERNEL32(?,?,?), ref: 0119245F
    • LoadLibraryExA.KERNELBASE(00000000,?,?), ref: 01192473
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID: .dll$.exe$1002
    • API String ID: 1029625771-847511843
    • Opcode ID: 314bb8b799a9349dca00b39b187d7aa4c62c73c06dbfea6f68def0793e361520
    • Instruction ID: 75541a244bbd6b519237a590c41a946dab51267ce0516bb43dafe4bd3fa7cc07
    • Opcode Fuzzy Hash: 314bb8b799a9349dca00b39b187d7aa4c62c73c06dbfea6f68def0793e361520
    • Instruction Fuzzy Hash: 28319E7580420AFFDF2EAF54D904AAE7FB9FF18314F018169F92297160C77199A0CB92

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 40 1192854-1192865 call 11921b8 43 119286b 40->43 44 1192870-1192879 call 1190c7b 40->44 45 1192904-1192908 43->45 51 11928ad-11928b4 44->51 52 119287f-119288b call 119138d 44->52 47 119291c-119291f GetModuleHandleA 45->47 48 119290e-1192917 GetModuleHandleW 45->48 50 1192925 47->50 48->50 56 119292f-1192931 50->56 53 11928ba-11928c1 51->53 54 11928ff call 1190d26 51->54 59 1192890-1192892 52->59 53->54 57 11928c7-11928ce 53->57 54->45 57->54 61 11928d4-11928db 57->61 59->54 60 1192898-119289d 59->60 60->54 62 11928a3-119292a call 1190d26 60->62 61->54 63 11928e1-11928f5 61->63 62->56 63->54
    APIs
    • GetModuleHandleW.KERNEL32(?,?,?,?,011927E6,?,00000000,00000000), ref: 01192911
    • GetModuleHandleA.KERNEL32(00000000,?,?,?,011927E6,?,00000000,00000000), ref: 0119291F
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: HandleModule
    • String ID: .dll
    • API String ID: 4139908857-2738580789
    • Opcode ID: 6c7fb0db8f302a1089b9925b3b6ef8b48fa5c566a4e856ee17145c9d6032e162
    • Instruction ID: 65f0c479b94c6d358f922ff0653a5e630ea5f472295de7b438eb6ecd8583f054
    • Opcode Fuzzy Hash: 6c7fb0db8f302a1089b9925b3b6ef8b48fa5c566a4e856ee17145c9d6032e162
    • Instruction Fuzzy Hash: C7112A3150074AFEEF3DAF28C848BA97AB4BF20345F044225F625494E4DBB591E4DAD2

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 67 114b303-114b30a 68 114e702-114eac0 67->68 69 114e3ad-114e3c5 67->69 72 114eac2-114eadd RegOpenKeyA 68->72 73 114eae9-114eb04 RegOpenKeyA 68->73 72->73 74 114eadf 72->74 75 114eb06-114eb10 73->75 76 114eb1c-114eb48 73->76 74->73 75->76 79 114eb55-114eb5f 76->79 80 114eb4a-114eb53 GetNativeSystemInfo 76->80 81 114eb61 79->81 82 114eb6b-114eb79 79->82 80->79 81->82 84 114eb85-114eb8c 82->84 85 114eb7b 82->85 86 114eb92-114eb99 84->86 87 114eb9f 84->87 85->84 86->87 88 114f669-114f670 86->88 87->88 88->69 89 114f676-114f680 88->89
    APIs
    • RegOpenKeyA.ADVAPI32(80000001,?,?), ref: 0114EAD5
    • RegOpenKeyA.ADVAPI32(80000002,?,?), ref: 0114EAFC
    • GetNativeSystemInfo.KERNELBASE(?), ref: 0114EB53
    Memory Dump Source
    • Source File: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: Open$InfoNativeSystem
    • String ID:
    • API String ID: 1247124224-0
    • Opcode ID: 70d035b7ec0f103f9e6fcf9dbab699a4336c6e66898cfc3b4e2a650c289fd902
    • Instruction ID: 3d3109c584e689aa1a4d2254a4c21b2849c3c7fb7a11313aaa6fe660677868a6
    • Opcode Fuzzy Hash: 70d035b7ec0f103f9e6fcf9dbab699a4336c6e66898cfc3b4e2a650c289fd902
    • Instruction Fuzzy Hash: 57312A7110510EDFEF15DF54C849AEF3BA8FF05715F02042AE98282941E7BA4DA4CF6A

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 90 fbe6f5-fbe6fb VirtualAlloc 91 fbe707-fbfa6a 90->91
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID: 7o&$f1&}
    • API String ID: 4275171209-953520011
    • Opcode ID: 0575fefa5d4cecddd365175fe6d478bf0d58b8eedceebc00e23396436c2b0777
    • Instruction ID: 73e892d4e1fa8c03a9b1eee9e578e92d2abbc65c03f19414ae7b810cd8df1374
    • Opcode Fuzzy Hash: 0575fefa5d4cecddd365175fe6d478bf0d58b8eedceebc00e23396436c2b0777
    • Instruction Fuzzy Hash: CDF0F4B360C2099FC3041E7E9C488AB7BE9DAC6331B36032DF456C3784DA7289458622

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 95 119122e-119125e 97 1191389-119138a 95->97 98 1191264-1191279 95->98 98->97 100 119127f-1191283 98->100 101 1191289-119129b PathAddExtensionA 100->101 102 11912a5-11912ac 100->102 105 11912a4 101->105 103 11912ce-11912d5 102->103 104 11912b2-11912c1 call 1190ecf 102->104 107 11912db-11912e2 103->107 108 1191317-119131e 103->108 111 11912c6-11912c8 104->111 105->102 112 11912e8-11912f1 107->112 113 11912fb-119130a call 1190ecf 107->113 109 1191340-1191347 108->109 110 1191324-119133a call 1190ecf 108->110 116 1191369-1191370 109->116 117 119134d-1191363 call 1190ecf 109->117 110->97 110->109 111->97 111->103 112->113 118 11912f7 112->118 119 119130f-1191311 113->119 116->97 122 1191376-1191383 call 1190f08 116->122 117->97 117->116 118->113 119->97 119->108 122->97
    APIs
    • PathAddExtensionA.KERNELBASE(?,00000000), ref: 01191290
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: ExtensionPath
    • String ID: \\?\
    • API String ID: 158807944-4282027825
    • Opcode ID: 488138546b900285770da13847e051b9bd877f273774b47600118af123f8e7df
    • Instruction ID: 35c5a8e0990b6635cfbdeb6aa8fa1af67b1b8ec7924617a07339bfe918174897
    • Opcode Fuzzy Hash: 488138546b900285770da13847e051b9bd877f273774b47600118af123f8e7df
    • Instruction Fuzzy Hash: 5A313D75A0020ABFEF26DF98C809B9EBB7AFF84364F000195FA11A5490D37296A1DB55

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 126 119293d-1192950 call 1190c7b 129 1192993-11929a7 call 1190d26 GetModuleHandleExA 126->129 130 1192956-1192962 call 119138d 126->130 135 11929b1-11929b3 129->135 134 1192967-1192969 130->134 134->129 136 119296f-1192976 134->136 137 119297c 136->137 138 119297f-11929ac call 1190d26 136->138 137->138 138->135
    APIs
      • Part of subcall function 01190C7B: GetCurrentThreadId.KERNEL32 ref: 01190C8A
    • GetModuleHandleExA.KERNELBASE(?,?,?), ref: 011929A1
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: CurrentHandleModuleThread
    • String ID: .dll
    • API String ID: 2752942033-2738580789
    • Opcode ID: 5f1e29c8481369f59bf67236f4c5e8b4c05d44952730de47ed8212e62cfcd22f
    • Instruction ID: b23c7d04373b360303c72dc3842422f6a2c891a6bfef34967e4b539906418441
    • Opcode Fuzzy Hash: 5f1e29c8481369f59bf67236f4c5e8b4c05d44952730de47ed8212e62cfcd22f
    • Instruction Fuzzy Hash: F9F0907120030ABFDF199F68D884B5E3BA8FF183A8F108010FD254A051D371C5609A52

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 141 114a6d2-114a6ee LoadLibraryA 142 114a983-114d94a 141->142
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID: zx|O
    • API String ID: 1029625771-449694967
    • Opcode ID: bc954ded7d4472c5aff188a38db4824f32b821fb16553ea3a1ac5174e84de394
    • Instruction ID: 37ecbdba093e774de3799ec4fe46ab560323edcce5d424314257b46de57af867
    • Opcode Fuzzy Hash: bc954ded7d4472c5aff188a38db4824f32b821fb16553ea3a1ac5174e84de394
    • Instruction Fuzzy Hash: 6EF015B541CB00EBCB08AF19D48056DFBE0BF94B20F43891DA5C683614E33958A18B47

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 172 1194d36-1194d4c call 1190c7b GetCurrentProcess 175 1194d8e-1194db0 call 1190d26 DuplicateHandle 172->175 176 1194d52-1194d55 172->176 181 1194dba-1194dbc 175->181 176->175 178 1194d5b-1194d5e 176->178 178->175 180 1194d64-1194d77 call 1190ad5 178->180 180->175 184 1194d7d-1194db5 call 1192ad3 call 1190d26 180->184 184->181
    APIs
      • Part of subcall function 01190C7B: GetCurrentThreadId.KERNEL32 ref: 01190C8A
    • GetCurrentProcess.KERNEL32(-11315FEC), ref: 01194D43
    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 01194DA9
    Memory Dump Source
    • Source File: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: Current$DuplicateHandleProcessThread
    • String ID:
    • API String ID: 3748180921-0
    • Opcode ID: e8b1b602ad78e147df7f9f280b37b3f0dda6c5e23162d98cb5022803bf69822f
    • Instruction ID: 80f75dccd267ffe6f0a3666d21cb8290387a3933133a89041fa6422abf58e7cf
    • Opcode Fuzzy Hash: e8b1b602ad78e147df7f9f280b37b3f0dda6c5e23162d98cb5022803bf69822f
    • Instruction Fuzzy Hash: 0601FB3610014ABB9F2AAFA8DE44CAF3BBAFFA82587004215F92594510C735D062DB62

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 210 119fc84-119fc92 211 119fc98-119fcaa 210->211 212 119fcb5-119fcbf call 119fb19 210->212 211->212 216 119fcb0 211->216 217 119fcca-119fcd3 212->217 218 119fcc5 212->218 219 119fe14-119fe16 216->219 220 119fcd9-119fce0 217->220 221 119fceb-119fcf2 217->221 218->219 220->221 222 119fce6 220->222 223 119fcf8 221->223 224 119fcfd-119fd0d 221->224 222->219 223->219 224->219 225 119fd13-119fd1f call 119fbee 224->225 228 119fd22-119fd26 225->228 228->219 229 119fd2c-119fd36 228->229 230 119fd5d-119fd60 229->230 231 119fd3c-119fd4f 229->231 232 119fd63-119fd66 230->232 231->230 236 119fd55-119fd57 231->236 234 119fe0c-119fe0f 232->234 235 119fd6c-119fd73 232->235 234->228 237 119fd79-119fd7f 235->237 238 119fda1-119fdba 235->238 236->230 236->234 239 119fd9c 237->239 240 119fd85-119fd8a 237->240 244 119fdc0-119fdce 238->244 245 119fdd3-119fddb VirtualProtect 238->245 241 119fe04-119fe07 239->241 240->239 243 119fd90-119fd96 240->243 241->232 243->238 243->239 246 119fde1-119fde4 244->246 245->246 246->241 248 119fdea-119fe03 246->248 248->241
    Memory Dump Source
    • Source File: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3e996bfd139ee32d967aadc5e32a4e5413a45e173934d18095ea1d338c8378dd
    • Instruction ID: 8c7b5bd4c48745946214ddf4c701ca8b7c3d7b295fb48ace1afc6c040e459eba
    • Opcode Fuzzy Hash: 3e996bfd139ee32d967aadc5e32a4e5413a45e173934d18095ea1d338c8378dd
    • Instruction Fuzzy Hash: 7A417C71904107BFEF29CF18D944BADBFA1FF01314F158455E922EA142C371A8A1CBA1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 254 11933b5-11933c6 255 11933cc-11933e0 call 1190d59 254->255 256 11933f5-11933fe call 1190d59 254->256 266 11934e3 255->266 267 11933e6-11933f4 255->267 260 11934db-11934de call 1190d7e 256->260 261 1193404-1193415 call 1192b97 256->261 260->266 269 119341b-119341f 261->269 270 1193435-1193474 CreateFileA 261->270 271 11934ea-11934ee 266->271 267->256 273 1193432 269->273 274 1193425-1193431 call 1197c1f 269->274 275 1193498-119349b 270->275 276 119347a-1193497 270->276 273->270 274->273 277 11934ce-11934d6 call 1192a26 275->277 278 11934a1-11934b8 call 1190a9b 275->278 276->275 277->266 278->271 286 11934be-11934c9 call 1192a94 278->286 286->266
    APIs
    • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,?,00000000,00000010), ref: 0119346A
    Memory Dump Source
    • Source File: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 6b417de9905f0fc8868720365861deaa42a48bd2c58259ad6c5d11ee645305a6
    • Instruction ID: 5a113cea26ba2408e3f401b529e7aa9b2b3125fd5c17daa911cd01ec6133dea8
    • Opcode Fuzzy Hash: 6b417de9905f0fc8868720365861deaa42a48bd2c58259ad6c5d11ee645305a6
    • Instruction Fuzzy Hash: 1E316B75910205BEEF259F68DC44F9EBBB8FB04314F208265F626AB190C771A9518B50

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 250 113d7a8-113d7aa LoadLibraryA 251 113d7b0-113d7bb 250->251 252 113d7bc-113d8ef 250->252 251->252
    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID:
    • API String ID: 1029625771-0
    • Opcode ID: 2a8705d8c5c4bb14470e368d6c20c674a841e31f6eef05afcaf1196546fd4ec8
    • Instruction ID: d5a8760010bf57829c71c8124990a3c4d593235b001e6020b098046ba6637b4b
    • Opcode Fuzzy Hash: 2a8705d8c5c4bb14470e368d6c20c674a841e31f6eef05afcaf1196546fd4ec8
    • Instruction Fuzzy Hash: C83135B240C200AFE746AF58D88166EFBF8FF94760F12482DE6D592610D7354890DB57
    APIs
    • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,?,00000000), ref: 01192C53
    Memory Dump Source
    • Source File: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 52ace39e94ae77ac22d107b0839a6569740c053d6861244deb613d48e42c7323
    • Instruction ID: 4b3f74f3ed645c863cbe43308a3335d0646d0049244394b366b8452744747be6
    • Opcode Fuzzy Hash: 52ace39e94ae77ac22d107b0839a6569740c053d6861244deb613d48e42c7323
    • Instruction Fuzzy Hash: DB31A771A40205BFEF359F54ED45F99B7B8FF04728F204355F625AA0D1C3B1A5818B94
    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 55646acdf47e2112296f85bb7b9e25d14daf54a858de3287d2b8454395eb96f2
    • Instruction ID: 782d5c567709210a6d69bef4b3a7b328e3d0023cefc8588999b8a0315969aa47
    • Opcode Fuzzy Hash: 55646acdf47e2112296f85bb7b9e25d14daf54a858de3287d2b8454395eb96f2
    • Instruction Fuzzy Hash: ED2168B35482163FE30D9E60AD50BFE7B7DE783A30F25851AF90696582D3C06E80413A
    APIs
    • GetModuleFileNameA.KERNELBASE(?,?,0000028A,?,?), ref: 0119FA7E
    Memory Dump Source
    • Source File: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: FileModuleName
    • String ID:
    • API String ID: 514040917-0
    • Opcode ID: ab7a68c77769318276852a89db410b676514f2542b03ee883c240e3a5f1f6b82
    • Instruction ID: 9b03f5f7a08383d16e0bd99ed1f337e3d3d19b737ae98adee873a706d89ec644
    • Opcode Fuzzy Hash: ab7a68c77769318276852a89db410b676514f2542b03ee883c240e3a5f1f6b82
    • Instruction Fuzzy Hash: 4711B472A0122ABFEF298A088C48BEA7F7CAF44754F004091E955D6045D778D9CACAA1
    APIs
    • OpenSCManagerW.SECHOST(00000000,00000000,?), ref: 070A0DCD
    Memory Dump Source
    • Source File: 00000005.00000002.1418320283.00000000070A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070A0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_70a0000_file.jbxd
    Similarity
    • API ID: ManagerOpen
    • String ID:
    • API String ID: 1889721586-0
    • Opcode ID: ab21e6503feffd1df2ccf60ea322f105979b6fc560af007882856efacda19a92
    • Instruction ID: 411d93b9eb763bc1b24529f5f79260576c7d9c9e8a3d4795a5b1601c4a5cff87
    • Opcode Fuzzy Hash: ab21e6503feffd1df2ccf60ea322f105979b6fc560af007882856efacda19a92
    • Instruction Fuzzy Hash: 0B2149B6C012199FCB50CF99D884BDEFBF0EB88310F14821AD908AB245D7349541CFA4
    APIs
    • OpenSCManagerW.SECHOST(00000000,00000000,?), ref: 070A0DCD
    Memory Dump Source
    • Source File: 00000005.00000002.1418320283.00000000070A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070A0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_70a0000_file.jbxd
    Similarity
    • API ID: ManagerOpen
    • String ID:
    • API String ID: 1889721586-0
    • Opcode ID: c304e22aacf63409d3a9d276077131e2549873aa3f341e21179e0fe6018a83dd
    • Instruction ID: 3945549363ed3ea932febebffad50f30cbbd69c8047e44882320afa2bb04a27a
    • Opcode Fuzzy Hash: c304e22aacf63409d3a9d276077131e2549873aa3f341e21179e0fe6018a83dd
    • Instruction Fuzzy Hash: 172127B6C012199FCB50DF99D884BDEFBF4EB88320F14861AD808AB244D774A541CFA4
    APIs
    • ControlService.ADVAPI32(?,?,?), ref: 070A1580
    Memory Dump Source
    • Source File: 00000005.00000002.1418320283.00000000070A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070A0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_70a0000_file.jbxd
    Similarity
    • API ID: ControlService
    • String ID:
    • API String ID: 253159669-0
    • Opcode ID: f5567dd24e29c46b183f773d23c9486cbc48aacdc4b62eee235d1a6d225abc4b
    • Instruction ID: 707ea8848b74e1e82260e7093a1de973866e5f7e753cda10a8873ec24978e180
    • Opcode Fuzzy Hash: f5567dd24e29c46b183f773d23c9486cbc48aacdc4b62eee235d1a6d225abc4b
    • Instruction Fuzzy Hash: 0D2106B5D00349DFDB20CF9AC584BDEBBF4EB48320F108529E559A7250C378A645CFA5
    APIs
    • ControlService.ADVAPI32(?,?,?), ref: 070A1580
    Memory Dump Source
    • Source File: 00000005.00000002.1418320283.00000000070A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070A0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_70a0000_file.jbxd
    Similarity
    • API ID: ControlService
    • String ID:
    • API String ID: 253159669-0
    • Opcode ID: ec65efb23c59643cde85585435bdb6fabdc55c09afb4cf4555b7c24b32fe675d
    • Instruction ID: 51002bf6627e4aedf56cec8c8f72ef634c078d0e74e272c04485a46fc8ba2746
    • Opcode Fuzzy Hash: ec65efb23c59643cde85585435bdb6fabdc55c09afb4cf4555b7c24b32fe675d
    • Instruction Fuzzy Hash: C711F4B1D003499FDB20CF9AC544BDEBBF4AB48320F108129E958A3240D378A545CFA5
    APIs
    • ImpersonateLoggedOnUser.KERNELBASE ref: 070A1367
    Memory Dump Source
    • Source File: 00000005.00000002.1418320283.00000000070A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070A0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_70a0000_file.jbxd
    Similarity
    • API ID: ImpersonateLoggedUser
    • String ID:
    • API String ID: 2216092060-0
    • Opcode ID: 26f4384767a5fa544c407bfa25ce94c70945067b491e09cbc119ed198b15858e
    • Instruction ID: 22f6feddbddfcc51fbbabf6b540c252c51a301f002c64b4d5926923f24f1a965
    • Opcode Fuzzy Hash: 26f4384767a5fa544c407bfa25ce94c70945067b491e09cbc119ed198b15858e
    • Instruction Fuzzy Hash: CB1113B1D00249DFDB20DF9AC545BEEBBF4EB48320F14842AD558A7240C778A945CFA5
    APIs
    • ImpersonateLoggedOnUser.KERNELBASE ref: 070A1367
    Memory Dump Source
    • Source File: 00000005.00000002.1418320283.00000000070A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070A0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_70a0000_file.jbxd
    Similarity
    • API ID: ImpersonateLoggedUser
    • String ID:
    • API String ID: 2216092060-0
    • Opcode ID: ad8b9bbe3b85ed609f5079e7ff166026aafd45ade543e8db98c2db9f96cb9d9e
    • Instruction ID: 8fd6b79195a6a951e83e716045f74c19220998954e224350a021466642038458
    • Opcode Fuzzy Hash: ad8b9bbe3b85ed609f5079e7ff166026aafd45ade543e8db98c2db9f96cb9d9e
    • Instruction Fuzzy Hash: F51125B1C003499FDB20DF9AC545BEEBBF4EB48320F10842AD558A3240C778A945CFA5
    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: c139e650afe08d1c925f2e084a98409d943e9471dfc21f6191d2987a91ecd016
    • Instruction ID: fa22babe1d3c674fd9c9620ebef591bf9f9dba782f71fb1ab3b1ee93cc86fce2
    • Opcode Fuzzy Hash: c139e650afe08d1c925f2e084a98409d943e9471dfc21f6191d2987a91ecd016
    • Instruction Fuzzy Hash: 37F059B38882563FE31D9E516D04AFABB2CDB92670B2A412FE85AD1542D3C0ADC44537
    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: d659ac04951f652440ae0d5cd6a06b0b19c05ec8262895b3e93674fd4d62aafd
    • Instruction ID: 25e0a66dbef6ebcbfed8a5ebc5c667540ad214af9fff6be92b123b53255a183f
    • Opcode Fuzzy Hash: d659ac04951f652440ae0d5cd6a06b0b19c05ec8262895b3e93674fd4d62aafd
    • Instruction Fuzzy Hash: DAF078B3418263BFF3199F249C947B97FA8EF91954F12016CD84587480C3743CC08765
    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 4834276201dff3a485b2974356ddcced3f2e4a35aec35c3890ff3e64aef7dcc2
    • Instruction ID: 1b26f811a32d48ce34bbff541eac5acad4c6c76f0222fc6e5bf2f5922ca25bfe
    • Opcode Fuzzy Hash: 4834276201dff3a485b2974356ddcced3f2e4a35aec35c3890ff3e64aef7dcc2
    • Instruction Fuzzy Hash: AA01BC7244C3C51BC70A9F7898A469ABFA5EF42228F2982CED4818B0C3D3A81C518B16
    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 6eb6de2b47545b0c7492714e6a770c9c3705b3f8ff79d60a9e6d8bd588cf42bd
    • Instruction ID: 12afc958c56a4ee901ec015113642834c903fc0030543518bfee3c0483910130
    • Opcode Fuzzy Hash: 6eb6de2b47545b0c7492714e6a770c9c3705b3f8ff79d60a9e6d8bd588cf42bd
    • Instruction Fuzzy Hash: 5EF059B29082537FF75AA7388C492B82B68DFA2A60B064B79D495D71C1C32138C28291
    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 59ef12ab8014c83ddc85ce261001b73c7162434d2766beb1cc0fc6b86075fd06
    • Instruction ID: 184a8d7219cdd19885452b867358a3f85c1275bd6e31461733de00778b22ad12
    • Opcode Fuzzy Hash: 59ef12ab8014c83ddc85ce261001b73c7162434d2766beb1cc0fc6b86075fd06
    • Instruction Fuzzy Hash: FFE061939C97913DD11495EC5C91FED575CCB63E75F359569F152CA0C2C39038C14132
    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 16f73d749ef0e9a9b9eb76b18976df0d3f63a4e79f06d0f32ea0a8b9c23e5e39
    • Instruction ID: 62254cd6e0e60f6c50e5ab779eded98a45b8cdf0d6d0169df27fb00071771397
    • Opcode Fuzzy Hash: 16f73d749ef0e9a9b9eb76b18976df0d3f63a4e79f06d0f32ea0a8b9c23e5e39
    • Instruction Fuzzy Hash: 44E020534C82613DE114A9887E246F9D76CD793630B304129E417C51C2C3C016445131
    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: efaeba2bfa57647d59140e32864c08a5d623774dbfed0c62407a7392c4b9db9c
    • Instruction ID: ca5ba6fb7b4f9dffc3a122e7a14298fde05d5a7da400ed7fb88ac1789c18416c
    • Opcode Fuzzy Hash: efaeba2bfa57647d59140e32864c08a5d623774dbfed0c62407a7392c4b9db9c
    • Instruction Fuzzy Hash: 84E0ABF28081237FF61A9734CC483F43BA8EB91A40B06446CD44197281C3203CC28391
    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: lstrcmpi
    • String ID:
    • API String ID: 1586166983-0
    • Opcode ID: 86e3643fbd15faf11e316837eaa6768790db3349c2c63050f1437e7f94133c1e
    • Instruction ID: 1f759ccf2fb0dcb6701fbf47a3e6945d7dfa593e2e79346e5e8720e4fb15aff4
    • Opcode Fuzzy Hash: 86e3643fbd15faf11e316837eaa6768790db3349c2c63050f1437e7f94133c1e
    • Instruction Fuzzy Hash: 2101E436A0012ABFDF259FA8DC08DDFBF7AEF48744F004165B512A4160E7328A61DB60
    APIs
    • VirtualAlloc.KERNELBASE(00000000,00001000,00001000,00000004,?,?,0119F5F7,?,?,0119F2FD,?,?,0119F2FD,?,?,0119F2FD), ref: 0119F61B
    Memory Dump Source
    • Source File: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: e0dd67fd3dd9297a81a9346ae6522bfdcee3689433f9333a342bec298987a31a
    • Instruction ID: bdc9b019a67428cedf79fcfe76f412c1b6f40dd81c7d43e3a9f892923e8ee30f
    • Opcode Fuzzy Hash: e0dd67fd3dd9297a81a9346ae6522bfdcee3689433f9333a342bec298987a31a
    • Instruction Fuzzy Hash: CBF06DB1904306EFEB258F54C909B59BFA4FF88751F10C069E65A9B1A1E3B194C1CB94
    APIs
      • Part of subcall function 01190C7B: GetCurrentThreadId.KERNEL32 ref: 01190C8A
    • CloseHandle.KERNELBASE(01193392,-11315FEC,?,?,01193392,?), ref: 01193A0D
    Memory Dump Source
    • Source File: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: CloseCurrentHandleThread
    • String ID:
    • API String ID: 3305057742-0
    • Opcode ID: 4b40ca4b578a7a6be732b927764112839ba2b596f63b9e635b298b2840241438
    • Instruction ID: 1bf0eb2b7c79fdca04b8f2cbb34b2b9115f1a5f9acca7d7908b7ef29878953be
    • Opcode Fuzzy Hash: 4b40ca4b578a7a6be732b927764112839ba2b596f63b9e635b298b2840241438
    • Instruction Fuzzy Hash: 93E04F73A10146B6CF28ABBDD84CD4F7A6DFFA56AC7004531F522D5050CB68D092C6A1
    APIs
    • VirtualAlloc.KERNELBASE(00000000), ref: 00FBF9B5
    Memory Dump Source
    • Source File: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 9b313ea345d5ef0c7e04aebd9fb75eb05254fa60d6fb2e1eb3962d9d9e9dcab2
    • Instruction ID: d04a0c74f334d6e2122430dad86fb43d79c4c85a52de64d9c467d541cd84c1d5
    • Opcode Fuzzy Hash: 9b313ea345d5ef0c7e04aebd9fb75eb05254fa60d6fb2e1eb3962d9d9e9dcab2
    • Instruction Fuzzy Hash: 7CD0CA7201C20AEEEB422F518800BFDBBF5EB28311F11091AE8C284940C3320CA0EE06
    APIs
    • CloseHandle.KERNELBASE(?,?,01190B1A,?,?), ref: 01192A9A
    Memory Dump Source
    • Source File: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: CloseHandle
    • String ID:
    • API String ID: 2962429428-0
    • Opcode ID: e6e98a43014b1d5a8795547c40f258fa7d573c142c3c90fd3d9e8d45a8ce283c
    • Instruction ID: db4ac6de8594d1cb0cd1a195b21b45fa349446d5c93076e748acf1629ab6d941
    • Opcode Fuzzy Hash: e6e98a43014b1d5a8795547c40f258fa7d573c142c3c90fd3d9e8d45a8ce283c
    • Instruction Fuzzy Hash: 5BB09B310101097FCF11BF51DC0584D7F65FF1165C7008110B915454208775D57097D4
    APIs
      • Part of subcall function 01190C7B: GetCurrentThreadId.KERNEL32 ref: 01190C8A
    • GetSystemTime.KERNEL32(?,-11315FEC), ref: 01194DFD
    • GetFileTime.KERNEL32(?,?,?,?,-11315FEC), ref: 01194E40
    Memory Dump Source
    • Source File: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: Time$CurrentFileSystemThread
    • String ID:
    • API String ID: 2191017843-0
    • Opcode ID: 4bc8b97a86413ede3ae7e0ab88653dc5ba00b3d3ba097f15762fe83c54c3913f
    • Instruction ID: 9fcdb35cd4af83ffa7a6348de1245e3ee1d57c80ff295fad4ac920068fc655ad
    • Opcode Fuzzy Hash: 4bc8b97a86413ede3ae7e0ab88653dc5ba00b3d3ba097f15762fe83c54c3913f
    • Instruction Fuzzy Hash: 6501783210404AEBCF299F68DD0CD8F3F79FF89710B014122F42189828C736C8A2DA62
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID:
    • String ID: Io~
    • API String ID: 0-30186602
    • Opcode ID: 34ad9714de9ec23c1a62361d3887b3c4f81479fdf06c4db69cbc8556a06f1522
    • Instruction ID: 61d66c28d3956d9332c6e3de399f2d789fa52814e19804b9568d7de131a6b387
    • Opcode Fuzzy Hash: 34ad9714de9ec23c1a62361d3887b3c4f81479fdf06c4db69cbc8556a06f1522
    • Instruction Fuzzy Hash: 3A417EB290D210EFD755AE19D885AAEFBE5FF98320F06482DEAC883650D7354850CB97
    APIs
      • Part of subcall function 01190C7B: GetCurrentThreadId.KERNEL32 ref: 01190C8A
    • wsprintfA.USER32 ref: 01194344
    • LoadImageA.USER32(?,?,?,?,?,?), ref: 01194408
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: CurrentImageLoadThreadwsprintf
    • String ID: %8x$%8x
    • API String ID: 896354329-2046107164
    • Opcode ID: f3a61257d339d99af30839d636fef831fe78a54a653ea9f7d34ee80af194f1fd
    • Instruction ID: d3d25a49faafa20aa5678aba51a66495c3215d6701e2ee07f1cc1e14f7269023
    • Opcode Fuzzy Hash: f3a61257d339d99af30839d636fef831fe78a54a653ea9f7d34ee80af194f1fd
    • Instruction Fuzzy Hash: 3231173190010ABFDF15DFA4DD48EEEBB79FF98314F108125FA21A61A0C7719A61DB91
    APIs
    • GetFileAttributesExW.KERNEL32(009A53BC,00004020,00000000,-11315FEC), ref: 01194FBC
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1416417748.000000000118B000.00000040.00000001.01000000.00000004.sdmp, Offset: 00FB0000, based on PE: true
    • Associated: 00000005.00000002.1415948391.0000000000FB0000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1415963225.0000000000FB2000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416058056.0000000000FB6000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416074677.0000000000FBA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416090103.0000000000FC4000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416104920.0000000000FC5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416119416.0000000000FC6000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416208685.0000000001128000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416222087.000000000112A000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416236591.000000000113A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416247875.000000000113B000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.000000000113C000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416262931.0000000001145000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416290734.0000000001150000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416302407.0000000001151000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416315397.0000000001159000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416329257.000000000115A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416343329.0000000001162000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416357261.0000000001163000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416375453.0000000001178000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416388578.000000000117A000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416401669.0000000001181000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416432037.0000000001195000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416444839.0000000001197000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416465155.00000000011B7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416479406.00000000011BA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416493746.00000000011BB000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416508795.00000000011C6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416524745.00000000011C7000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416538909.00000000011CA000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416554162.00000000011D1000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416568966.00000000011D5000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416583472.00000000011DC000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416598612.00000000011E0000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416613356.00000000011E8000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416628472.00000000011EB000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416642550.00000000011F3000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416656809.00000000011F6000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416674490.0000000001202000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416688570.0000000001204000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.000000000124E000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416717626.0000000001255000.00000080.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416750938.0000000001264000.00000040.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1416765810.0000000001266000.00000080.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_fb0000_file.jbxd
    Similarity
    • API ID: AttributesFile
    • String ID: @
    • API String ID: 3188754299-2726393805
    • Opcode ID: 5ebc740aa8be3de7e5203d8bab4bdafaed2c03d5ea709775374ce321c49db080
    • Instruction ID: d69b8e0d9816a645dc88df525c6d0208a7e688095092f5db7b3015d6c312f147
    • Opcode Fuzzy Hash: 5ebc740aa8be3de7e5203d8bab4bdafaed2c03d5ea709775374ce321c49db080
    • Instruction Fuzzy Hash: 53318D71504306EFEF28CF48C94879ABFB0FF04314F008529E96667A50C374A6A6CB81